|
K0001
|
Knowledge of computer networking concepts and protocols, and network security methodologies. |
52 |
|
K0002
|
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
52 |
|
K0003
|
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. |
52 |
|
K0004
|
Knowledge of cybersecurity and privacy principles. |
52 |
|
K0005
|
Knowledge of cyber threats and vulnerabilities. |
52 |
|
K0006
|
Knowledge of specific operational impacts of cybersecurity lapses. |
52 |
|
K0009
|
Knowledge of application vulnerabilities. |
6 |
|
K0021
|
Knowledge of data backup and recovery. |
9 |
|
K0051
|
Knowledge of low-level computer languages (e.g., assembly languages). |
4 |
|
K0109
|
Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
15 |
|
K0142
|
Knowledge of collection management processes, capabilities, and limitations. |
4 |
|
K0224
|
Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. |
5 |
|
K0363
|
Knowledge of auditing and logging procedures (including server-based logging). |
1 |
|
K0372
|
Knowledge of programming concepts (e.g., levels, structures, compiled vs. interpreted languages). |
1 |
|
K0373
|
Knowledge of basic software applications (e.g., data storage and backup, database applications) and the types of vulnerabilities that have been found in those applications. |
1 |
|
K0375
|
Knowledge of wireless applications vulnerabilities. |
1 |
|
K0379
|
Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc. |
7 |
|
K0403
|
Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations. |
5 |
|
K0406
|
Knowledge of current software and methodologies for active defense and system hardening. |
1 |
|
K0420
|
Knowledge of database theory. |
4 |
|
K0423
|
Knowledge of deconfliction reporting to include external organization interaction. |
1 |
|
K0428
|
Knowledge of encryption algorithms and tools for wireless local area networks (WLANs). |
1 |
|
K0427
|
Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). |
8 |
|
K0429
|
Knowledge of enterprise-wide information management. |
1 |
|
K0430
|
Knowledge of evasion strategies and techniques. |
2 |
|
K0433
|
Knowledge of forensic implications of operating system structure and operations. |
1 |
|
K0438
|
Knowledge of mobile cellular communications architecture (e.g., LTE, CDMA, GSM/EDGE and UMTS/HSPA). |
1 |
|
K0440
|
Knowledge of host-based security products and how those products affect exploitation and reduce vulnerability. |
8 |
|
K0452
|
Knowledge of implementing Unix and Windows systems that provide radius authentication and logging, DNS, mail, web service, FTP server, DHCP, firewall, and SNMP. |
1 |
|
K0468
|
Knowledge of internal and external partner reporting. |
1 |
|
K0481
|
Knowledge of methods and techniques used to detect various exploitation activities. |
1 |
|
K0485
|
Knowledge of network administration. |
1 |
|
K0486
|
Knowledge of network construction and topology. |
1 |
|
K0480
|
Knowledge of malware. |
8 |
|
K0516
|
Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
10 |
|
K0528
|
Knowledge of satellite-based communication systems. |
1 |
|
K0530
|
Knowledge of security hardware and software options, including the network artifacts they induce and their effects on exploitation. |
1 |
|
K0531
|
Knowledge of security implications of software configurations. |
1 |
|
K0536
|
Knowledge of structure, approach, and strategy of exploitation tools (e.g., sniffers, keyloggers) and techniques (e.g., gaining backdoor access, collecting/exfiltrating data, conducting vulnerability analysis of other systems in the network). |
1 |
|
K0560
|
Knowledge of the basic structure, architecture, and design of modern communication networks. |
10 |
|
K0565
|
Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. |
11 |
|
K0573
|
Knowledge of the fundamentals of digital forensics to extract actionable intelligence. |
1 |
|
K0608
|
Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications). |
2 |
|
K0609
|
Knowledge of virtual machine technologies. |
1 |