|
K0646
|
Knowledge of system optimization techniques |
2 |
|
K0674
|
Knowledge of computer networking protocols |
40 |
|
K0675
|
Knowledge of risk management processes |
41 |
|
K0676
|
Knowledge of cybersecurity laws and regulations |
41 |
|
K0677
|
Knowledge of cybersecurity policies and procedures |
41 |
|
K0678
|
Knowledge of privacy laws and regulations |
41 |
|
K0679
|
Knowledge of privacy policies and procedures |
41 |
|
K0680
|
Knowledge of cybersecurity principles and practices |
40 |
|
K0681
|
Knowledge of privacy principles and practices |
40 |
|
K0682
|
Knowledge of cybersecurity threats |
40 |
|
K0683
|
Knowledge of cybersecurity vulnerabilities |
40 |
|
K0684
|
Knowledge of cybersecurity threat characteristics |
40 |
|
K0685
|
Knowledge of access control principles and practices |
21 |
|
K0686
|
Knowledge of authentication and authorization tools and techniques |
21 |
|
K0707
|
Knowledge of database systems and software |
9 |
|
K0710
|
Knowledge of enterprise cybersecurity architecture principles and practices |
20 |
|
K0711
|
Knowledge of evaluation and validation principles and practices |
7 |
|
K0714
|
Knowledge of electrical engineering principles and practices |
3 |
|
K0720
|
Knowledge of Assessment and Authorization (A&A) processes |
5 |
|
K0727
|
Knowledge of analysis standards and best practices |
7 |
|
K0728
|
Knowledge of Confidentiality, Integrity and Availability (CIA) principles and practices |
20 |
|
K0729
|
Knowledge of non-repudiation principles and practices |
20 |
|
K0730
|
Knowledge of cyber safety principles and practices |
20 |
|
K0731
|
Knowledge of systems security engineering (SSE) principles and practices |
13 |
|
K0739
|
Knowledge of mathematics principles and practices |
7 |
|
K0742
|
Knowledge of identity and access management (IAM) principles and practices |
10 |
|
K0744
|
Knowledge of operating system (OS) systems and software |
16 |
|
K0745
|
Knowledge of parallel and distributed computing principles and practices |
5 |
|
K0749
|
Knowledge of process engineering principles and practices |
13 |
|
K0751
|
Knowledge of system threats |
40 |
|
K0752
|
Knowledge of system vulnerabilities |
40 |
|
K0756
|
Knowledge of security management principles and practices |
6 |
|
K0757
|
Knowledge of system design tools and techniques |
8 |
|
K0758
|
Knowledge of server administration principles and practices |
13 |
|
K0759
|
Knowledge of client and server architecture |
16 |
|
K0765
|
Knowledge of software engineering principles and practices |
15 |
|
K0772
|
Knowledge of systems testing and evaluation tools and techniques |
7 |
|
K0773
|
Knowledge of telecommunications principles and practices |
14 |
|
K0778
|
Knowledge of enterprise information technology (IT) architecture principles and practices |
20 |
|
K0779
|
Knowledge of systems engineering processes |
14 |
|
K0791
|
Knowledge of defense-in-depth principles and practices |
19 |
|
K0835
|
Knowledge of risk assessment principles and practices |
8 |
|
K0836
|
Knowledge of threat assessment principles and practices |
7 |
|
K0839
|
Knowledge of critical infrastructure systems and software |
13 |
|
K0840
|
Knowledge of hardware reverse engineering tools and techniques |
15 |
|
K0842
|
Knowledge of software reverse engineering tools and techniques |
15 |
|
K0848
|
Knowledge of network systems management principles and practices |
8 |
|
K0849
|
Knowledge of network systems management tools and techniques |
8 |
|
K0851
|
Knowledge of reverse engineering principles and practices |
15 |
|
K0865
|
Knowledge of data classification standards and best practices |
18 |
|
K0866
|
Knowledge of data classification tools and techniques |
18 |
|
K0868
|
Knowledge of process improvement principles and practices |
6 |
|
K0869
|
Knowledge of process maturity models and frameworks |
6 |
|
K0870
|
Knowledge of enterprise architecture (EA) reference models and frameworks |
20 |
|
K0871
|
Knowledge of enterprise architecture (EA) principles and practices |
20 |
|
K0872
|
Knowledge of service management principles and practices |
11 |
|
K0873
|
Knowledge of service management standards and best practices |
11 |
|
K0879
|
Knowledge of industry cybersecurity models and frameworks |
9 |
|
K0880
|
Knowledge of access control models and frameworks |
9 |
|
K0883
|
Knowledge of circuit analysis tools and techniques |
1 |
|
K0891
|
Knowledge of the Open Systems Interconnect (OSI) reference model |
13 |
|
K0894
|
Knowledge of computer architecture principles and practices |
4 |
|
K0906
|
Knowledge of multi-level security (MLS) systems and software |
2 |
|
K0907
|
Knowledge of cross-domain solutions |
2 |
|
K0915
|
Knowledge of network architecture principles and practices |
21 |
|
K0921
|
Knowledge of program protection plan (PPP) principles and practices |
2 |
|
K0927
|
Knowledge of configuration management tools and techniques |
3 |
|
K0928
|
Knowledge of systems engineering principles and practices |
13 |
|
K0933
|
Knowledge of N-tier architecture principles and practices |
2 |
|
K0934
|
Knowledge of data classification policies and procedures |
18 |
|
K0947
|
Knowledge of computer engineering principles and practices |
14 |
|
K0948
|
Knowledge of embedded systems and software |
9 |
|
K0949
|
Knowledge of fault tolerance tools and techniques |
2 |
|
K0952
|
Knowledge of information theory principles and practices |
5 |
|
K0983
|
Knowledge of computer networking principles and practices |
39 |
|
K1014
|
Knowledge of network security principles and practices |
40 |
|
K1086
|
Knowledge of design modeling |
3 |
|
K1095
|
Knowledge of design methods |
2 |
|
K1110
|
Knowledge of acquisition cybersecurity requirements |
2 |
|
K1111
|
Knowledge of application security design principles and practices |
4 |
|
K1120
|
Knowledge of Confidentiality, Integrity, Availability, Authenticity, and Non-repudiation (CIAAN) principles and practices |
5 |
|
K1159
|
Knowledge of fail-over or alternate site requirements |
2 |
|
K1169
|
Knowledge of material supportability requirements |
2 |
|
K1191
|
Knowledge of organizational security posture |
2 |
|
K1194
|
Knowledge of Personally Identifiable Information (PII) attributes |
4 |
|
K1212
|
Knowledge of security controls |
4 |
|
K1216
|
Knowledge of service-oriented security architecture practices and principles |
3 |
|
K1223
|
Knowledge of system backup requirements |
2 |
|
K1236
|
Knowledge of user requirements |
3 |