|
K0068
|
Knowledge of programming language structures and logic |
7 |
|
K0674
|
Knowledge of computer networking protocols |
40 |
|
K0675
|
Knowledge of risk management processes |
41 |
|
K0676
|
Knowledge of cybersecurity laws and regulations |
41 |
|
K0677
|
Knowledge of cybersecurity policies and procedures |
41 |
|
K0678
|
Knowledge of privacy laws and regulations |
41 |
|
K0679
|
Knowledge of privacy policies and procedures |
41 |
|
K0680
|
Knowledge of cybersecurity principles and practices |
40 |
|
K0681
|
Knowledge of privacy principles and practices |
40 |
|
K0682
|
Knowledge of cybersecurity threats |
40 |
|
K0683
|
Knowledge of cybersecurity vulnerabilities |
40 |
|
K0684
|
Knowledge of cybersecurity threat characteristics |
40 |
|
K0693
|
Knowledge of complex data structure capabilities and applications |
3 |
|
K0695
|
Knowledge of programming principles and practices |
3 |
|
K0710
|
Knowledge of enterprise cybersecurity architecture principles and practices |
20 |
|
K0711
|
Knowledge of evaluation and validation principles and practices |
7 |
|
K0712
|
Knowledge of Local Area Networks (LAN) |
6 |
|
K0713
|
Knowledge of Wide Area Networks (WAN) |
6 |
|
K0721
|
Knowledge of risk management principles and practices |
19 |
|
K0722
|
Knowledge of software development principles and practices |
3 |
|
K0728
|
Knowledge of Confidentiality, Integrity and Availability (CIA) principles and practices |
20 |
|
K0729
|
Knowledge of non-repudiation principles and practices |
20 |
|
K0730
|
Knowledge of cyber safety principles and practices |
20 |
|
K0734
|
Knowledge of Risk Management Framework (RMF) requirements |
14 |
|
K0735
|
Knowledge of risk management models and frameworks |
13 |
|
K0737
|
Knowledge of bandwidth management tools and techniques |
5 |
|
K0738
|
Knowledge of low-level programming languages |
3 |
|
K0739
|
Knowledge of mathematics principles and practices |
7 |
|
K0744
|
Knowledge of operating system (OS) systems and software |
16 |
|
K0748
|
Knowledge of Privacy Impact Assessment (PIA) principles and practices |
5 |
|
K0751
|
Knowledge of system threats |
40 |
|
K0752
|
Knowledge of system vulnerabilities |
40 |
|
K0755
|
Knowledge of configuration management (CM) tools and techniques |
4 |
|
K0757
|
Knowledge of system design tools and techniques |
8 |
|
K0759
|
Knowledge of client and server architecture |
16 |
|
K0762
|
Knowledge of software debugging principles and practices |
3 |
|
K0763
|
Knowledge of software design tools and techniques |
2 |
|
K0764
|
Knowledge of software development models and frameworks |
3 |
|
K0765
|
Knowledge of software engineering principles and practices |
15 |
|
K0767
|
Knowledge of structured analysis principles and practices |
5 |
|
K0768
|
Knowledge of automated systems analysis tools and techniques |
5 |
|
K0778
|
Knowledge of enterprise information technology (IT) architecture principles and practices |
20 |
|
K0782
|
Knowledge of web service protocols |
2 |
|
K0791
|
Knowledge of defense-in-depth principles and practices |
19 |
|
K0803
|
Knowledge of supply chain risk management principles and practices |
17 |
|
K0813
|
Knowledge of interpreted and compiled programming language characteristics |
7 |
|
K0814
|
Knowledge of secure coding tools and techniques |
6 |
|
K0820
|
Knowledge of supply chain risks |
18 |
|
K0826
|
Knowledge of software security principles and practices |
2 |
|
K0827
|
Knowledge of software quality assurance (SQA) principles and practices |
3 |
|
K0828
|
Knowledge of supply chain risk management standards and best practices |
16 |
|
K0839
|
Knowledge of critical infrastructure systems and software |
13 |
|
K0846
|
Knowledge of secure software deployment principles and practices |
3 |
|
K0847
|
Knowledge of secure software deployment tools and techniques |
3 |
|
K0870
|
Knowledge of enterprise architecture (EA) reference models and frameworks |
20 |
|
K0871
|
Knowledge of enterprise architecture (EA) principles and practices |
20 |
|
K0877
|
Knowledge of application firewall principles and practices |
12 |
|
K0878
|
Knowledge of network firewall principles and practices |
12 |
|
K0915
|
Knowledge of network architecture principles and practices |
21 |
|
K0917
|
Knowledge of Personally Identifiable Information (PII) data security standards and best practices |
15 |
|
K0918
|
Knowledge of Payment Card Industry (PCI) data security standards and best practices |
16 |
|
K0919
|
Knowledge of Personal Health Information (PHI) data security standards and best practices |
16 |
|
K0920
|
Knowledge of risk management policies and procedures |
7 |
|
K0948
|
Knowledge of embedded systems and software |
9 |
|
K0955
|
Knowledge of penetration testing principles and practices |
8 |
|
K0956
|
Knowledge of penetration testing tools and techniques |
8 |
|
K0957
|
Knowledge of root cause analysis tools and techniques |
2 |
|
K0983
|
Knowledge of computer networking principles and practices |
39 |
|
K1014
|
Knowledge of network security principles and practices |
40 |
|
K1079
|
Knowledge of web application security risks |
13 |
|
K1093
|
Knowledge of black-box software testing |
2 |
|
K1099
|
Knowledge of code analysis tools and techniques |
4 |
|
K1117
|
Knowledge of coding and testing standards |
2 |
|
K1118
|
Knowledge of completion criteria |
2 |
|
K1126
|
Knowledge of cost constraints |
2 |
|
K1128
|
Knowledge of customer requirements |
2 |
|
K1137
|
Knowledge of cybersecurity requirements |
11 |
|
K1148
|
Knowledge of data manipulation principles and practices |
3 |
|
K1149
|
Knowledge of data retrieval principles and practices |
3 |
|
K1150
|
Knowledge of data storage principles and practices |
3 |
|
K1157
|
Knowledge of enterprise-wide version control systems |
3 |
|
K1165
|
Knowledge of independent testing methods |
2 |
|
K1205
|
Knowledge of required reporting formats |
3 |
|
K1208
|
Knowledge of risk acceptance and documentation |
2 |
|
K1214
|
Knowledge of security restrictions |
2 |
|
K1215
|
Knowledge of security testing tools and techniques |
2 |