|
K0001
|
Knowledge of computer networking concepts and protocols, and network security methodologies. |
52 |
|
K0002
|
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
52 |
|
K0003
|
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. |
52 |
|
K0004
|
Knowledge of cybersecurity and privacy principles. |
52 |
|
K0005
|
Knowledge of cyber threats and vulnerabilities. |
52 |
|
K0006
|
Knowledge of specific operational impacts of cybersecurity lapses. |
52 |
|
K0017
|
Knowledge of concepts and practices of processing digital forensic data. |
2 |
|
K0021
|
Knowledge of data backup and recovery. |
9 |
|
K0042
|
Knowledge of incident response and handling methodologies. |
7 |
|
K0060
|
Knowledge of operating systems. |
13 |
|
K0070
|
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
13 |
|
K0077
|
Knowledge of server and client operating systems. |
4 |
|
K0078
|
Knowledge of server diagnostic tools and fault identification techniques. |
2 |
|
K0107
|
Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations. |
4 |
|
K0109
|
Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
15 |
|
K0117
|
Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]). |
3 |
|
K0118
|
Knowledge of processes for seizing and preserving digital evidence. |
3 |
|
K0119
|
Knowledge of hacking methodologies. |
2 |
|
K0122
|
Knowledge of investigative implications of hardware, Operating Systems, and network technologies. |
2 |
|
K0123
|
Knowledge of legal governance related to admissibility (e.g. Rules of Evidence). |
3 |
|
K0125
|
Knowledge of processes for collecting, packaging, transporting, and storing electronic evidence while maintaining chain of custody. |
3 |
|
K0128
|
Knowledge of types and collection of persistent data. |
3 |
|
K0131
|
Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies. |
3 |
|
K0132
|
Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files. |
2 |
|
K0133
|
Knowledge of types of digital forensics data and how to recognize them. |
2 |
|
K0134
|
Knowledge of deployable forensics. |
2 |
|
K0145
|
Knowledge of security event correlation tools. |
2 |
|
K0155
|
Knowledge of electronic evidence law. |
3 |
|
K0156
|
Knowledge of legal rules of evidence and court procedure. |
3 |
|
K0167
|
Knowledge of system administration, network, and operating system hardening techniques. |
7 |
|
K0168
|
Knowledge of applicable laws, statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures. |
11 |
|
K0179
|
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
19 |
|
K0182
|
Knowledge of data carving tools and techniques (e.g., Foremost). |
2 |
|
K0183
|
Knowledge of reverse engineering concepts. |
2 |
|
K0184
|
Knowledge of anti-forensics tactics, techniques, and procedures. |
2 |
|
K0185
|
Knowledge of forensics lab design configuration and support applications (e.g., VMWare, Wireshark). |
2 |
|
K0186
|
Knowledge of debugging procedures and tools. |
2 |
|
K0187
|
Knowledge of file type abuse by adversaries for anomalous behavior. |
2 |
|
K0188
|
Knowledge of malware analysis tools (e.g., Oily Debug, Ida Pro). |
2 |
|
K0189
|
Knowledge of malware with virtual machine detection (e.g. virtual aware malware, debugger aware malware, and unpacked malware that looks for VM-related strings in your computer’s display device). |
2 |
|
K0305
|
Knowledge of data concealment (e.g. encryption algorithms and steganography). |
1 |
|
K0624
|
Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list) |
13 |