|
K0001
|
Knowledge of computer networking concepts and protocols, and network security methodologies. |
52 |
|
K0002
|
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
52 |
|
K0003
|
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. |
52 |
|
K0004
|
Knowledge of cybersecurity and privacy principles. |
52 |
|
K0005
|
Knowledge of cyber threats and vulnerabilities. |
52 |
|
K0006
|
Knowledge of specific operational impacts of cybersecurity lapses. |
52 |
|
K0046
|
Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions. |
4 |
|
K0070
|
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
13 |
|
K0107
|
Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations. |
4 |
|
K0110
|
Knowledge of adversarial tactics, techniques, and procedures. |
2 |
|
K0114
|
Knowledge of electronic devices (e.g., computer systems/components, access control devices, digital cameras, digital scanners, electronic organizers, hard drives, memory cards, modems, network components, networked appliances, networked home control devices, printers, removable storage devices, telephones, copiers, facsimile machines, etc.). |
2 |
|
K0118
|
Knowledge of processes for seizing and preserving digital evidence. |
3 |
|
K0123
|
Knowledge of legal governance related to admissibility (e.g. Rules of Evidence). |
3 |
|
K0125
|
Knowledge of processes for collecting, packaging, transporting, and storing electronic evidence while maintaining chain of custody. |
3 |
|
K0128
|
Knowledge of types and collection of persistent data. |
3 |
|
K0144
|
Knowledge of social dynamics of computer attackers in a global context. |
1 |
|
K0155
|
Knowledge of electronic evidence law. |
3 |
|
K0156
|
Knowledge of legal rules of evidence and court procedure. |
3 |
|
K0168
|
Knowledge of applicable laws, statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures. |
11 |
|
K0209
|
Knowledge of covert communication techniques. |
2 |
|
K0231
|
Knowledge of crisis management protocols, processes, and techniques. |
1 |
|
K0244
|
Knowledge of physical and physiological behaviors that may indicate suspicious or abnormal activity. |
1 |
|
K0251
|
Knowledge of the judicial process, including the presentation of facts and evidence. |
1 |
|
K0351
|
Knowledge of applicable statutes, laws, regulations and policies governing cyber targeting and exploitation. |
3 |
|
K0624
|
Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list) |
13 |