|
K0674
|
Knowledge of computer networking protocols |
40 |
|
K0675
|
Knowledge of risk management processes |
41 |
|
K0676
|
Knowledge of cybersecurity laws and regulations |
41 |
|
K0677
|
Knowledge of cybersecurity policies and procedures |
41 |
|
K0678
|
Knowledge of privacy laws and regulations |
41 |
|
K0679
|
Knowledge of privacy policies and procedures |
41 |
|
K0680
|
Knowledge of cybersecurity principles and practices |
40 |
|
K0681
|
Knowledge of privacy principles and practices |
40 |
|
K0682
|
Knowledge of cybersecurity threats |
40 |
|
K0683
|
Knowledge of cybersecurity vulnerabilities |
40 |
|
K0684
|
Knowledge of cybersecurity threat characteristics |
40 |
|
K0685
|
Knowledge of access control principles and practices |
21 |
|
K0686
|
Knowledge of authentication and authorization tools and techniques |
21 |
|
K0716
|
Knowledge of host access control (HAC) systems and software |
10 |
|
K0717
|
Knowledge of network access control (NAC) systems and software |
10 |
|
K0732
|
Knowledge of intrusion detection tools and techniques |
4 |
|
K0744
|
Knowledge of operating system (OS) systems and software |
16 |
|
K0751
|
Knowledge of system threats |
40 |
|
K0752
|
Knowledge of system vulnerabilities |
40 |
|
K0759
|
Knowledge of client and server architecture |
16 |
|
K0770
|
Knowledge of system administration principles and practices |
14 |
|
K0784
|
Knowledge of insider threat laws and regulations |
7 |
|
K0785
|
Knowledge of insider threat tools and techniques |
7 |
|
K0788
|
Knowledge of adversarial tactics principles and practices |
3 |
|
K0789
|
Knowledge of adversarial tactics tools and techniques |
3 |
|
K0790
|
Knowledge of adversarial tactics policies and procedures |
3 |
|
K0795
|
Knowledge of digital evidence seizure policies and procedures |
3 |
|
K0796
|
Knowledge of digital evidence preservation policies and procedures |
3 |
|
K0800
|
Knowledge of evidence admissibility laws and regulations |
7 |
|
K0802
|
Knowledge of chain of custody policies and procedures |
4 |
|
K0804
|
Knowledge of persistent data principles and practices |
3 |
|
K0821
|
Knowledge of federal agency roles and responsibilities |
9 |
|
K0833
|
Knowledge of cyberattack actor characteristics |
4 |
|
K0837
|
Knowledge of hardening tools and techniques |
14 |
|
K0859
|
Knowledge of encryption tools and techniques |
13 |
|
K0884
|
Knowledge of covert communication tools and techniques |
2 |
|
K0892
|
Knowledge of cyber defense laws and regulations |
13 |
|
K0899
|
Knowledge of crisis management protocols |
1 |
|
K0900
|
Knowledge of crisis management processes |
1 |
|
K0901
|
Knowledge of crisis management tools and techniques |
1 |
|
K0909
|
Knowledge of abnormal physical and physiological behaviors |
2 |
|
K0923
|
Knowledge of operating system structures and internals |
7 |
|
K0962
|
Knowledge of targeting laws and regulations |
11 |
|
K0963
|
Knowledge of exploitation laws and regulations |
11 |
|
K0969
|
Knowledge of cyber-attack tools and techniques |
7 |
|
K0983
|
Knowledge of computer networking principles and practices |
39 |
|
K1014
|
Knowledge of network security principles and practices |
40 |
|
K1079
|
Knowledge of web application security risks |
13 |
|
K1138
|
Knowledge of cybersecurity standards and best practices |
3 |
|
K1151
|
Knowledge of digital evidence cataloging tools and techniques |
4 |
|
K1152
|
Knowledge of digital evidence extraction tools and techniques |
4 |
|
K1153
|
Knowledge of digital evidence handling principles and practices |
3 |
|
K1154
|
Knowledge of digital evidence packaging tools and techniques |
4 |
|
K1155
|
Knowledge of digital evidence preservation tools and techniques |
4 |
|
K1205
|
Knowledge of required reporting formats |
3 |
|
K1312
|
Knowledge of human source tasking |
1 |
|
K1313
|
Knowledge of disruption, dismantlement, and deterrence strategies |
1 |
|
K1314
|
Knowledge of obfuscation tools and techniques |
1 |