|
K0640
|
Knowledge of the organizational cybersecurity workforce |
2 |
|
K0644
|
Knowledge of cybersecurity operation policies and procedures |
5 |
|
K0674
|
Knowledge of computer networking protocols |
40 |
|
K0675
|
Knowledge of risk management processes |
41 |
|
K0676
|
Knowledge of cybersecurity laws and regulations |
41 |
|
K0677
|
Knowledge of cybersecurity policies and procedures |
41 |
|
K0678
|
Knowledge of privacy laws and regulations |
41 |
|
K0679
|
Knowledge of privacy policies and procedures |
41 |
|
K0680
|
Knowledge of cybersecurity principles and practices |
40 |
|
K0681
|
Knowledge of privacy principles and practices |
40 |
|
K0682
|
Knowledge of cybersecurity threats |
40 |
|
K0683
|
Knowledge of cybersecurity vulnerabilities |
40 |
|
K0684
|
Knowledge of cybersecurity threat characteristics |
40 |
|
K0685
|
Knowledge of access control principles and practices |
21 |
|
K0686
|
Knowledge of authentication and authorization tools and techniques |
21 |
|
K0691
|
Knowledge of cyber defense tools and techniques |
7 |
|
K0692
|
Knowledge of vulnerability assessment tools and techniques |
7 |
|
K0698
|
Knowledge of cryptographic key management principles and practices |
10 |
|
K0710
|
Knowledge of enterprise cybersecurity architecture principles and practices |
20 |
|
K0711
|
Knowledge of evaluation and validation principles and practices |
7 |
|
K0720
|
Knowledge of Assessment and Authorization (A&A) processes |
5 |
|
K0721
|
Knowledge of risk management principles and practices |
19 |
|
K0723
|
Knowledge of vulnerability data sources |
5 |
|
K0728
|
Knowledge of Confidentiality, Integrity and Availability (CIA) principles and practices |
20 |
|
K0729
|
Knowledge of non-repudiation principles and practices |
20 |
|
K0730
|
Knowledge of cyber safety principles and practices |
20 |
|
K0734
|
Knowledge of Risk Management Framework (RMF) requirements |
14 |
|
K0735
|
Knowledge of risk management models and frameworks |
13 |
|
K0736
|
Knowledge of information technology (IT) security principles and practices |
18 |
|
K0743
|
Knowledge of new and emerging technologies |
15 |
|
K0746
|
Knowledge of policy-based access controls |
15 |
|
K0747
|
Knowledge of Risk Adaptive (Adaptable) Access Controls (RAdAC) |
15 |
|
K0751
|
Knowledge of system threats |
40 |
|
K0752
|
Knowledge of system vulnerabilities |
40 |
|
K0760
|
Knowledge of server diagnostic tools and techniques |
6 |
|
K0761
|
Knowledge of Fault Detection and Diagnostics (FDD) tools and techniques |
5 |
|
K0767
|
Knowledge of structured analysis principles and practices |
5 |
|
K0778
|
Knowledge of enterprise information technology (IT) architecture principles and practices |
20 |
|
K0784
|
Knowledge of insider threat laws and regulations |
7 |
|
K0785
|
Knowledge of insider threat tools and techniques |
7 |
|
K0791
|
Knowledge of defense-in-depth principles and practices |
19 |
|
K0800
|
Knowledge of evidence admissibility laws and regulations |
7 |
|
K0803
|
Knowledge of supply chain risk management principles and practices |
17 |
|
K0819
|
Knowledge of import and export control laws and regulations |
8 |
|
K0820
|
Knowledge of supply chain risks |
18 |
|
K0821
|
Knowledge of federal agency roles and responsibilities |
9 |
|
K0828
|
Knowledge of supply chain risk management standards and best practices |
16 |
|
K0834
|
Knowledge of technology procurement principles and practices |
11 |
|
K0838
|
Knowledge of supply chain risk management policies and procedures |
13 |
|
K0839
|
Knowledge of critical infrastructure systems and software |
13 |
|
K0859
|
Knowledge of encryption tools and techniques |
13 |
|
K0870
|
Knowledge of enterprise architecture (EA) reference models and frameworks |
20 |
|
K0871
|
Knowledge of enterprise architecture (EA) principles and practices |
20 |
|
K0877
|
Knowledge of application firewall principles and practices |
12 |
|
K0878
|
Knowledge of network firewall principles and practices |
12 |
|
K0879
|
Knowledge of industry cybersecurity models and frameworks |
9 |
|
K0880
|
Knowledge of access control models and frameworks |
9 |
|
K0892
|
Knowledge of cyber defense laws and regulations |
13 |
|
K0915
|
Knowledge of network architecture principles and practices |
21 |
|
K0917
|
Knowledge of Personally Identifiable Information (PII) data security standards and best practices |
15 |
|
K0918
|
Knowledge of Payment Card Industry (PCI) data security standards and best practices |
16 |
|
K0919
|
Knowledge of Personal Health Information (PHI) data security standards and best practices |
16 |
|
K0942
|
Knowledge of cryptology principles and practices |
10 |
|
K0948
|
Knowledge of embedded systems and software |
9 |
|
K0955
|
Knowledge of penetration testing principles and practices |
8 |
|
K0956
|
Knowledge of penetration testing tools and techniques |
8 |
|
K0962
|
Knowledge of targeting laws and regulations |
11 |
|
K0963
|
Knowledge of exploitation laws and regulations |
11 |
|
K0983
|
Knowledge of computer networking principles and practices |
39 |
|
K0990
|
Knowledge of cyber operations principles and practices |
8 |
|
K1014
|
Knowledge of network security principles and practices |
40 |
|
K1050
|
Knowledge of critical information requirements |
8 |
|
K1077
|
Knowledge of data security controls |
6 |
|
K1079
|
Knowledge of web application security risks |
13 |
|
K1084
|
Knowledge of data privacy controls |
6 |