|
K0001
|
Knowledge of computer networking concepts and protocols, and network security methodologies. |
52 |
|
K0002
|
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
52 |
|
K0003
|
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. |
52 |
|
K0004
|
Knowledge of cybersecurity and privacy principles. |
52 |
|
K0005
|
Knowledge of cyber threats and vulnerabilities. |
52 |
|
K0006
|
Knowledge of specific operational impacts of cybersecurity lapses. |
52 |
|
K0015
|
Knowledge of computer algorithms. |
6 |
|
K0018
|
Knowledge of encryption algorithms |
11 |
|
K0019
|
Knowledge of cryptography and cryptographic key management concepts |
8 |
|
K0024
|
Knowledge of database systems. |
7 |
|
K0035
|
Knowledge of installation, integration, and optimization of system components. |
6 |
|
K0036
|
Knowledge of human-computer interaction principles. |
12 |
|
K0040
|
Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins). |
5 |
|
K0044
|
Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
14 |
|
K0049
|
Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). |
8 |
|
K0052
|
Knowledge of mathematics (e.g. logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis). |
6 |
|
K0056
|
Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML). |
11 |
|
K0060
|
Knowledge of operating systems. |
13 |
|
K0061
|
Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). |
11 |
|
K0063
|
Knowledge of parallel and distributed computing concepts. |
6 |
|
K0075
|
Knowledge of security system design tools, methods, and techniques. |
3 |
|
K0082
|
Knowledge of software engineering. |
7 |
|
K0093
|
Knowledge of telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing). |
8 |
|
K0102
|
Knowledge of the systems engineering process. |
7 |
|
K0179
|
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
19 |
|
K0180
|
Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
9 |
|
K0200
|
Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). |
11 |
|
K0203
|
Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). |
10 |
|
K0227
|
Knowledge of various types of computer architectures. |
4 |
|
K0260
|
Knowledge of Personally Identifiable Information (PII) data security standards. |
16 |
|
K0261
|
Knowledge of Payment Card Industry (PCI) data security standards. |
17 |
|
K0262
|
Knowledge of Personal Health Information (PHI) data security standards. |
17 |
|
K0263
|
Knowledge of information technology (IT) risk management policies, requirements, and procedures. |
3 |
|
K0266
|
Knowledge of how to evaluate the trustworthiness of the supplier and/or product. |
1 |
|
K0267
|
Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures. |
8 |
|
K0275
|
Knowledge of configuration management techniques. |
3 |
|
K0276
|
Knowledge of security management. |
3 |
|
K0281
|
Knowledge of information technology (IT) service catalogues. |
1 |
|
K0284
|
Knowledge of developing and applying user credential management system. |
1 |
|
K0285
|
Knowledge of implementing enterprise key escrow systems to support data-at-rest encryption. |
2 |
|
K0287
|
Knowledge of an organization's information classification program and procedures for information compromise. |
18 |
|
K0290
|
Knowledge of systems security testing and evaluation methods. |
2 |
|
K0297
|
Knowledge of countermeasure design for identified security risks. |
4 |
|
K0322
|
Knowledge of embedded systems. |
10 |
|
K0333
|
Knowledge of network design processes, to include understanding of security objectives, operational objectives, and trade-offs. |
6 |
|
K0339
|
Knowledge of how to use network analysis tools to identify vulnerabilities. |
2 |