|
K0001
|
Knowledge of computer networking concepts and protocols, and network security methodologies. |
52 |
|
K0002
|
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
52 |
|
K0003
|
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. |
52 |
|
K0004
|
Knowledge of cybersecurity and privacy principles. |
52 |
|
K0005
|
Knowledge of cyber threats and vulnerabilities. |
52 |
|
K0006
|
Knowledge of specific operational impacts of cybersecurity lapses. |
52 |
|
K0008
|
Knowledge of applicable business processes and operations of customer organizations. |
5 |
|
K0018
|
Knowledge of encryption algorithms |
11 |
|
K0021
|
Knowledge of data backup and recovery. |
9 |
|
K0026
|
Knowledge of business continuity and disaster recovery continuity of operations plans. |
5 |
|
K0033
|
Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists). |
5 |
|
K0038
|
Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data. |
6 |
|
K0040
|
Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins). |
5 |
|
K0042
|
Knowledge of incident response and handling methodologies. |
7 |
|
K0043
|
Knowledge of industry-standard and organizationally accepted analysis principles and methods. |
7 |
|
K0046
|
Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions. |
4 |
|
K0048
|
Knowledge of Risk Management Framework (RMF) requirements. |
8 |
|
K0053
|
Knowledge of measures or indicators of system performance and availability. |
4 |
|
K0054
|
Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities. |
3 |
|
K0058
|
Knowledge of network traffic analysis methods. |
10 |
|
K0059
|
Knowledge of new and emerging information technology (IT) and cybersecurity technologies. |
12 |
|
K0061
|
Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). |
11 |
|
K0070
|
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
13 |
|
K0072
|
Knowledge of resource management principles and techniques. |
7 |
|
K0076
|
Knowledge of server administration and systems engineering theories, concepts, and methods. |
2 |
|
K0077
|
Knowledge of server and client operating systems. |
4 |
|
K0087
|
Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design. |
4 |
|
K0090
|
Knowledge of system life cycle management principles, including software security and usability. |
10 |
|
K0092
|
Knowledge of technology integration processes. |
2 |
|
K0101
|
Knowledge of the organization’s enterprise information technology (IT) goals and objectives. |
8 |
|
K0106
|
Knowledge of what constitutes a network attack and a network attack’s relationship to both threats and vulnerabilities. |
6 |
|
K0121
|
Knowledge of information security program management and project management principles and techniques. |
2 |
|
K0126
|
Knowledge of Supply Chain Risk Management Practices (NIST SP 800-161) |
14 |
|
K0149
|
Knowledge of organization's risk tolerance and/or risk management approach. |
1 |
|
K0150
|
Knowledge of enterprise incident response program, roles, and responsibilities. |
2 |
|
K0151
|
Knowledge of current and emerging threats/threat vectors. |
1 |
|
K0163
|
Knowledge of critical information technology (IT) procurement requirements. |
3 |
|
K0167
|
Knowledge of system administration, network, and operating system hardening techniques. |
7 |
|
K0168
|
Knowledge of applicable laws, statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures. |
11 |
|
K0169
|
Knowledge of information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures. |
14 |
|
K0170
|
Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations. |
12 |
|
K0179
|
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
19 |
|
K0180
|
Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
9 |
|
K0199
|
Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zachman, Federal Enterprise Architecture [FEA]). |
6 |
|
K0260
|
Knowledge of Personally Identifiable Information (PII) data security standards. |
16 |
|
K0261
|
Knowledge of Payment Card Industry (PCI) data security standards. |
17 |
|
K0262
|
Knowledge of Personal Health Information (PHI) data security standards. |
17 |
|
K0267
|
Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures. |
8 |
|
K0287
|
Knowledge of an organization's information classification program and procedures for information compromise. |
18 |
|
K0332
|
Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
14 |
|
K0342
|
Knowledge of penetration testing principles, tools, and techniques. |
8 |
|
K0622
|
Knowledge of controls related to the use, processing, storage, and transmission of data. |
6 |
|
K0624
|
Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list) |
13 |