|
K0001
|
Knowledge of computer networking concepts and protocols, and network security methodologies. |
52 |
|
K0002
|
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
52 |
|
K0003
|
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. |
52 |
|
K0004
|
Knowledge of cybersecurity and privacy principles. |
52 |
|
K0005
|
Knowledge of cyber threats and vulnerabilities. |
52 |
|
K0006
|
Knowledge of specific operational impacts of cybersecurity lapses. |
52 |
|
K0018
|
Knowledge of encryption algorithms |
11 |
|
K0026
|
Knowledge of business continuity and disaster recovery continuity of operations plans. |
5 |
|
K0038
|
Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data. |
6 |
|
K0042
|
Knowledge of incident response and handling methodologies. |
7 |
|
K0090
|
Knowledge of system life cycle management principles, including software security and usability. |
10 |
|
K0101
|
Knowledge of the organization’s enterprise information technology (IT) goals and objectives. |
8 |
|
K0121
|
Knowledge of information security program management and project management principles and techniques. |
2 |
|
K0126
|
Knowledge of Supply Chain Risk Management Practices (NIST SP 800-161) |
14 |
|
K0163
|
Knowledge of critical information technology (IT) procurement requirements. |
3 |
|
K0267
|
Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures. |
8 |
|
K0285
|
Knowledge of implementing enterprise key escrow systems to support data-at-rest encryption. |
2 |
|
K0287
|
Knowledge of an organization's information classification program and procedures for information compromise. |
18 |
|
K0622
|
Knowledge of controls related to the use, processing, storage, and transmission of data. |
6 |