|
K0635
|
Knowledge of decryption |
2 |
|
K0636
|
Knowledge of decryption tools and techniques |
3 |
|
K0637
|
Knowledge of data repositories |
2 |
|
K0656
|
Knowledge of network collection tools and techniques |
1 |
|
K0657
|
Knowledge of network collection policies and procedures |
1 |
|
K0674
|
Knowledge of computer networking protocols |
40 |
|
K0675
|
Knowledge of risk management processes |
41 |
|
K0676
|
Knowledge of cybersecurity laws and regulations |
41 |
|
K0677
|
Knowledge of cybersecurity policies and procedures |
41 |
|
K0678
|
Knowledge of privacy laws and regulations |
41 |
|
K0679
|
Knowledge of privacy policies and procedures |
41 |
|
K0682
|
Knowledge of cybersecurity threats |
40 |
|
K0683
|
Knowledge of cybersecurity vulnerabilities |
40 |
|
K0684
|
Knowledge of cybersecurity threat characteristics |
40 |
|
K0689
|
Knowledge of network infrastructure principles and practices |
9 |
|
K0707
|
Knowledge of database systems and software |
9 |
|
K0710
|
Knowledge of enterprise cybersecurity architecture principles and practices |
20 |
|
K0721
|
Knowledge of risk management principles and practices |
19 |
|
K0734
|
Knowledge of Risk Management Framework (RMF) requirements |
14 |
|
K0735
|
Knowledge of risk management models and frameworks |
13 |
|
K0751
|
Knowledge of system threats |
40 |
|
K0752
|
Knowledge of system vulnerabilities |
40 |
|
K0778
|
Knowledge of enterprise information technology (IT) architecture principles and practices |
20 |
|
K0784
|
Knowledge of insider threat laws and regulations |
7 |
|
K0785
|
Knowledge of insider threat tools and techniques |
7 |
|
K0802
|
Knowledge of chain of custody policies and procedures |
4 |
|
K0862
|
Knowledge of data remediation tools and techniques |
3 |
|
K0870
|
Knowledge of enterprise architecture (EA) reference models and frameworks |
20 |
|
K0871
|
Knowledge of enterprise architecture (EA) principles and practices |
20 |
|
K0909
|
Knowledge of abnormal physical and physiological behaviors |
2 |
|
K1014
|
Knowledge of network security principles and practices |
40 |
|
K1023
|
Knowledge of network exploitation tools and techniques |
3 |
|
K1031
|
Knowledge of risk mitigation tools and techniques |
1 |
|
K1085
|
Knowledge of exploitation tools and techniques |
1 |
|
K1096
|
Knowledge of data analysis tools and techniques |
3 |
|
K1151
|
Knowledge of digital evidence cataloging tools and techniques |
4 |
|
K1152
|
Knowledge of digital evidence extraction tools and techniques |
4 |
|
K1154
|
Knowledge of digital evidence packaging tools and techniques |
4 |
|
K1155
|
Knowledge of digital evidence preservation tools and techniques |
4 |
|
K1180
|
Knowledge of organizational cybersecurity goals and objectives |
11 |
|
K1188
|
Knowledge of organizational policies and procedures |
4 |
|
K1197
|
Knowledge of priority intelligence requirements |
2 |
|
K1209
|
Knowledge of risk mitigation principles and practices |
4 |
|
K1241
|
Knowledge of cultural, political, and organizational assets |
1 |
|
K1242
|
Knowledge of cybersecurity review processes and procedures |
1 |
|
K1243
|
Knowledge of cybersecurity threat remediation principles and practices |
1 |
|
K1244
|
Knowledge of cybersecurity tools and techniques |
1 |
|
K1245
|
Knowledge of data exfiltration tools and techniques |
1 |
|
K1246
|
Knowledge of data handling tools and techniques |
1 |
|
K1247
|
Knowledge of data monitoring tools and techniques |
1 |
|
K1248
|
Knowledge of digital and physical security vulnerabilities |
1 |
|
K1249
|
Knowledge of digital and physical security vulnerability remediation principles and practices |
1 |
|
K1250
|
Knowledge of external organization roles and responsibilities |
1 |
|
K1251
|
Knowledge of external referrals policies and procedures |
1 |
|
K1252
|
Knowledge of high value asset characteristics |
1 |
|
K1254
|
Knowledge of insider threat hub policies and procedures |
1 |
|
K1255
|
Knowledge of insider threat hub operations |
1 |
|
K1256
|
Knowledge of insider threat operational indicators |
1 |
|
K1257
|
Knowledge of insider threat policies and procedures |
1 |
|
K1258
|
Knowledge of insider threat tactics |
1 |
|
K1259
|
Knowledge of insider threat targets |
1 |
|
K1260
|
Knowledge of intelligence laws and regulations |
1 |
|
K1261
|
Knowledge of known insider attacks |
1 |
|
K1262
|
Knowledge of network endpoints |
1 |
|
K1263
|
Knowledge of notification policies and procedures |
1 |
|
K1265
|
Knowledge of organizational objectives, resources, and capabilities |
1 |
|
K1267
|
Knowledge of previously referred potential insider threats |
1 |
|
K1268
|
Knowledge of risk reduction metrics |
1 |
|
K1269
|
Knowledge of security information and event management (SIEM) tools and techniques |
1 |
|
K1270
|
Knowledge of suspicious activity response processes |
1 |
|
K1271
|
Knowledge of system alert policies and procedures |
1 |
|
K1272
|
Knowledge of system components |
1 |
|
K1273
|
Knowledge of threat investigation policies and procedures |
1 |
|
K1274
|
Knowledge of threat modeling tools and techniques |
1 |
|
K1275
|
Knowledge of User Activity Monitoring (UAM) tools and techniques |
1 |