|
K0018
|
Knowledge of encryption algorithms |
10 |
|
K0480
|
Knowledge of malware |
1 |
|
K0655
|
Knowledge of intelligence fusion |
2 |
|
K0658
|
Knowledge of cognitive biases |
2 |
|
K0674
|
Knowledge of computer networking protocols |
40 |
|
K0675
|
Knowledge of risk management processes |
41 |
|
K0676
|
Knowledge of cybersecurity laws and regulations |
41 |
|
K0677
|
Knowledge of cybersecurity policies and procedures |
41 |
|
K0678
|
Knowledge of privacy laws and regulations |
41 |
|
K0679
|
Knowledge of privacy policies and procedures |
41 |
|
K0680
|
Knowledge of cybersecurity principles and practices |
40 |
|
K0681
|
Knowledge of privacy principles and practices |
40 |
|
K0682
|
Knowledge of cybersecurity threats |
40 |
|
K0683
|
Knowledge of cybersecurity vulnerabilities |
40 |
|
K0684
|
Knowledge of cybersecurity threat characteristics |
40 |
|
K0689
|
Knowledge of network infrastructure principles and practices |
9 |
|
K0690
|
Knowledge of requirements analysis principles and practices |
6 |
|
K0697
|
Knowledge of encryption algorithm capabilities and applications |
3 |
|
K0718
|
Knowledge of network communications principles and practices |
10 |
|
K0719
|
Knowledge of human-computer interaction (HCI) principles and practices |
4 |
|
K0751
|
Knowledge of system threats |
40 |
|
K0752
|
Knowledge of system vulnerabilities |
40 |
|
K0766
|
Knowledge of data asset management principles and practices |
5 |
|
K0773
|
Knowledge of telecommunications principles and practices |
14 |
|
K0786
|
Knowledge of physical computer components |
4 |
|
K0787
|
Knowledge of computer peripherals |
4 |
|
K0788
|
Knowledge of adversarial tactics principles and practices |
3 |
|
K0789
|
Knowledge of adversarial tactics tools and techniques |
3 |
|
K0790
|
Knowledge of adversarial tactics policies and procedures |
3 |
|
K0792
|
Knowledge of network configurations |
9 |
|
K0806
|
Knowledge of machine virtualization tools and techniques |
6 |
|
K0812
|
Knowledge of digital communication systems and software |
9 |
|
K0818
|
Knowledge of new and emerging cybersecurity risks |
6 |
|
K0825
|
Knowledge of threat vector characteristics |
6 |
|
K0831
|
Knowledge of network attack vectors |
8 |
|
K0844
|
Knowledge of cyberattack stages |
4 |
|
K0845
|
Knowledge of cyber intrusion activity phases |
4 |
|
K0857
|
Knowledge of malware analysis tools and techniques |
4 |
|
K0858
|
Knowledge of virtual machine detection tools and techniques |
6 |
|
K0865
|
Knowledge of data classification standards and best practices |
18 |
|
K0866
|
Knowledge of data classification tools and techniques |
18 |
|
K0915
|
Knowledge of network architecture principles and practices |
21 |
|
K0916
|
Knowledge of malware analysis principles and practices |
4 |
|
K0925
|
Knowledge of wireless communication tools and techniques |
6 |
|
K0926
|
Knowledge of signal jamming tools and techniques |
6 |
|
K0934
|
Knowledge of data classification policies and procedures |
18 |
|
K0960
|
Knowledge of content management system (CMS) capabilities and applications |
1 |
|
K0969
|
Knowledge of cyber-attack tools and techniques |
7 |
|
K0983
|
Knowledge of computer networking principles and practices |
39 |
|
K0984
|
Knowledge of web security principles and practices |
1 |
|
K0989
|
Knowledge of intelligence information repositories |
1 |
|
K0990
|
Knowledge of cyber operations principles and practices |
8 |
|
K0994
|
Knowledge of denial and deception tools and techniques |
1 |
|
K1002
|
Knowledge of supervisory control and data acquisition (SCADA) systems and software |
1 |
|
K1005
|
Knowledge of intelligence collection capabilities and applications |
1 |
|
K1007
|
Knowledge of intelligence requirements tasking systems and software |
1 |
|
K1008
|
Knowledge of intelligence support activities |
1 |
|
K1009
|
Knowledge of threat intelligence principles and practices |
1 |
|
K1010
|
Knowledge of intelligence policies and procedures |
1 |
|
K1011
|
Knowledge of network addressing principles and practices |
1 |
|
K1014
|
Knowledge of network security principles and practices |
40 |
|
K1019
|
Knowledge of operations security (OPSEC) principles and practices |
2 |
|
K1025
|
Knowledge of decision-making policies and procedures |
2 |
|
K1028
|
Knowledge of target development principles and practices |
1 |
|
K1035
|
Knowledge of target research tools and techniques |
1 |
|
K1049
|
Knowledge of routing protocols |
3 |
|
K1059
|
Knowledge of request for information processes |
1 |
|
K1066
|
Knowledge of threat behaviors |
1 |
|
K1067
|
Knowledge of target behaviors |
1 |
|
K1068
|
Knowledge of threat systems and software |
1 |
|
K1069
|
Knowledge of virtual machine tools and technologies |
6 |
|
K1100
|
Knowledge of analytical tools and techniques |
4 |
|
K1101
|
Knowledge of analytics |
3 |
|
K1109
|
Knowledge of virtual collaborative workspace tools and techniques |
2 |
|
K1113
|
Knowledge of blue force tracking |
1 |
|
K1197
|
Knowledge of priority intelligence requirements |
2 |