|
K0068
|
Knowledge of programming language structures and logic |
7 |
|
K0674
|
Knowledge of computer networking protocols |
40 |
|
K0675
|
Knowledge of risk management processes |
41 |
|
K0676
|
Knowledge of cybersecurity laws and regulations |
41 |
|
K0677
|
Knowledge of cybersecurity policies and procedures |
41 |
|
K0678
|
Knowledge of privacy laws and regulations |
41 |
|
K0679
|
Knowledge of privacy policies and procedures |
41 |
|
K0680
|
Knowledge of cybersecurity principles and practices |
40 |
|
K0681
|
Knowledge of privacy principles and practices |
40 |
|
K0682
|
Knowledge of cybersecurity threats |
40 |
|
K0683
|
Knowledge of cybersecurity vulnerabilities |
40 |
|
K0684
|
Knowledge of cybersecurity threat characteristics |
40 |
|
K0685
|
Knowledge of access control principles and practices |
21 |
|
K0686
|
Knowledge of authentication and authorization tools and techniques |
21 |
|
K0688
|
Knowledge of common application vulnerabilities |
5 |
|
K0698
|
Knowledge of cryptographic key management principles and practices |
10 |
|
K0701
|
Knowledge of data backup and recovery policies and procedures |
8 |
|
K0710
|
Knowledge of enterprise cybersecurity architecture principles and practices |
20 |
|
K0716
|
Knowledge of host access control (HAC) systems and software |
10 |
|
K0717
|
Knowledge of network access control (NAC) systems and software |
10 |
|
K0728
|
Knowledge of Confidentiality, Integrity and Availability (CIA) principles and practices |
20 |
|
K0729
|
Knowledge of non-repudiation principles and practices |
20 |
|
K0730
|
Knowledge of cyber safety principles and practices |
20 |
|
K0742
|
Knowledge of identity and access management (IAM) principles and practices |
10 |
|
K0751
|
Knowledge of system threats |
40 |
|
K0752
|
Knowledge of system vulnerabilities |
40 |
|
K0760
|
Knowledge of server diagnostic tools and techniques |
6 |
|
K0761
|
Knowledge of Fault Detection and Diagnostics (FDD) tools and techniques |
5 |
|
K0770
|
Knowledge of system administration principles and practices |
14 |
|
K0778
|
Knowledge of enterprise information technology (IT) architecture principles and practices |
20 |
|
K0779
|
Knowledge of systems engineering processes |
14 |
|
K0783
|
Knowledge of network attack characteristics |
7 |
|
K0791
|
Knowledge of defense-in-depth principles and practices |
19 |
|
K0797
|
Knowledge of ethical hacking tools and techniques |
4 |
|
K0813
|
Knowledge of interpreted and compiled programming language characteristics |
7 |
|
K0832
|
Knowledge of cyberattack characteristics |
3 |
|
K0833
|
Knowledge of cyberattack actor characteristics |
4 |
|
K0837
|
Knowledge of hardening tools and techniques |
14 |
|
K0844
|
Knowledge of cyberattack stages |
4 |
|
K0845
|
Knowledge of cyber intrusion activity phases |
4 |
|
K0865
|
Knowledge of data classification standards and best practices |
18 |
|
K0866
|
Knowledge of data classification tools and techniques |
18 |
|
K0870
|
Knowledge of enterprise architecture (EA) reference models and frameworks |
20 |
|
K0871
|
Knowledge of enterprise architecture (EA) principles and practices |
20 |
|
K0879
|
Knowledge of industry cybersecurity models and frameworks |
9 |
|
K0880
|
Knowledge of access control models and frameworks |
9 |
|
K0882
|
Knowledge of ethical hacking principles and practices |
2 |
|
K0891
|
Knowledge of the Open Systems Interconnect (OSI) reference model |
13 |
|
K0915
|
Knowledge of network architecture principles and practices |
21 |
|
K0924
|
Knowledge of network analysis tools and techniques |
7 |
|
K0934
|
Knowledge of data classification policies and procedures |
18 |
|
K0939
|
Knowledge of packet-level analysis tools and techniques |
3 |
|
K0942
|
Knowledge of cryptology principles and practices |
10 |
|
K0955
|
Knowledge of penetration testing principles and practices |
8 |
|
K0956
|
Knowledge of penetration testing tools and techniques |
8 |
|
K0969
|
Knowledge of cyber-attack tools and techniques |
7 |
|
K0983
|
Knowledge of computer networking principles and practices |
39 |
|
K1014
|
Knowledge of network security principles and practices |
40 |
|
K1076
|
Knowledge of risk scoring principles and practices |
3 |
|
K1079
|
Knowledge of web application security risks |
13 |
|
K1087
|
Knowledge of social engineering tools and techniques |
2 |
|
K1129
|
Knowledge of cyber defense auditing laws and regulations |
1 |
|
K1130
|
Knowledge of cyber defense auditing policies and practices |
1 |
|
K1182
|
Knowledge of organizational cybersecurity policies and configurations |
3 |