|
K0001
|
Knowledge of computer networking concepts and protocols, and network security methodologies. |
52 |
|
K0002
|
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
52 |
|
K0003
|
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. |
52 |
|
K0004
|
Knowledge of cybersecurity and privacy principles. |
52 |
|
K0005
|
Knowledge of cyber threats and vulnerabilities. |
52 |
|
K0006
|
Knowledge of specific operational impacts of cybersecurity lapses. |
52 |
|
K0007
|
Knowledge of authentication, authorization, and access control methods. |
4 |
|
K0013
|
Knowledge of cyber defense and vulnerability assessment tools and their capabilities. |
5 |
|
K0015
|
Knowledge of computer algorithms. |
6 |
|
K0018
|
Knowledge of encryption algorithms |
11 |
|
K0019
|
Knowledge of cryptography and cryptographic key management concepts |
8 |
|
K0024
|
Knowledge of database systems. |
7 |
|
K0033
|
Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists). |
5 |
|
K0040
|
Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins). |
5 |
|
K0042
|
Knowledge of incident response and handling methodologies. |
7 |
|
K0044
|
Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
14 |
|
K0046
|
Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions. |
4 |
|
K0049
|
Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). |
8 |
|
K0056
|
Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML). |
11 |
|
K0058
|
Knowledge of network traffic analysis methods. |
10 |
|
K0059
|
Knowledge of new and emerging information technology (IT) and cybersecurity technologies. |
12 |
|
K0060
|
Knowledge of operating systems. |
13 |
|
K0061
|
Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). |
11 |
|
K0065
|
Knowledge of policy-based and risk adaptive access controls. |
5 |
|
K0070
|
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
13 |
|
K0074
|
Knowledge of key concepts in security management (e.g., Release Management, Patch Management). |
4 |
|
K0075
|
Knowledge of security system design tools, methods, and techniques. |
3 |
|
K0093
|
Knowledge of telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing). |
8 |
|
K0098
|
Knowledge of the cyber defense Service Provider reporting structure and processes within one’s own organization. |
2 |
|
K0104
|
Knowledge of Virtual Private Network (VPN) security. |
4 |
|
K0106
|
Knowledge of what constitutes a network attack and a network attack’s relationship to both threats and vulnerabilities. |
6 |
|
K0107
|
Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations. |
4 |
|
K0110
|
Knowledge of adversarial tactics, techniques, and procedures. |
2 |
|
K0111
|
Knowledge of network tools (e.g., ping, traceroute, nslookup) |
2 |
|
K0112
|
Knowledge of defense-in-depth principles and network security architecture. |
1 |
|
K0113
|
Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN). |
2 |
|
K0116
|
Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip). |
2 |
|
K0139
|
Knowledge of interpreted and compiled computer languages. |
8 |
|
K0142
|
Knowledge of collection management processes, capabilities, and limitations. |
4 |
|
K0143
|
Knowledge of front-end collection systems, including traffic collection, filtering, and selection. |
3 |
|
K0157
|
Knowledge of cyber defense and information security policies, procedures, and regulations. |
4 |
|
K0160
|
Knowledge of the common attack vectors on the network layer. |
2 |
|
K0161
|
Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). |
3 |
|
K0162
|
Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored). |
3 |
|
K0167
|
Knowledge of system administration, network, and operating system hardening techniques. |
7 |
|
K0168
|
Knowledge of applicable laws, statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures. |
11 |
|
K0177
|
Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). |
12 |
|
K0179
|
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
19 |
|
K0180
|
Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
9 |
|
K0190
|
Knowledge of encryption methodologies. |
1 |
|
K0191
|
Knowledge of signature implementation impact for viruses, malware, and attacks. |
1 |
|
K0192
|
Knowledge of Windows/Unix ports and services. |
1 |
|
K0203
|
Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). |
10 |
|
K0221
|
Knowledge of OSI model and underlying network protocols (e.g., TCP/IP). |
3 |
|
K0222
|
Knowledge of relevant laws, legal authorities, restrictions, and regulations pertaining to cyber defense activities. |
1 |
|
K0260
|
Knowledge of Personally Identifiable Information (PII) data security standards. |
16 |
|
K0261
|
Knowledge of Payment Card Industry (PCI) data security standards. |
17 |
|
K0262
|
Knowledge of Personal Health Information (PHI) data security standards. |
17 |
|
K0290
|
Knowledge of systems security testing and evaluation methods. |
2 |
|
K0297
|
Knowledge of countermeasure design for identified security risks. |
4 |
|
K0300
|
Knowledge of network mapping and recreating network topologies. |
1 |
|
K0301
|
Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump). |
3 |
|
K0303
|
Knowledge of the use of sub-netting tools. |
1 |
|
K0318
|
Knowledge of operating system command-line tools. |
2 |
|
K0322
|
Knowledge of embedded systems. |
10 |
|
K0324
|
Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications. |
2 |
|
K0332
|
Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
14 |
|
K0339
|
Knowledge of how to use network analysis tools to identify vulnerabilities. |
2 |
|
K0342
|
Knowledge of penetration testing principles, tools, and techniques. |
8 |
|
K0624
|
Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list) |
13 |