|
K0001
|
Knowledge of computer networking concepts and protocols, and network security methodologies. |
52 |
|
K0002
|
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
52 |
|
K0003
|
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. |
52 |
|
K0004
|
Knowledge of cybersecurity and privacy principles. |
52 |
|
K0005
|
Knowledge of cyber threats and vulnerabilities. |
52 |
|
K0006
|
Knowledge of specific operational impacts of cybersecurity lapses. |
52 |
|
K0021
|
Knowledge of data backup and recovery. |
9 |
|
K0026
|
Knowledge of business continuity and disaster recovery continuity of operations plans. |
5 |
|
K0033
|
Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists). |
5 |
|
K0034
|
Knowledge of network services and protocols interactions that provide network communications. |
1 |
|
K0041
|
Knowledge of incident categories, incident responses, and timelines for responses. |
1 |
|
K0042
|
Knowledge of incident response and handling methodologies. |
7 |
|
K0046
|
Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions. |
4 |
|
K0058
|
Knowledge of network traffic analysis methods. |
10 |
|
K0062
|
Knowledge of packet-level analysis. |
2 |
|
K0070
|
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
13 |
|
K0106
|
Knowledge of what constitutes a network attack and a network attackās relationship to both threats and vulnerabilities. |
6 |
|
K0157
|
Knowledge of cyber defense and information security policies, procedures, and regulations. |
4 |
|
K0161
|
Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). |
3 |
|
K0162
|
Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored). |
3 |
|
K0167
|
Knowledge of system administration, network, and operating system hardening techniques. |
7 |
|
K0177
|
Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). |
12 |
|
K0179
|
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
19 |
|
K0221
|
Knowledge of OSI model and underlying network protocols (e.g., TCP/IP). |
3 |
|
K0230
|
Knowledge of cloud service models and how those models can limit incident response. |
1 |
|
K0259
|
Knowledge of malware analysis concepts and methodologies. |
1 |
|
K0287
|
Knowledge of an organization's information classification program and procedures for information compromise. |
18 |
|
K0332
|
Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
14 |
|
K0565
|
Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. |
11 |
|
K0624
|
Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list) |
13 |