|
K0001
|
Knowledge of computer networking concepts and protocols, and network security methodologies. |
52 |
|
K0002
|
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
52 |
|
K0003
|
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. |
52 |
|
K0004
|
Knowledge of cybersecurity and privacy principles. |
52 |
|
K0005
|
Knowledge of cyber threats and vulnerabilities. |
52 |
|
K0006
|
Knowledge of specific operational impacts of cybersecurity lapses. |
52 |
|
K0024
|
Knowledge of database systems. |
7 |
|
K0027
|
Knowledge of organization's enterprise information security architecture. |
9 |
|
K0028
|
Knowledge of organization's evaluation and validation requirements. |
8 |
|
K0030
|
Knowledge of electrical engineering as applied to computer architecture (e.g., circuit boards, processors, chips, and computer hardware). |
4 |
|
K0035
|
Knowledge of installation, integration, and optimization of system components. |
6 |
|
K0037
|
Knowledge of Security Assessment and Authorization process. |
5 |
|
K0043
|
Knowledge of industry-standard and organizationally accepted analysis principles and methods. |
7 |
|
K0044
|
Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
14 |
|
K0052
|
Knowledge of mathematics (e.g. logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis). |
6 |
|
K0056
|
Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML). |
11 |
|
K0060
|
Knowledge of operating systems. |
13 |
|
K0061
|
Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). |
11 |
|
K0063
|
Knowledge of parallel and distributed computing concepts. |
6 |
|
K0074
|
Knowledge of key concepts in security management (e.g., Release Management, Patch Management). |
4 |
|
K0075
|
Knowledge of security system design tools, methods, and techniques. |
3 |
|
K0082
|
Knowledge of software engineering. |
7 |
|
K0091
|
Knowledge of systems testing and evaluation methods. |
6 |
|
K0093
|
Knowledge of telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing). |
8 |
|
K0102
|
Knowledge of the systems engineering process. |
7 |
|
K0170
|
Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations. |
12 |
|
K0179
|
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
19 |
|
K0180
|
Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
9 |
|
K0198
|
Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions). |
6 |
|
K0200
|
Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). |
11 |
|
K0203
|
Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). |
10 |
|
K0207
|
Knowledge of circuit analysis. |
2 |
|
K0211
|
Knowledge of confidentiality, integrity, and availability requirements. |
2 |
|
K0212
|
Knowledge of cybersecurity-enabled software products. |
4 |
|
K0214
|
Knowledge of the Risk Management Framework Assessment Methodology. |
2 |
|
K0227
|
Knowledge of various types of computer architectures. |
4 |
|
K0240
|
Knowledge of multi-level security systems and cross domain solutions. |
2 |
|
K0264
|
Knowledge of program protection planning (e.g. information technology (IT) supply chain security/risk management policies, anti-tampering techniques, and requirements). |
2 |
|
K0275
|
Knowledge of configuration management techniques. |
3 |
|
K0286
|
Knowledge of N-tiered typologies (e.g. including server and client operating systems). |
2 |
|
K0287
|
Knowledge of an organization's information classification program and procedures for information compromise. |
18 |
|
K0291
|
Knowledge of the enterprise information technology (IT) architectural concepts and patterns (e.g., baseline, validated design, and target architectures.) |
2 |
|
K0293
|
Knowledge of integrating the organization’s goals and objectives into the architecture. |
2 |
|
K0299
|
Knowledge in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. |
1 |
|
K0322
|
Knowledge of embedded systems. |
10 |
|
K0323
|
Knowledge of system fault tolerance methodologies. |
2 |
|
K0325
|
Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression). |
6 |
|
K0326
|
Knowledge of demilitarized zones. |
2 |
|
K0332
|
Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
14 |
|
K0333
|
Knowledge of network design processes, to include understanding of security objectives, operational objectives, and trade-offs. |
6 |
|
K0487
|
Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
4 |
|
K0516
|
Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
10 |