|
K0001
|
Knowledge of computer networking concepts and protocols, and network security methodologies. |
52 |
|
K0002
|
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
52 |
|
K0003
|
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. |
52 |
|
K0004
|
Knowledge of cybersecurity and privacy principles. |
52 |
|
K0005
|
Knowledge of cyber threats and vulnerabilities. |
52 |
|
K0006
|
Knowledge of specific operational impacts of cybersecurity lapses. |
52 |
|
K0007
|
Knowledge of authentication, authorization, and access control methods. |
4 |
|
K0008
|
Knowledge of applicable business processes and operations of customer organizations. |
5 |
|
K0009
|
Knowledge of application vulnerabilities. |
6 |
|
K0010
|
Knowledge of communication methods, principles, and concepts that support the network infrastructure. |
3 |
|
K0011
|
Knowledge of capabilities and applications of network equipment including routers, switches, bridges, servers, transmission media, and related hardware. |
3 |
|
K0012
|
Knowledge of capabilities and requirements analysis. |
3 |
|
K0013
|
Knowledge of cyber defense and vulnerability assessment tools and their capabilities. |
5 |
|
K0015
|
Knowledge of computer algorithms. |
6 |
|
K0018
|
Knowledge of encryption algorithms |
11 |
|
K0019
|
Knowledge of cryptography and cryptographic key management concepts |
8 |
|
K0024
|
Knowledge of database systems. |
7 |
|
K0026
|
Knowledge of business continuity and disaster recovery continuity of operations plans. |
5 |
|
K0027
|
Knowledge of organization's enterprise information security architecture. |
9 |
|
K0030
|
Knowledge of electrical engineering as applied to computer architecture (e.g., circuit boards, processors, chips, and computer hardware). |
4 |
|
K0035
|
Knowledge of installation, integration, and optimization of system components. |
6 |
|
K0036
|
Knowledge of human-computer interaction principles. |
12 |
|
K0037
|
Knowledge of Security Assessment and Authorization process. |
5 |
|
K0043
|
Knowledge of industry-standard and organizationally accepted analysis principles and methods. |
7 |
|
K0044
|
Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
14 |
|
K0052
|
Knowledge of mathematics (e.g. logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis). |
6 |
|
K0055
|
Knowledge of microprocessors. |
4 |
|
K0056
|
Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML). |
11 |
|
K0057
|
Knowledge of network hardware devices and functions. |
2 |
|
K0059
|
Knowledge of new and emerging information technology (IT) and cybersecurity technologies. |
12 |
|
K0060
|
Knowledge of operating systems. |
13 |
|
K0061
|
Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). |
11 |
|
K0063
|
Knowledge of parallel and distributed computing concepts. |
6 |
|
K0071
|
Knowledge of remote access technology concepts. |
2 |
|
K0074
|
Knowledge of key concepts in security management (e.g., Release Management, Patch Management). |
4 |
|
K0082
|
Knowledge of software engineering. |
7 |
|
K0091
|
Knowledge of systems testing and evaluation methods. |
6 |
|
K0092
|
Knowledge of technology integration processes. |
2 |
|
K0093
|
Knowledge of telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing). |
8 |
|
K0102
|
Knowledge of the systems engineering process. |
7 |
|
K0170
|
Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations. |
12 |
|
K0180
|
Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
9 |
|
K0198
|
Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions). |
6 |
|
K0200
|
Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). |
11 |
|
K0202
|
Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing). |
4 |
|
K0211
|
Knowledge of confidentiality, integrity, and availability requirements. |
2 |
|
K0212
|
Knowledge of cybersecurity-enabled software products. |
4 |
|
K0214
|
Knowledge of the Risk Management Framework Assessment Methodology. |
2 |
|
K0227
|
Knowledge of various types of computer architectures. |
4 |
|
K0240
|
Knowledge of multi-level security systems and cross domain solutions. |
2 |
|
K0260
|
Knowledge of Personally Identifiable Information (PII) data security standards. |
16 |
|
K0261
|
Knowledge of Payment Card Industry (PCI) data security standards. |
17 |
|
K0262
|
Knowledge of Personal Health Information (PHI) data security standards. |
17 |
|
K0264
|
Knowledge of program protection planning (e.g. information technology (IT) supply chain security/risk management policies, anti-tampering techniques, and requirements). |
2 |
|
K0275
|
Knowledge of configuration management techniques. |
3 |
|
K0277
|
Knowledge of current and emerging data encryption (e.g., Column and Tablespace Encryption, file and disk encryption) security features in databases (e.g. built-in cryptographic key management features). |
2 |
|
K0286
|
Knowledge of N-tiered typologies (e.g. including server and client operating systems). |
2 |
|
K0287
|
Knowledge of an organization's information classification program and procedures for information compromise. |
18 |
|
K0291
|
Knowledge of the enterprise information technology (IT) architectural concepts and patterns (e.g., baseline, validated design, and target architectures.) |
2 |
|
K0293
|
Knowledge of integrating the organization’s goals and objectives into the architecture. |
2 |
|
K0320
|
Knowledge of organization's evaluation and validation criteria. |
1 |
|
K0322
|
Knowledge of embedded systems. |
10 |
|
K0323
|
Knowledge of system fault tolerance methodologies. |
2 |
|
K0325
|
Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression). |
6 |
|
K0326
|
Knowledge of demilitarized zones. |
2 |
|
K0332
|
Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
14 |
|
K0333
|
Knowledge of network design processes, to include understanding of security objectives, operational objectives, and trade-offs. |
6 |
|
K0336
|
Knowledge of access authentication methods. |
3 |
|
K0374
|
WITHDRAWN: Knowledge of basic structure, architecture, and design of modern digital and telephony networks. (See K0599) |
1 |
|
K0565
|
Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. |
11 |