|
K0001
|
Knowledge of computer networking concepts and protocols, and network security methodologies. |
52 |
|
K0002
|
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
52 |
|
K0003
|
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. |
52 |
|
K0004
|
Knowledge of cybersecurity and privacy principles. |
52 |
|
K0005
|
Knowledge of cyber threats and vulnerabilities. |
52 |
|
K0006
|
Knowledge of specific operational impacts of cybersecurity lapses. |
52 |
|
K0014
|
Knowledge of complex data structures. |
2 |
|
K0016
|
Knowledge of computer programming principles |
3 |
|
K0027
|
Knowledge of organization's enterprise information security architecture. |
9 |
|
K0028
|
Knowledge of organization's evaluation and validation requirements. |
8 |
|
K0039
|
Knowledge of cybersecurity and privacy principles and methods that apply to software development. |
2 |
|
K0044
|
Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
14 |
|
K0050
|
Knowledge of local area and wide area networking principles and concepts including bandwidth management. |
6 |
|
K0051
|
Knowledge of low-level computer languages (e.g., assembly languages). |
4 |
|
K0060
|
Knowledge of operating systems. |
13 |
|
K0066
|
Knowledge of Privacy Impact Assessments. |
6 |
|
K0068
|
Knowledge of programming language structures and logic. |
4 |
|
K0070
|
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
13 |
|
K0073
|
Knowledge of secure configuration management techniques. (e.g., Security Technical Implementation Guides (STIGs), cybersecurity best practices on cisecurity.org). |
5 |
|
K0079
|
Knowledge of software debugging principles. |
2 |
|
K0080
|
Knowledge of software design tools, methods, and techniques. |
2 |
|
K0081
|
Knowledge of software development models (e.g., Waterfall Model, Spiral Model). |
4 |
|
K0082
|
Knowledge of software engineering. |
7 |
|
K0084
|
Knowledge of structured analysis principles and methods. |
6 |
|
K0086
|
Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools. |
5 |
|
K0105
|
Knowledge of web services (e.g., service-oriented architecture, Simple Object Access Protocol, and web service description language). |
2 |
|
K0139
|
Knowledge of interpreted and compiled computer languages. |
8 |
|
K0140
|
Knowledge of secure coding techniques. |
3 |
|
K0152
|
Knowledge of software related information technology (IT) security principles and methods (e.g., modularization, layering, abstraction, data hiding, simplicity/minimization). |
2 |
|
K0153
|
Knowledge of software quality assurance process. |
2 |
|
K0154
|
Knowledge of supply chain risk management standards, processes, and practices. |
7 |
|
K0170
|
Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations. |
12 |
|
K0178
|
Knowledge of secure software deployment methodologies, tools, and practices. |
1 |
|
K0179
|
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
19 |
|
K0199
|
Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zachman, Federal Enterprise Architecture [FEA]). |
6 |
|
K0202
|
Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing). |
4 |
|
K0260
|
Knowledge of Personally Identifiable Information (PII) data security standards. |
16 |
|
K0261
|
Knowledge of Payment Card Industry (PCI) data security standards. |
17 |
|
K0262
|
Knowledge of Personal Health Information (PHI) data security standards. |
17 |
|
K0263
|
Knowledge of information technology (IT) risk management policies, requirements, and procedures. |
3 |
|
K0322
|
Knowledge of embedded systems. |
10 |
|
K0342
|
Knowledge of penetration testing principles, tools, and techniques. |
8 |
|
K0343
|
Knowledge of root cause analysis techniques. |
2 |
|
K0624
|
Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list) |
13 |