K0001
|
Knowledge of computer networking concepts and protocols, and network security methodologies. |
52 |
K0002
|
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
52 |
K0003
|
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. |
52 |
K0004
|
Knowledge of cybersecurity and privacy principles. |
52 |
K0005
|
Knowledge of cyber threats and vulnerabilities. |
52 |
K0006
|
Knowledge of specific operational impacts of cybersecurity lapses. |
52 |
K0013
|
Knowledge of cyber defense and vulnerability assessment tools and their capabilities. |
5 |
K0019
|
Knowledge of cryptography and cryptographic key management concepts |
8 |
K0027
|
Knowledge of organization's enterprise information security architecture. |
9 |
K0028
|
Knowledge of organization's evaluation and validation requirements. |
8 |
K0037
|
Knowledge of Security Assessment and Authorization process. |
5 |
K0038
|
Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data. |
6 |
K0040
|
Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins). |
5 |
K0044
|
Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
14 |
K0048
|
Knowledge of Risk Management Framework (RMF) requirements. |
8 |
K0049
|
Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). |
8 |
K0054
|
Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities. |
3 |
K0059
|
Knowledge of new and emerging information technology (IT) and cybersecurity technologies. |
12 |
K0070
|
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
13 |
K0084
|
Knowledge of structured analysis principles and methods. |
6 |
K0089
|
Knowledge of systems diagnostic tools and fault identification techniques. |
3 |
K0101
|
Knowledge of the organization’s enterprise information technology (IT) goals and objectives. |
8 |
K0126
|
Knowledge of Supply Chain Risk Management Practices (NIST SP 800-161) |
14 |
K0146
|
Knowledge of the organization's core business/mission processes. |
10 |
K0168
|
Knowledge of applicable laws, statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures. |
11 |
K0169
|
Knowledge of information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures. |
14 |
K0170
|
Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations. |
12 |
K0179
|
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
19 |
K0199
|
Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zachman, Federal Enterprise Architecture [FEA]). |
6 |
K0203
|
Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). |
10 |
K0260
|
Knowledge of Personally Identifiable Information (PII) data security standards. |
16 |
K0261
|
Knowledge of Payment Card Industry (PCI) data security standards. |
17 |
K0262
|
Knowledge of Personal Health Information (PHI) data security standards. |
17 |
K0267
|
Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures. |
8 |
K0295
|
Knowledge of confidentiality, integrity, and availability principles. |
1 |
K0322
|
Knowledge of embedded systems. |
10 |
K0342
|
Knowledge of penetration testing principles, tools, and techniques. |
8 |
K0622
|
Knowledge of controls related to the use, processing, storage, and transmission of data. |
6 |
K0624
|
Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list) |
13 |