mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-25 16:27:19 +00:00
3856 lines
152 KiB
JSON
3856 lines
152 KiB
JSON
|
{
|
||
|
"authors": [
|
||
|
"NIST",
|
||
|
"Jean-Louis Huynen"
|
||
|
],
|
||
|
"category": "workforce",
|
||
|
"description": "Knowledge based on the NIST NICE framework",
|
||
|
"name": "NICE Knowledges",
|
||
|
"source": "https://csrc.nist.gov/pubs/sp/800/181/r1/final",
|
||
|
"type": "nice-framework-knowledges",
|
||
|
"uuid": "796e3e82-ca9a-4749-8421-4810ed440755",
|
||
|
"values": [
|
||
|
{
|
||
|
"description": "Knowledge of ingress filtering tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "c3fa993f-f2db-5056-ac53-14e18aae3619",
|
||
|
"value": "Knowledge of ingress filtering tools and techniques - K1082"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of risk assessment tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "2660a2f8-5d68-5193-b8c7-f5d65651b984",
|
||
|
"value": "Knowledge of risk assessment tools and techniques - K1078"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of life cycle development milestones",
|
||
|
"related": [],
|
||
|
"uuid": "008d0123-c2b9-563d-89b3-e088965a3d9e",
|
||
|
"value": "Knowledge of life cycle development milestones - K0670"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of contractor management",
|
||
|
"related": [],
|
||
|
"uuid": "2cc178a3-af4d-58dc-99ad-1681f5e2b0d8",
|
||
|
"value": "Knowledge of contractor management - K0669"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of contract management",
|
||
|
"related": [],
|
||
|
"uuid": "1c43820a-1da2-5bad-8588-df0fd9b104d5",
|
||
|
"value": "Knowledge of contract management - K0668"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of software asset management principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "3d0e1e18-3b8d-54c2-841e-95e2b733cdea",
|
||
|
"value": "Knowledge of software asset management principles and practices - K1074"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of continuous monitoring processes",
|
||
|
"related": [],
|
||
|
"uuid": "4c756710-3cbc-5612-84a2-146350e3c1d5",
|
||
|
"value": "Knowledge of continuous monitoring processes - K1071"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of contracts",
|
||
|
"related": [],
|
||
|
"uuid": "316778fd-8686-5d27-81de-7147cdfa4444",
|
||
|
"value": "Knowledge of contracts - K0667"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of system security plans",
|
||
|
"related": [],
|
||
|
"uuid": "da140746-664f-5c47-bd36-a1903f0556a7",
|
||
|
"value": "Knowledge of system security plans - K0666"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of stakeholder management",
|
||
|
"related": [],
|
||
|
"uuid": "162ee449-1147-5f62-b2e4-44d35eea83b2",
|
||
|
"value": "Knowledge of stakeholder management - K0664"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of industry standards and best practices",
|
||
|
"related": [],
|
||
|
"uuid": "4e0d7d84-307f-5361-892d-bdd455e5f578",
|
||
|
"value": "Knowledge of industry standards and best practices - K0663"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of systems security engineering",
|
||
|
"related": [],
|
||
|
"uuid": "0239190b-345e-5262-be0c-a5cb4181e554",
|
||
|
"value": "Knowledge of systems security engineering - K0662"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of reauthorization processes",
|
||
|
"related": [],
|
||
|
"uuid": "1a00473f-cac9-53df-b0ef-dd3d19c443e6",
|
||
|
"value": "Knowledge of reauthorization processes - K0661"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of appropriate use policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "5c42be6f-f117-5db9-a0a1-3eb6b8bfe0ce",
|
||
|
"value": "Knowledge of appropriate use policies and procedures - K0660"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of risk tolerance principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "c047b366-bf81-50cd-93d7-e5af46fc5ebe",
|
||
|
"value": "Knowledge of risk tolerance principles and practices - K0822"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cybersecurity engineering",
|
||
|
"related": [],
|
||
|
"uuid": "e52557ff-6e36-5dde-a41e-7b6e4c626c55",
|
||
|
"value": "Knowledge of cybersecurity engineering - K1133"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of organizational policy and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "a12e3886-a915-5980-8900-9f1a355bb7f4",
|
||
|
"value": "Knowledge of organizational policy and procedures - K1189"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of market research tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "b622c362-eb1c-53fc-b259-acface6706f4",
|
||
|
"value": "Knowledge of market research tools and techniques - K0641"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of pricing structures",
|
||
|
"related": [],
|
||
|
"uuid": "7148f95b-5198-5516-b167-2addb872cb8f",
|
||
|
"value": "Knowledge of pricing structures - K0642"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of supplier assessment criteria",
|
||
|
"related": [],
|
||
|
"uuid": "bf110aca-1c0d-57b4-b25c-2ae1fe2470ab",
|
||
|
"value": "Knowledge of supplier assessment criteria - K0650"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of trustworthiness principles",
|
||
|
"related": [],
|
||
|
"uuid": "6f6d8f51-2d5e-5d64-ad16-0460cbcfb6ef",
|
||
|
"value": "Knowledge of trustworthiness principles - K0651"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of incident response policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "bc6e8130-bc4e-527d-8ca2-8c5bd5625187",
|
||
|
"value": "Knowledge of incident response policies and procedures - K0823"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of incident response roles and responsibilities",
|
||
|
"related": [],
|
||
|
"uuid": "64b5dec1-2106-5f55-96ff-6769d5a8ff14",
|
||
|
"value": "Knowledge of incident response roles and responsibilities - K0824"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of sustainment principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "436228cf-9169-5e90-b270-137230abd3bb",
|
||
|
"value": "Knowledge of sustainment principles and practices - K0912"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of sustainment processes",
|
||
|
"related": [],
|
||
|
"uuid": "d20071c6-157f-51cd-a934-fd703c955f4b",
|
||
|
"value": "Knowledge of sustainment processes - K0913"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of system life cycles",
|
||
|
"related": [],
|
||
|
"uuid": "7d8b3bc9-cf4e-5c10-b2a0-1d7728e35444",
|
||
|
"value": "Knowledge of system life cycles - K1225"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of continuous monitoring tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "d8266da9-26d5-5d08-a750-1804f1534532",
|
||
|
"value": "Knowledge of continuous monitoring tools and techniques - K1125"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of continuous monitoring scoring and grading metrics",
|
||
|
"related": [],
|
||
|
"uuid": "43a664d6-3e7a-5ada-a074-6b316205b543",
|
||
|
"value": "Knowledge of continuous monitoring scoring and grading metrics - K1124"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of continuous monitoring principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "b520c01b-b799-5a5a-a173-b1af031c5bce",
|
||
|
"value": "Knowledge of continuous monitoring principles and practices - K1123"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cybersecurity objectives",
|
||
|
"related": [],
|
||
|
"uuid": "a1d4d16a-d1f4-5fe5-b74f-6ba2fcd01595",
|
||
|
"value": "Knowledge of cybersecurity objectives - K1135"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of information architecture principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "251558fb-ca83-5caf-845b-a228fc20b3b4",
|
||
|
"value": "Knowledge of information architecture principles and practices - K1166"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of enterprise cybersecurity architecture",
|
||
|
"related": [],
|
||
|
"uuid": "ffd758ea-2899-5510-b5e6-fc3a9e33e1c7",
|
||
|
"value": "Knowledge of enterprise cybersecurity architecture - K1156"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of organizational evaluation and validation requirements",
|
||
|
"related": [],
|
||
|
"uuid": "b73deb35-c186-5967-b7af-eccf82d17183",
|
||
|
"value": "Knowledge of organizational evaluation and validation requirements - K1185"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of organizational risk levels",
|
||
|
"related": [],
|
||
|
"uuid": "909b82bd-714b-5003-a437-aabc90a04760",
|
||
|
"value": "Knowledge of organizational risk levels - K1190"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of project plans and schedules",
|
||
|
"related": [],
|
||
|
"uuid": "e37d8a52-02b7-59b2-af12-96ffdcf65aaf",
|
||
|
"value": "Knowledge of project plans and schedules - K1202"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of programming languages",
|
||
|
"related": [],
|
||
|
"uuid": "c0613b01-a2b4-5f1a-b778-a3aecd4f408c",
|
||
|
"value": "Knowledge of programming languages - K1201"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of system characteristics",
|
||
|
"related": [],
|
||
|
"uuid": "09e88959-bc48-5a00-82dc-8fabcc231c1d",
|
||
|
"value": "Knowledge of system characteristics - K1224"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of software application, system, and network requirements",
|
||
|
"related": [],
|
||
|
"uuid": "b8ae0620-abbc-5d70-af11-9353a6312b9d",
|
||
|
"value": "Knowledge of software application, system, and network requirements - K1218"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of user interfaces",
|
||
|
"related": [],
|
||
|
"uuid": "cea55969-9897-59cc-ae13-7b2ac534c362",
|
||
|
"value": "Knowledge of user interfaces - K1234"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence data gathering principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "19c700d9-934c-52db-9da3-85cf1dfd2eb9",
|
||
|
"value": "Knowledge of intelligence data gathering principles and practices - K0944"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence data gathering policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "928c2bc5-1bc9-55af-ae1c-524cacbe4d7c",
|
||
|
"value": "Knowledge of intelligence data gathering policies and procedures - K0945"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of foreign disclosure policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "00d7508d-24e1-5ac8-8cb1-40619f30f8d0",
|
||
|
"value": "Knowledge of foreign disclosure policies and procedures - K0954"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of privacy disclosure statement laws and regulations",
|
||
|
"related": [],
|
||
|
"uuid": "11fdf9ec-4bc5-5799-a28d-dc96b8088f7b",
|
||
|
"value": "Knowledge of privacy disclosure statement laws and regulations - K1070"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of security awareness programs",
|
||
|
"related": [],
|
||
|
"uuid": "359dde67-609a-5947-ae87-c9051d47b5a0",
|
||
|
"value": "Knowledge of security awareness programs - K0638"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of virtual learning environments",
|
||
|
"related": [],
|
||
|
"uuid": "49aac74b-041c-570f-b635-ddfe40537979",
|
||
|
"value": "Knowledge of virtual learning environments - K0643"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of target audience requirements",
|
||
|
"related": [],
|
||
|
"uuid": "bc319fd7-ae7a-56a6-997d-bb33a117fa62",
|
||
|
"value": "Knowledge of target audience requirements - K0654"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of information privacy technologies",
|
||
|
"related": [],
|
||
|
"uuid": "bf5ccab4-5ab7-5858-b00a-cadcbcfc4f60",
|
||
|
"value": "Knowledge of information privacy technologies - K0659"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cognitive domain models and frameworks",
|
||
|
"related": [],
|
||
|
"uuid": "2f1affb9-98d6-55e1-8bee-762a94530e1f",
|
||
|
"value": "Knowledge of cognitive domain models and frameworks - K0801"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of instructional design principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "be5d73a0-2c5b-5298-baee-37f824075897",
|
||
|
"value": "Knowledge of instructional design principles and practices - K0885"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of instructional design models and frameworks",
|
||
|
"related": [],
|
||
|
"uuid": "479f1c1d-42a2-5541-a2e2-00f869decad8",
|
||
|
"value": "Knowledge of instructional design models and frameworks - K0886"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Bloom's Taxonomy learning levels",
|
||
|
"related": [],
|
||
|
"uuid": "ee7a7876-5108-5bdc-92b3-f222203b1b9d",
|
||
|
"value": "Knowledge of Bloom's Taxonomy learning levels - K0888"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of learning management system (LMS) systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "df7bf611-16f8-5ed1-82b2-46d9e48d212d",
|
||
|
"value": "Knowledge of learning management system (LMS) systems and software - K0889"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of learning modes",
|
||
|
"related": [],
|
||
|
"uuid": "b3cf50a1-6d10-58c5-b18e-b51254c48fb1",
|
||
|
"value": "Knowledge of learning modes - K0890"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of media production tool and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "31f6d084-312d-583d-ad99-f1b29bafae8b",
|
||
|
"value": "Knowledge of media production tool and techniques - K0905"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of needs assessment principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "b5fa3ba8-13d2-5384-b50c-4abe72bae5aa",
|
||
|
"value": "Knowledge of needs assessment principles and practices - K0910"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cybersecurity competitions",
|
||
|
"related": [],
|
||
|
"uuid": "f917d86b-2476-5fce-8d9a-777f9694a00d",
|
||
|
"value": "Knowledge of cybersecurity competitions - K1083"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of federal and state accreditation standards",
|
||
|
"related": [],
|
||
|
"uuid": "70393d57-45cf-5b0f-8662-bd68a4818ce4",
|
||
|
"value": "Knowledge of federal and state accreditation standards - K1160"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of organzational privacy policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "676da780-afaf-5b01-bca5-8faae5bf9820",
|
||
|
"value": "Knowledge of organzational privacy policies and procedures - K1192"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of privacy and data security regulators",
|
||
|
"related": [],
|
||
|
"uuid": "b08b6b95-52a0-567e-9d4c-e479a2e1d456",
|
||
|
"value": "Knowledge of privacy and data security regulators - K1198"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of privacy technologies",
|
||
|
"related": [],
|
||
|
"uuid": "93ba55d7-efcf-56f6-ad35-accecd28723e",
|
||
|
"value": "Knowledge of privacy technologies - K1200"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowlege of privacy laws and regulations",
|
||
|
"related": [],
|
||
|
"uuid": "1a22dd84-1469-5ca9-83e6-c85a28ee1f6e",
|
||
|
"value": "Knowlege of privacy laws and regulations - K1240"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of all-source intelligence reporting policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "bf481996-2321-5700-a6df-a1129e25cb94",
|
||
|
"value": "Knowledge of all-source intelligence reporting policies and procedures - K0964"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of post implementation review (PIR) processes",
|
||
|
"related": [],
|
||
|
"uuid": "b6f1f6cd-7cd5-5f48-9986-2e7fd08f97b3",
|
||
|
"value": "Knowledge of post implementation review (PIR) processes - K1027"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of approved intelligence dissemination processes",
|
||
|
"related": [],
|
||
|
"uuid": "0ff1101b-ee28-5b29-b1bb-dbee098bf5bd",
|
||
|
"value": "Knowledge of approved intelligence dissemination processes - K0359"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of language processing tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "e05deaa9-2e48-5017-a767-b3b989e01fb0",
|
||
|
"value": "Knowledge of language processing tools and techniques - K0476"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of target communication tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "77915e62-849c-594f-ab48-9f97c27a5a5c",
|
||
|
"value": "Knowledge of target communication tools and techniques - K0540"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of language analysis tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "0360e0bf-24e3-5ef3-bc1b-4e4c4e89aba3",
|
||
|
"value": "Knowledge of language analysis tools and techniques - K0965"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of voice analysis tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "d068201d-41b6-5283-a2ed-bc4e76d8d00b",
|
||
|
"value": "Knowledge of voice analysis tools and techniques - K0966"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of graphic materials analysis tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "a8b021e2-7443-5244-ae6b-1648ed8a6bc1",
|
||
|
"value": "Knowledge of graphic materials analysis tools and techniques - K0967"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence collection systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "7313933a-924d-590f-90ec-637f64376c18",
|
||
|
"value": "Knowledge of intelligence collection systems and software - K0981"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of target language",
|
||
|
"related": [],
|
||
|
"uuid": "d97a71e3-b950-5a0a-8d82-b60a93f68ca9",
|
||
|
"value": "Knowledge of target language - K1034"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of target cultural references",
|
||
|
"related": [],
|
||
|
"uuid": "fedd0cf1-defc-568c-8b93-9d41f279e728",
|
||
|
"value": "Knowledge of target cultural references - K1039"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of the collection process feedback cycle",
|
||
|
"related": [],
|
||
|
"uuid": "d7903dc8-2af7-546e-9b89-a298fab8a0a3",
|
||
|
"value": "Knowledge of the collection process feedback cycle - K1053"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of language analysis principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "b9547b5c-e104-5a94-add9-06962da2a60b",
|
||
|
"value": "Knowledge of language analysis principles and practices - K1056"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Interactive On-Net (ION) operator roles and responsibilities",
|
||
|
"related": [],
|
||
|
"uuid": "4733673e-fe4c-5713-a0bd-11b1001db858",
|
||
|
"value": "Knowledge of Interactive On-Net (ION) operator roles and responsibilities - K1057"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of foreign languages and dialects",
|
||
|
"related": [],
|
||
|
"uuid": "a25bff83-5b22-57d0-aea2-971832c23f08",
|
||
|
"value": "Knowledge of foreign languages and dialects - K1162"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of target communication network characteristics",
|
||
|
"related": [],
|
||
|
"uuid": "25b97fc3-c475-597f-8586-83581f49c938",
|
||
|
"value": "Knowledge of target communication network characteristics - K1229"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of target communications tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "1a9c6c9c-2220-5677-adcb-f56d73e687d8",
|
||
|
"value": "Knowledge of target communications tools and techniques - K1230"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Communications Security (COMSEC) policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "4ec203b8-91ff-54fb-b35d-7b193c9ac628",
|
||
|
"value": "Knowledge of Communications Security (COMSEC) policies and procedures - K0671"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of the Communications Security (COMSEC) Material Control System (CMCS)",
|
||
|
"related": [],
|
||
|
"uuid": "53bba8e2-04a6-5a11-915e-a68c7c0b3bc5",
|
||
|
"value": "Knowledge of the Communications Security (COMSEC) Material Control System (CMCS) - K0672"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of types of Communications Security (COMSEC) incidents",
|
||
|
"related": [],
|
||
|
"uuid": "1dceb5dd-9db5-5120-865a-f9207de6f014",
|
||
|
"value": "Knowledge of types of Communications Security (COMSEC) incidents - K0673"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of program management principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "35f402fb-5dde-5ea3-b58e-d751a771b054",
|
||
|
"value": "Knowledge of program management principles and practices - K0798"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of mission assurance practices and principles",
|
||
|
"related": [],
|
||
|
"uuid": "9a738129-3a0f-5b03-8d8d-4a50523c59ae",
|
||
|
"value": "Knowledge of mission assurance practices and principles - K1171"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of organization's security strategy",
|
||
|
"related": [],
|
||
|
"uuid": "37363583-9107-59d0-ba0a-5b3b504b2083",
|
||
|
"value": "Knowledge of organization's security strategy - K1179"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of industry indicators",
|
||
|
"related": [],
|
||
|
"uuid": "1c57aee0-bc2a-51fa-b6d2-d78c9b70be08",
|
||
|
"value": "Knowledge of industry indicators - K0943"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of organizational cybersecurity policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "ce86b908-feb6-5adf-b6d8-dd8a80436854",
|
||
|
"value": "Knowledge of organizational cybersecurity policies and procedures - K1183"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of organizational human resource (HR) policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "31da8869-a05d-5974-9a24-25dde73708c1",
|
||
|
"value": "Knowledge of organizational human resource (HR) policies and procedures - K1186"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of research and design processes and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "29856ef9-e715-51be-a8ef-ea0c20703e1f",
|
||
|
"value": "Knowledge of research and design processes and procedures - K1206"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of the organizational cybersecurity workforce",
|
||
|
"related": [],
|
||
|
"uuid": "674a9e80-f59b-57f3-8e8f-c7ba776aff7d",
|
||
|
"value": "Knowledge of the organizational cybersecurity workforce - K0640"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of career paths",
|
||
|
"related": [],
|
||
|
"uuid": "575799da-6330-5ce1-a515-5af2b120d184",
|
||
|
"value": "Knowledge of career paths - K0648"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of organizational career progressions",
|
||
|
"related": [],
|
||
|
"uuid": "d067e075-7d02-5082-8c84-0f26cb0ec742",
|
||
|
"value": "Knowledge of organizational career progressions - K0649"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of workforce trends",
|
||
|
"related": [],
|
||
|
"uuid": "8e1b26aa-59bd-59f7-b17c-4fed54368275",
|
||
|
"value": "Knowledge of workforce trends - K0652"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of resource management principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "8ada7d15-026c-5c86-b18e-43e300ac74a4",
|
||
|
"value": "Knowledge of resource management principles and practices - K0754"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of training policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "fe3ea4a9-ccb6-5635-ad6a-8b411a3f52ed",
|
||
|
"value": "Knowledge of training policies and procedures - K0887"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of training systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "0d8a7cfb-761e-5f55-ac20-162f441ad24b",
|
||
|
"value": "Knowledge of training systems and software - K0893"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of the NIST Workforce Framework for Cybersecurity (NICE Framework)",
|
||
|
"related": [],
|
||
|
"uuid": "eb1541cf-f5d8-5286-9769-f5403fe75706",
|
||
|
"value": "Knowledge of the NIST Workforce Framework for Cybersecurity (NICE Framework) - K0902"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of human resources policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "b0eca096-6336-5cc4-a427-31eba9ec26ae",
|
||
|
"value": "Knowledge of human resources policies and procedures - K0908"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of personnel systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "d0b6aff0-dfb0-5a4a-b09b-01aa1105e9e6",
|
||
|
"value": "Knowledge of personnel systems and software - K1098"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cybersecurity workforce policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "8f8be2d8-ed43-5a19-b24c-abbf5e2bc647",
|
||
|
"value": "Knowledge of cybersecurity workforce policies and procedures - K1140"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of organizational cybersecurity workforce requirements",
|
||
|
"related": [],
|
||
|
"uuid": "ca028e6f-bb19-51f3-9ba0-9e5368728c11",
|
||
|
"value": "Knowledge of organizational cybersecurity workforce requirements - K1184"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence processes",
|
||
|
"related": [],
|
||
|
"uuid": "6cb25de8-bd30-5e8d-acac-aaf091166b37",
|
||
|
"value": "Knowledge of intelligence processes - K1058"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of priority intelligence collection requirements",
|
||
|
"related": [],
|
||
|
"uuid": "1954138b-2a15-5e1e-afa5-b89dfdffacc7",
|
||
|
"value": "Knowledge of priority intelligence collection requirements - K1196"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of service desk principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "bb319832-911e-5c40-93eb-a7a60dfa0a24",
|
||
|
"value": "Knowledge of service desk principles and practices - K0903"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of remote access tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "d931eacc-5428-52c0-a782-716f191b4a3c",
|
||
|
"value": "Knowledge of remote access tools and techniques - K0911"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of software, hardware, and peripheral equipment repair tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "191b24f9-5cf8-5569-8517-0d6c08c8dd1e",
|
||
|
"value": "Knowledge of software, hardware, and peripheral equipment repair tools and techniques - K1090"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of asset management policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "2d7ef6bf-1366-59c0-a367-e0b6ec41cd08",
|
||
|
"value": "Knowledge of asset management policies and procedures - K1112"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of customer experience principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "015591bf-bffc-5478-93a5-72b0ba86091f",
|
||
|
"value": "Knowledge of customer experience principles and practices - K1127"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Voice over IP (VoIP)",
|
||
|
"related": [],
|
||
|
"uuid": "9775cd6d-9629-5c81-8d76-dfc6cdfc15c0",
|
||
|
"value": "Knowledge of Voice over IP (VoIP) - K0159"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of system performance indicators",
|
||
|
"related": [],
|
||
|
"uuid": "65cbd048-066d-5129-aa1c-c046ced75ea4",
|
||
|
"value": "Knowledge of system performance indicators - K0740"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of system availability measures",
|
||
|
"related": [],
|
||
|
"uuid": "8189e05e-3ba6-54ac-b2b2-5dd7b9cc9c85",
|
||
|
"value": "Knowledge of system availability measures - K0741"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of credential management systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "276f7e69-a93c-5d5b-a11c-9987a987dce4",
|
||
|
"value": "Knowledge of credential management systems and software - K0930"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data-at-rest encryption (DARE) standards and best practices",
|
||
|
"related": [],
|
||
|
"uuid": "55fb6ccf-bdf0-5946-bfd0-977d3592abff",
|
||
|
"value": "Knowledge of data-at-rest encryption (DARE) standards and best practices - K0931"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cryptographic key storage systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "8114db1b-acc7-5a4a-bbb5-35da6ddf2506",
|
||
|
"value": "Knowledge of cryptographic key storage systems and software - K0932"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of system availability requirements",
|
||
|
"related": [],
|
||
|
"uuid": "48d791e2-3c81-5b62-a903-ed9da5138db9",
|
||
|
"value": "Knowledge of system availability requirements - K1222"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence collection tasking tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "e163d319-ffcf-56af-a88f-fbef565f97b1",
|
||
|
"value": "Knowledge of intelligence collection tasking tools and techniques - K0972"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence collection principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "270f17e6-609a-5bfa-b9e7-57875f441eb2",
|
||
|
"value": "Knowledge of intelligence collection principles and practices - K0976"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of resource and asset readiness reporting policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "519d5c4f-d1d9-5792-8498-1e48d2596131",
|
||
|
"value": "Knowledge of resource and asset readiness reporting policies and procedures - K1021"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of requirements submission processes",
|
||
|
"related": [],
|
||
|
"uuid": "004766e5-32d5-5703-9ab7-cbdd31c80bc7",
|
||
|
"value": "Knowledge of requirements submission processes - K1026"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of production exploitation principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "87f523d1-beb9-5142-a5e7-dbfd9f075651",
|
||
|
"value": "Knowledge of production exploitation principles and practices - K1029"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of tasking processes",
|
||
|
"related": [],
|
||
|
"uuid": "67730109-96a0-5ad4-84f9-ddf4bdfa1f69",
|
||
|
"value": "Knowledge of tasking processes - K1045"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence collection requirements tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "2392e711-6f34-53e0-9920-8f2ef664299b",
|
||
|
"value": "Knowledge of intelligence collection requirements tools and techniques - K1048"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of the Tasking, Collection, Processing, Exploitation and Dissemination (TCPED) process",
|
||
|
"related": [],
|
||
|
"uuid": "56961972-a003-5f2a-9234-70d1a4aa46b7",
|
||
|
"value": "Knowledge of the Tasking, Collection, Processing, Exploitation and Dissemination (TCPED) process - K1052"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence collection authority policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "e5a43238-b8e3-5af4-bc49-eaf356a8728a",
|
||
|
"value": "Knowledge of intelligence collection authority policies and procedures - K1060"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of environment preparation tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "0e16222d-acef-59bc-9722-653bd939dc7d",
|
||
|
"value": "Knowledge of environment preparation tools and techniques - K1061"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of surveillance tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "e4136755-5a5d-576d-97e9-fdf48679b342",
|
||
|
"value": "Knowledge of surveillance tools and techniques - K1062"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of operational environment risks",
|
||
|
"related": [],
|
||
|
"uuid": "26d15d65-900b-5aa6-b66e-2c6a4d5fd27b",
|
||
|
"value": "Knowledge of operational environment risks - K1178"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of priority information requirements",
|
||
|
"related": [],
|
||
|
"uuid": "a026073e-a18f-5a62-9a70-aba0dce8c860",
|
||
|
"value": "Knowledge of priority information requirements - K1195"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data concealment tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "9ebe874b-275a-5422-8a74-75c1307274b4",
|
||
|
"value": "Knowledge of data concealment tools and techniques - K0941"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data encryption practices and principles",
|
||
|
"related": [],
|
||
|
"uuid": "fff705b1-f0ec-5e9a-912d-ca8688c7408a",
|
||
|
"value": "Knowledge of data encryption practices and principles - K1145"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of steganography practices and principles",
|
||
|
"related": [],
|
||
|
"uuid": "93d32c4d-70db-5434-8359-c4e3da9dd653",
|
||
|
"value": "Knowledge of steganography practices and principles - K1220"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of blue force tracking",
|
||
|
"related": [],
|
||
|
"uuid": "207579e9-d559-54b9-bf9b-bdbb870b44cf",
|
||
|
"value": "Knowledge of blue force tracking - K1113"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cybersecurity standards and best practices",
|
||
|
"related": [],
|
||
|
"uuid": "e2dd5d5b-6ff1-5fb9-9a71-f0ff8a374e3d",
|
||
|
"value": "Knowledge of cybersecurity standards and best practices - K1138"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data visualization tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "d1fc41da-ff0b-5015-8422-392fd50e7dbf",
|
||
|
"value": "Knowledge of data visualization tools and techniques - K0647"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data administration policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "7115b47b-e060-5d8a-a1b9-d1cf5f0bb07a",
|
||
|
"value": "Knowledge of data administration policies and procedures - K0699"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data standardization policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "c5b961f6-0d3d-5d6a-99ec-5fce2986e6b5",
|
||
|
"value": "Knowledge of data standardization policies and procedures - K0700"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of database management system (DBMS) principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "afa19a5b-2bf7-53e0-b102-89515d40bfca",
|
||
|
"value": "Knowledge of database management system (DBMS) principles and practices - K0704"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of database query language capabilities and applications",
|
||
|
"related": [],
|
||
|
"uuid": "dfed2def-1d23-5e13-bb30-02a348faa6ab",
|
||
|
"value": "Knowledge of database query language capabilities and applications - K0705"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of database schema capabilities and applications",
|
||
|
"related": [],
|
||
|
"uuid": "45092cf9-e839-5f9a-8ea7-335b276bf3c8",
|
||
|
"value": "Knowledge of database schema capabilities and applications - K0706"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of digital rights management (DRM) tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "9eb74060-abd4-50ca-92bd-255615c17af4",
|
||
|
"value": "Knowledge of digital rights management (DRM) tools and techniques - K0708"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of query languages",
|
||
|
"related": [],
|
||
|
"uuid": "7ebdb252-557a-51cb-9c70-023600cb6893",
|
||
|
"value": "Knowledge of query languages - K0750"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of database application programming interfaces (APIs)",
|
||
|
"related": [],
|
||
|
"uuid": "7c078ec6-ac69-5b47-a549-1a30aa278129",
|
||
|
"value": "Knowledge of database application programming interfaces (APIs) - K0867"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of logging tools and technologies",
|
||
|
"related": [],
|
||
|
"uuid": "8f982130-78d8-5212-9bce-5b0d243f4c92",
|
||
|
"value": "Knowledge of logging tools and technologies - K0897"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of machine learning principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "0b5a20b3-f739-5868-8af4-b1397248ef15",
|
||
|
"value": "Knowledge of machine learning principles and practices - K0904"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of hexadecimal data",
|
||
|
"related": [],
|
||
|
"uuid": "a7dbf302-ae8d-5c71-aa3a-bfd4de52d935",
|
||
|
"value": "Knowledge of hexadecimal data - K1094"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data mapping tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "9275738a-223a-5c07-94a9-e3720c30353a",
|
||
|
"value": "Knowledge of data mapping tools and techniques - K1097"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data gathering tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "bb0ef9b9-6a7d-5405-a80f-b366b1f3960b",
|
||
|
"value": "Knowledge of data gathering tools and techniques - K1146"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of statistical processes",
|
||
|
"related": [],
|
||
|
"uuid": "f462f35c-ec7f-534a-aef5-8c5a0499867b",
|
||
|
"value": "Knowledge of statistical processes - K1219"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of UNIX scripts",
|
||
|
"related": [],
|
||
|
"uuid": "c1fe04f3-81b1-5a7e-ab16-9806f001e161",
|
||
|
"value": "Knowledge of UNIX scripts - K1233"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Windows scripts",
|
||
|
"related": [],
|
||
|
"uuid": "06c7a87b-5a85-59e3-ba72-34a6c4205a4f",
|
||
|
"value": "Knowledge of Windows scripts - K1238"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data storage media characteristics",
|
||
|
"related": [],
|
||
|
"uuid": "124a1af6-901e-52b4-aeb6-bc1fb4c86dc6",
|
||
|
"value": "Knowledge of data storage media characteristics - K0777"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of capacity management",
|
||
|
"related": [],
|
||
|
"uuid": "a847da12-4d7f-5cc2-b7e4-0058cded0fc8",
|
||
|
"value": "Knowledge of capacity management - K1114"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of configuration management",
|
||
|
"related": [],
|
||
|
"uuid": "2c7cc69f-6d68-5e9e-8fe1-05e48addb75b",
|
||
|
"value": "Knowledge of configuration management - K1121"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of financial management",
|
||
|
"related": [],
|
||
|
"uuid": "f146cda1-7652-5def-b420-e0ddfbce9d98",
|
||
|
"value": "Knowledge of financial management - K1161"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of content creation tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "8cc8151c-4aa4-5c18-aa94-f1d52c04608f",
|
||
|
"value": "Knowledge of content creation tools and techniques - K0774"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of collaboration tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "d147b05e-d9f8-5373-93e2-60f2c2798630",
|
||
|
"value": "Knowledge of collaboration tools and techniques - K0776"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cloud computing principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "8ca48481-3769-5d7e-88c7-79e0ac3ed159",
|
||
|
"value": "Knowledge of cloud computing principles and practices - K0863"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of knowledge management principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "3cf68f70-a980-5bbe-834d-e9eb8c67723a",
|
||
|
"value": "Knowledge of knowledge management principles and practices - K0864"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of taxonomy models and frameworks",
|
||
|
"related": [],
|
||
|
"uuid": "455374b7-1eb1-59e8-81dc-6fc5c4626fef",
|
||
|
"value": "Knowledge of taxonomy models and frameworks - K0895"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of semantic ontology models and frameworks",
|
||
|
"related": [],
|
||
|
"uuid": "ffebca88-1970-5a10-83e4-e372e2c83273",
|
||
|
"value": "Knowledge of semantic ontology models and frameworks - K0896"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of content synchronization tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "9e7460b1-2734-5009-b4a0-082d4512136e",
|
||
|
"value": "Knowledge of content synchronization tools and techniques - K0929"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of performance tuning tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "93166601-b975-573f-99b7-41b1d5a42a52",
|
||
|
"value": "Knowledge of performance tuning tools and techniques - K0064"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of standard operating procedures (SOPs)",
|
||
|
"related": [],
|
||
|
"uuid": "28826e21-34a6-54b6-abe8-5b63369d4629",
|
||
|
"value": "Knowledge of standard operating procedures (SOPs) - K0645"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of incident, event, and problem management policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "299c461f-d804-57e7-a59f-50bddedd9182",
|
||
|
"value": "Knowledge of incident, event, and problem management policies and procedures - K0935"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of incident reporting policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "405fa90f-c122-58b1-80fe-b94d175b8566",
|
||
|
"value": "Knowledge of incident reporting policies and procedures - K0946"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of system integration principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "ebad0849-9fe9-5446-a9e1-d36e107b2224",
|
||
|
"value": "Knowledge of system integration principles and practices - K0958"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of automated security control testing tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "7238be80-46fa-5e75-be4c-2d5c1cc66663",
|
||
|
"value": "Knowledge of automated security control testing tools and techniques - K1072"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of systems administration standard operating policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "b1116e5b-de20-5ee6-83ba-ec59b559954a",
|
||
|
"value": "Knowledge of systems administration standard operating policies and procedures - K1226"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cloud service models and frameworks",
|
||
|
"related": [],
|
||
|
"uuid": "1f8ff896-1a94-59bb-a542-224ca5daf916",
|
||
|
"value": "Knowledge of cloud service models and frameworks - K0898"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of web filtering systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "782593d6-81c0-5fbf-8c83-bdba8f47ae6c",
|
||
|
"value": "Knowledge of web filtering systems and software - K0811"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of NIST Risk Management Framework authorization requirements",
|
||
|
"related": [],
|
||
|
"uuid": "773a0f2b-9a62-5660-915f-0e290e435a25",
|
||
|
"value": "Knowledge of NIST Risk Management Framework authorization requirements - K1177"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of security assessment authorization requirements",
|
||
|
"related": [],
|
||
|
"uuid": "f63c5946-8580-5b3e-b7ab-9cfdd68aa97f",
|
||
|
"value": "Knowledge of security assessment authorization requirements - K1211"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Virtual Private Network (VPN) devices",
|
||
|
"related": [],
|
||
|
"uuid": "9a39beb7-c0cb-5c95-9654-ffc364719614",
|
||
|
"value": "Knowledge of Virtual Private Network (VPN) devices - K1237"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of risk scoring principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "449cc6fb-fcca-505c-a565-095ed3b4c835",
|
||
|
"value": "Knowledge of risk scoring principles and practices - K1076"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of social engineering tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "f44b9e86-6423-58e4-afb7-31363404111a",
|
||
|
"value": "Knowledge of social engineering tools and techniques - K1087"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cyber defense auditing laws and regulations",
|
||
|
"related": [],
|
||
|
"uuid": "81c5c506-63f5-5661-945d-4494791e8667",
|
||
|
"value": "Knowledge of cyber defense auditing laws and regulations - K1129"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cyber defense auditing policies and practices",
|
||
|
"related": [],
|
||
|
"uuid": "21a8765f-4ae3-57c8-acd9-c0d04fe3629c",
|
||
|
"value": "Knowledge of cyber defense auditing policies and practices - K1130"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of organizational cybersecurity policies and configurations",
|
||
|
"related": [],
|
||
|
"uuid": "e756e755-0866-5605-990b-58f1500890d5",
|
||
|
"value": "Knowledge of organizational cybersecurity policies and configurations - K1182"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data remediation tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "bd9b6d0c-d7e1-5d9b-ad16-925447cde3b2",
|
||
|
"value": "Knowledge of data remediation tools and techniques - K0862"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of abnormal physical and physiological behaviors",
|
||
|
"related": [],
|
||
|
"uuid": "71ab5c27-ea66-58c9-a0b5-3f78599dc800",
|
||
|
"value": "Knowledge of abnormal physical and physiological behaviors - K0909"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of risk mitigation tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "5de88338-4404-528a-a72e-ec7eab6ad3dc",
|
||
|
"value": "Knowledge of risk mitigation tools and techniques - K1031"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data analysis tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "1f665442-8835-5c3a-bc6c-a272bcb6e472",
|
||
|
"value": "Knowledge of data analysis tools and techniques - K1096"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cybersecurity threats and vulnerabilities",
|
||
|
"related": [],
|
||
|
"uuid": "33770b95-c26c-5643-b19a-587c8889e1e3",
|
||
|
"value": "Knowledge of cybersecurity threats and vulnerabilities - K1139"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of organizational cybersecurity goals and objectives",
|
||
|
"related": [],
|
||
|
"uuid": "2a278445-eafa-563a-97d6-c8b5e4bba933",
|
||
|
"value": "Knowledge of organizational cybersecurity goals and objectives - K1180"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of organizational policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "9ea15294-a2eb-5d65-a064-8f1f53a90b43",
|
||
|
"value": "Knowledge of organizational policies and procedures - K1188"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of risk mitigation principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "65b0ae33-c7d5-57f7-964d-fa9330fae461",
|
||
|
"value": "Knowledge of risk mitigation principles and practices - K1209"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cultural, political, and organizational assets",
|
||
|
"related": [],
|
||
|
"uuid": "bcf5eaea-2bb1-5589-b9ca-d54a95b15dc4",
|
||
|
"value": "Knowledge of cultural, political, and organizational assets - K1241"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cybersecurity review processes and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "3713a113-a6ed-59b8-b491-d61391cb09c8",
|
||
|
"value": "Knowledge of cybersecurity review processes and procedures - K1242"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cybersecurity threat remediation principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "dbd56a53-9d6f-5dd4-b44f-cc3111baf983",
|
||
|
"value": "Knowledge of cybersecurity threat remediation principles and practices - K1243"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cybersecurity tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "1644999b-902d-5aac-b737-9879114720d8",
|
||
|
"value": "Knowledge of cybersecurity tools and techniques - K1244"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data exfiltration tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "b1d64fc8-d5e3-5ac9-8807-c114d52f625f",
|
||
|
"value": "Knowledge of data exfiltration tools and techniques - K1245"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data handling tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "e201c06f-e5d4-5b9a-8152-7726ad927457",
|
||
|
"value": "Knowledge of data handling tools and techniques - K1246"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data monitoring tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "ccc7f4e5-1e98-5199-be27-b8585c61d101",
|
||
|
"value": "Knowledge of data monitoring tools and techniques - K1247"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of digital and physical security vulnerabilities",
|
||
|
"related": [],
|
||
|
"uuid": "ec8e2fc6-ad2c-595d-a709-e1686e834be7",
|
||
|
"value": "Knowledge of digital and physical security vulnerabilities - K1248"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of digital and physical security vulnerability remediation principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "eeedecc6-43da-55c6-80a4-75b3cb5bf935",
|
||
|
"value": "Knowledge of digital and physical security vulnerability remediation principles and practices - K1249"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of external organization roles and responsibilities",
|
||
|
"related": [],
|
||
|
"uuid": "7d6c72db-ac12-586d-b2f1-c3916561a60d",
|
||
|
"value": "Knowledge of external organization roles and responsibilities - K1250"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of external referrals policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "88ba22cd-60a5-5e79-a749-5f28e9d3bc4a",
|
||
|
"value": "Knowledge of external referrals policies and procedures - K1251"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of high value asset characteristics",
|
||
|
"related": [],
|
||
|
"uuid": "e465eb57-4ea4-59f6-b74c-a356aa99b8ea",
|
||
|
"value": "Knowledge of high value asset characteristics - K1252"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of information collection tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "9ed87f8b-fd41-5ebe-83ba-3a078bf3d0b8",
|
||
|
"value": "Knowledge of information collection tools and techniques - K1253"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of insider threat hub policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "4c2d09d3-af6b-5baf-9605-2aa7ce3400ac",
|
||
|
"value": "Knowledge of insider threat hub policies and procedures - K1254"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of insider threat hub operations",
|
||
|
"related": [],
|
||
|
"uuid": "d5f499bf-777c-54c7-9e5d-e6b802e56c5c",
|
||
|
"value": "Knowledge of insider threat hub operations - K1255"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of insider threat operational indicators",
|
||
|
"related": [],
|
||
|
"uuid": "f2be7dfe-bec0-5910-8c2d-1c5ef5681cb5",
|
||
|
"value": "Knowledge of insider threat operational indicators - K1256"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of insider threat policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "414e8945-4267-58bd-ad0c-720d492ed3eb",
|
||
|
"value": "Knowledge of insider threat policies and procedures - K1257"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of insider threat tactics",
|
||
|
"related": [],
|
||
|
"uuid": "f3ffaeae-92c5-5ffc-a179-21e8577c1498",
|
||
|
"value": "Knowledge of insider threat tactics - K1258"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of insider threat targets",
|
||
|
"related": [],
|
||
|
"uuid": "1b9ce29a-47d4-51b5-9ab5-7d70a85486bf",
|
||
|
"value": "Knowledge of insider threat targets - K1259"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence laws and regulations",
|
||
|
"related": [],
|
||
|
"uuid": "47a4efd0-9e52-52cf-bc02-49f03183b55a",
|
||
|
"value": "Knowledge of intelligence laws and regulations - K1260"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of known insider attacks",
|
||
|
"related": [],
|
||
|
"uuid": "ca2a0dcc-2b15-5a20-8080-53553dbe533f",
|
||
|
"value": "Knowledge of known insider attacks - K1261"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network endpoints",
|
||
|
"related": [],
|
||
|
"uuid": "f70bfa25-f95e-5b1f-9ccb-c6d515908fec",
|
||
|
"value": "Knowledge of network endpoints - K1262"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of notification policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "213d9283-2d73-56d3-8637-debc1880b852",
|
||
|
"value": "Knowledge of notification policies and procedures - K1263"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of organizational objectives, resources, and capabilities",
|
||
|
"related": [],
|
||
|
"uuid": "0b7a2f8b-94e9-511b-9b86-eddee131052f",
|
||
|
"value": "Knowledge of organizational objectives, resources, and capabilities - K1265"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of previously referred potential insider threats",
|
||
|
"related": [],
|
||
|
"uuid": "03d5b80f-d4c4-5275-9eae-4c0159174f5f",
|
||
|
"value": "Knowledge of previously referred potential insider threats - K1267"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of risk reduction metrics",
|
||
|
"related": [],
|
||
|
"uuid": "e2908ee9-e89f-5109-9bb4-f956a33ac64d",
|
||
|
"value": "Knowledge of risk reduction metrics - K1268"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of security information and event management (SIEM) tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "85c68b75-e307-5e6c-8519-f8608fc41dc5",
|
||
|
"value": "Knowledge of security information and event management (SIEM) tools and techniques - K1269"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of suspicious activity response processes",
|
||
|
"related": [],
|
||
|
"uuid": "72b51301-42dc-59c3-9326-78a6161563b1",
|
||
|
"value": "Knowledge of suspicious activity response processes - K1270"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of system alert policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "3d1f509e-5f9c-5daa-998e-f55d4b08d2a0",
|
||
|
"value": "Knowledge of system alert policies and procedures - K1271"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of system components",
|
||
|
"related": [],
|
||
|
"uuid": "32ded5bb-5cc3-590d-95c8-8d20cb07fc3e",
|
||
|
"value": "Knowledge of system components - K1272"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of threat investigation policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "d7fb2f7e-f2f8-5d6c-8242-4521c400a1be",
|
||
|
"value": "Knowledge of threat investigation policies and procedures - K1273"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of threat modeling tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "97c306aa-1cbf-5e50-943b-ef8de741580c",
|
||
|
"value": "Knowledge of threat modeling tools and techniques - K1274"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of User Activity Monitoring (UAM) tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "734812be-1c75-51f0-b18f-67cccb24d4c3",
|
||
|
"value": "Knowledge of User Activity Monitoring (UAM) tools and techniques - K1275"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of vulnerability data sources",
|
||
|
"related": [],
|
||
|
"uuid": "ac641817-b333-5084-8014-b0020ddfb13d",
|
||
|
"value": "Knowledge of vulnerability data sources - K0723"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of incident response principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "b33df331-abbb-5700-a9f2-1da0e5a365a9",
|
||
|
"value": "Knowledge of incident response principles and practices - K0724"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of incident response tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "b4d3edd0-c279-54db-b6db-f902a2c669b9",
|
||
|
"value": "Knowledge of incident response tools and techniques - K0725"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of incident handling tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "03d76b12-8887-5414-901f-47f80f599252",
|
||
|
"value": "Knowledge of incident handling tools and techniques - K0726"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of virtual private network (VPN) systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "be48211d-d3de-55a6-a5ba-f74ea3d9a20e",
|
||
|
"value": "Knowledge of virtual private network (VPN) systems and software - K0781"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network attack characteristics",
|
||
|
"related": [],
|
||
|
"uuid": "0d88abb6-befa-51ae-9d95-0668bf25de1e",
|
||
|
"value": "Knowledge of network attack characteristics - K0783"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of file extensions",
|
||
|
"related": [],
|
||
|
"uuid": "c296abd5-f236-56e5-a1af-d99c1bc174ba",
|
||
|
"value": "Knowledge of file extensions - K0793"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of command-line tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "d2bef6a4-9b12-5645-aed5-b874b2a0e499",
|
||
|
"value": "Knowledge of command-line tools and techniques - K0805"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of account creation policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "8db4e15e-b186-5c72-bfd7-739dec6c974a",
|
||
|
"value": "Knowledge of account creation policies and procedures - K0829"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of password policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "d9e14c9e-5e27-5c4f-a0c1-f7d39d678c12",
|
||
|
"value": "Knowledge of password policies and procedures - K0830"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cyberattack characteristics",
|
||
|
"related": [],
|
||
|
"uuid": "fe6277b7-3237-50b3-ac51-aed13342cb80",
|
||
|
"value": "Knowledge of cyberattack characteristics - K0832"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cyberattack actor characteristics",
|
||
|
"related": [],
|
||
|
"uuid": "3af3488f-0ee4-5dfb-bd2b-3e7f70f3f2dc",
|
||
|
"value": "Knowledge of cyberattack actor characteristics - K0833"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network port capabilities and applications",
|
||
|
"related": [],
|
||
|
"uuid": "16110281-54e7-5092-8be3-14234b193e03",
|
||
|
"value": "Knowledge of network port capabilities and applications - K0861"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network mapping principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "95008d51-ca07-5286-82c1-ddd9d0a50c3c",
|
||
|
"value": "Knowledge of network mapping principles and practices - K0938"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of packet-level analysis tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "26474da0-6dee-570d-97af-69ac37659aad",
|
||
|
"value": "Knowledge of packet-level analysis tools and techniques - K0939"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of subnet tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "c07a8e3c-a194-5bd4-86da-043a595d1626",
|
||
|
"value": "Knowledge of subnet tools and techniques - K0940"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Intrusion Detection System (IDS) tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "5889dd5e-0446-5156-b519-cbd37a81b897",
|
||
|
"value": "Knowledge of Intrusion Detection System (IDS) tools and techniques - K0950"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Intrusion Prevention System (IPS) tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "1c62b424-0223-50d3-97be-3d061fc4a30f",
|
||
|
"value": "Knowledge of Intrusion Prevention System (IPS) tools and techniques - K0951"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of protocol analyzer tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "1ce8035b-086d-55b3-8d26-c6232735d229",
|
||
|
"value": "Knowledge of protocol analyzer tools and techniques - K1089"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cyber defense monitoring tools",
|
||
|
"related": [],
|
||
|
"uuid": "4a20861a-6d6e-5627-80aa-f8960ee944b0",
|
||
|
"value": "Knowledge of cyber defense monitoring tools - K1131"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cyber defense system analysis tools",
|
||
|
"related": [],
|
||
|
"uuid": "9a4daffc-3a3d-5652-825d-0799c087c52b",
|
||
|
"value": "Knowledge of cyber defense system analysis tools - K1132"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data correlation tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "288b4e94-c6e0-5143-834d-b052e28e9bb3",
|
||
|
"value": "Knowledge of data correlation tools and techniques - K1144"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intrusion set tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "d425e38a-2577-53ea-94d4-a856aa786d57",
|
||
|
"value": "Knowledge of intrusion set tools and techniques - K1168"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network topologies",
|
||
|
"related": [],
|
||
|
"uuid": "86a32808-bf7b-55f1-8840-9d2be560f913",
|
||
|
"value": "Knowledge of network topologies - K1176"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of organizational cybersecurity incident response plans",
|
||
|
"related": [],
|
||
|
"uuid": "89f3a8fb-7f69-5db2-928f-7f8a7d63043b",
|
||
|
"value": "Knowledge of organizational cybersecurity incident response plans - K1181"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of packet analysis tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "3555e0f5-7aca-5be8-a750-2a70650cd38e",
|
||
|
"value": "Knowledge of packet analysis tools and techniques - K1193"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of server diagnostic tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "a1df486f-4fea-5bde-ab67-d5d4ef95fe2d",
|
||
|
"value": "Knowledge of server diagnostic tools and techniques - K0760"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Fault Detection and Diagnostics (FDD) tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "e431d5ae-2b1e-5cf4-a42a-76f4f4f7465a",
|
||
|
"value": "Knowledge of Fault Detection and Diagnostics (FDD) tools and techniques - K0761"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of file system implementation principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "e5f691df-d624-5c6a-95c3-257fdcf063d4",
|
||
|
"value": "Knowledge of file system implementation principles and practices - K0794"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of digital evidence seizure policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "ad64a899-c5bb-501b-97f3-d253d2fbe974",
|
||
|
"value": "Knowledge of digital evidence seizure policies and procedures - K0795"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of digital evidence preservation policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "5ee4ac51-a67c-5a8f-8f42-8e3bb3d203ee",
|
||
|
"value": "Knowledge of digital evidence preservation policies and procedures - K0796"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of chain of custody policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "f29ca9e1-ec7f-5634-bb09-dbde831a30f0",
|
||
|
"value": "Knowledge of chain of custody policies and procedures - K0802"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of persistent data principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "46582ab3-5851-5b67-8b74-ebc4fc9ff4b7",
|
||
|
"value": "Knowledge of persistent data principles and practices - K0804"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of system file characteristics",
|
||
|
"related": [],
|
||
|
"uuid": "be6ae27f-7aba-52f5-ae4b-772293c7ff62",
|
||
|
"value": "Knowledge of system file characteristics - K0808"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of event correlation tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "5b446d89-98f4-592a-9002-56ff3aca782d",
|
||
|
"value": "Knowledge of event correlation tools and techniques - K0817"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data carving tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "5a405b82-8451-55aa-9953-0ed37e278f42",
|
||
|
"value": "Knowledge of data carving tools and techniques - K0850"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of anti-forensics tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "76775b12-13a2-5882-90c8-e0946d38a06a",
|
||
|
"value": "Knowledge of anti-forensics tools and techniques - K0852"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of forensics lab design principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "e77bbb67-f8be-5803-b8af-1c00e1aa1ebf",
|
||
|
"value": "Knowledge of forensics lab design principles and practices - K0853"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of forensics lab design systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "558d22c9-27bf-5f2a-9b5d-bf422cb6c168",
|
||
|
"value": "Knowledge of forensics lab design systems and software - K0854"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of debugging tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "2be7fe99-f4ed-5254-9dca-7adc8b7ca85a",
|
||
|
"value": "Knowledge of debugging tools and techniques - K0855"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of filename extension abuse",
|
||
|
"related": [],
|
||
|
"uuid": "b622cf80-fa4d-5b6b-bd09-ff22b7bcd6c4",
|
||
|
"value": "Knowledge of filename extension abuse - K0856"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of binary analysis tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "c473b439-89e4-5e6b-ba56-429a530ea8bf",
|
||
|
"value": "Knowledge of binary analysis tools and techniques - K0914"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of code obfuscation tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "bf376f9e-471d-5c78-8834-838ccac33edf",
|
||
|
"value": "Knowledge of code obfuscation tools and techniques - K1016"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of media forensics",
|
||
|
"related": [],
|
||
|
"uuid": "2af6f3d4-f6f3-5db6-9456-6216e5c15c4e",
|
||
|
"value": "Knowledge of media forensics - K1091"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of digital forensics tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "5fd1aed8-706c-5c4d-b6b0-3f2703bfd4ac",
|
||
|
"value": "Knowledge of digital forensics tools and techniques - K1092"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Chain of Custody (CoC) processes and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "b5b99be4-7b9a-5a37-81e9-4712d902bc87",
|
||
|
"value": "Knowledge of Chain of Custody (CoC) processes and procedures - K1115"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data integrity principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "e7ff593b-d4d2-5826-bc00-71d99f56567b",
|
||
|
"value": "Knowledge of data integrity principles and practices - K1147"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of digital evidence cataloging tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "7f3aa382-a5d4-53a5-bce4-35693b90cc37",
|
||
|
"value": "Knowledge of digital evidence cataloging tools and techniques - K1151"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of digital evidence extraction tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "9ade887b-8380-5707-877c-01d834bcb88d",
|
||
|
"value": "Knowledge of digital evidence extraction tools and techniques - K1152"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of digital evidence handling principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "bddbce01-830f-5850-8aed-d7693f46b511",
|
||
|
"value": "Knowledge of digital evidence handling principles and practices - K1153"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of digital evidence packaging tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "bbbe2275-8862-5c3f-a84a-1a3158953726",
|
||
|
"value": "Knowledge of digital evidence packaging tools and techniques - K1154"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of digital evidence preservation tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "2bb413b1-cb8a-5be6-9972-c04e6ad300f0",
|
||
|
"value": "Knowledge of digital evidence preservation tools and techniques - K1155"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of forensic image processing tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "a099ddf9-bf17-58de-ad84-56820409e858",
|
||
|
"value": "Knowledge of forensic image processing tools and techniques - K1163"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network monitoring tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "d9b38b3a-328b-591e-8c2c-5d509925714e",
|
||
|
"value": "Knowledge of network monitoring tools and techniques - K1175"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of wireless applications vulnerabilities",
|
||
|
"related": [],
|
||
|
"uuid": "999cf1c7-b2c2-5921-bd2c-802dc01cf21f",
|
||
|
"value": "Knowledge of wireless applications vulnerabilities - K0375"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of malware",
|
||
|
"related": [],
|
||
|
"uuid": "5112a672-dbe2-5af0-b764-a87037a13b9b",
|
||
|
"value": "Knowledge of malware - K0480"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of decryption",
|
||
|
"related": [],
|
||
|
"uuid": "bcc12ecc-af8c-5ecd-90f4-11be976e08ad",
|
||
|
"value": "Knowledge of decryption - K0635"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of decryption tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "2d1a81c0-41b2-5cb9-8a63-4568975b39c7",
|
||
|
"value": "Knowledge of decryption tools and techniques - K0636"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data repositories",
|
||
|
"related": [],
|
||
|
"uuid": "86aaefc8-52c0-5a4a-a1b5-77203e93b1dd",
|
||
|
"value": "Knowledge of data repositories - K0637"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network collection tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "2ceba69a-d1ee-57e1-97df-a449452fcd8c",
|
||
|
"value": "Knowledge of network collection tools and techniques - K0656"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network collection policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "dc79212d-07c5-5d4a-9ee7-ea5b7a6ad4f0",
|
||
|
"value": "Knowledge of network collection policies and procedures - K0657"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of encryption algorithm capabilities and applications",
|
||
|
"related": [],
|
||
|
"uuid": "dfd33f0b-6346-540b-aa92-54e46e8869fe",
|
||
|
"value": "Knowledge of encryption algorithm capabilities and applications - K0697"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data backup and recovery policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "a463b26c-5f49-53bd-a01c-1901af563a53",
|
||
|
"value": "Knowledge of data backup and recovery policies and procedures - K0701"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data warehousing principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "58ad05fa-93a0-55c9-87fe-975dfd379ea2",
|
||
|
"value": "Knowledge of data warehousing principles and practices - K0702"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data mining principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "6dbbe2a3-0921-5192-8801-dbe588e65f6f",
|
||
|
"value": "Knowledge of data mining principles and practices - K0703"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of information management tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "4e39ad78-6eb5-5a46-b5bc-48db1496841c",
|
||
|
"value": "Knowledge of information management tools and techniques - K0775"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of physical computer components",
|
||
|
"related": [],
|
||
|
"uuid": "ee470baf-978b-5b31-a393-434c969528e3",
|
||
|
"value": "Knowledge of physical computer components - K0786"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of computer peripherals",
|
||
|
"related": [],
|
||
|
"uuid": "0c89a962-6bf5-59e3-bf6f-d6f9ed2d0b84",
|
||
|
"value": "Knowledge of computer peripherals - K0787"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of machine virtualization tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "3e656e32-8ecf-55a3-b1cf-93e76269f890",
|
||
|
"value": "Knowledge of machine virtualization tools and techniques - K0806"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of deployable forensics principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "900d86af-1069-5a21-94b8-56c56f2d7001",
|
||
|
"value": "Knowledge of deployable forensics principles and practices - K0810"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence collection management processes",
|
||
|
"related": [],
|
||
|
"uuid": "b203fa28-1b0d-51a2-958b-c340509debdf",
|
||
|
"value": "Knowledge of intelligence collection management processes - K0815"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of virtual machine detection tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "9c50a93e-0426-5bde-8c19-9fbd8f4c364b",
|
||
|
"value": "Knowledge of virtual machine detection tools and techniques - K0858"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data mining tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "1653e923-0e1f-58ce-95ea-c7961840f3cc",
|
||
|
"value": "Knowledge of data mining tools and techniques - K0953"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of auditing policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "261cd103-9446-52f4-b8e6-458bc0fe7955",
|
||
|
"value": "Knowledge of auditing policies and procedures - K0970"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of logging policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "b51d1699-b391-58a2-8708-6b574d444820",
|
||
|
"value": "Knowledge of logging policies and procedures - K0971"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of software application vulnerabilities",
|
||
|
"related": [],
|
||
|
"uuid": "83270faf-3060-56a3-ab07-017252511b75",
|
||
|
"value": "Knowledge of software application vulnerabilities - K0975"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of active defense tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "2f3e9254-651e-59bc-a9ee-16b87c870c52",
|
||
|
"value": "Knowledge of active defense tools and techniques - K0988"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of database administration principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "adfcf428-a5a5-51b8-8723-c05fd9c19bfb",
|
||
|
"value": "Knowledge of database administration principles and practices - K0991"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of database maintenance principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "443b225e-92ec-50b3-9b82-8322471565d5",
|
||
|
"value": "Knowledge of database maintenance principles and practices - K0992"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of deconfliction processes",
|
||
|
"related": [],
|
||
|
"uuid": "21f3e1a8-416b-58f1-b87b-4015a3b51731",
|
||
|
"value": "Knowledge of deconfliction processes - K0993"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Wireless Local Area Network (WLAN) tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "c3d73292-c5b4-539a-94e9-dda03c7df736",
|
||
|
"value": "Knowledge of Wireless Local Area Network (WLAN) tools and techniques - K0998"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of information management principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "b9de3af4-84fb-5dd7-84dc-46853f125167",
|
||
|
"value": "Knowledge of information management principles and practices - K0999"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of evasion principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "19081784-6fe1-5ac8-bbb0-d0e39090e493",
|
||
|
"value": "Knowledge of evasion principles and practices - K1000"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of evasion tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "7288b19d-fa47-53a4-9af1-6fd77bb04aad",
|
||
|
"value": "Knowledge of evasion tools and techniques - K1001"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network topology principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "9ef2cd99-ab68-5a24-afcd-971ecbfda5ae",
|
||
|
"value": "Knowledge of network topology principles and practices - K1015"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network exploitation tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "fb3f90ca-151f-5fb9-b976-7798c2650c9f",
|
||
|
"value": "Knowledge of network exploitation tools and techniques - K1023"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of partnership policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "ad132dfb-57b4-5fb4-9b2d-5b4b222713d8",
|
||
|
"value": "Knowledge of partnership policies and procedures - K1024"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of satellite-based communication systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "69c33569-5901-572e-8bea-8baae24cbfcc",
|
||
|
"value": "Knowledge of satellite-based communication systems and software - K1032"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of digital forensics principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "98fd4a5b-d7fe-55a7-a396-406ed24db2a2",
|
||
|
"value": "Knowledge of digital forensics principles and practices - K1055"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of virtual machine tools and technologies",
|
||
|
"related": [],
|
||
|
"uuid": "9afa506d-fecd-5511-92b4-ccdbf11cd471",
|
||
|
"value": "Knowledge of virtual machine tools and technologies - K1069"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of exploitation tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "fc5ee907-6e48-5329-a95f-3f686615fee6",
|
||
|
"value": "Knowledge of exploitation tools and techniques - K1085"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of remote command line tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "837873eb-98de-55ea-bbf3-8bcd406db628",
|
||
|
"value": "Knowledge of remote command line tools and techniques - K1102"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Graphic User Interface (GUI) tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "abda837d-ac2a-5b40-b91f-feb2d899055e",
|
||
|
"value": "Knowledge of Graphic User Interface (GUI) tools and techniques - K1103"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Internet and routing protocols",
|
||
|
"related": [],
|
||
|
"uuid": "e76e7c18-1d91-5029-94b0-8efbde268c59",
|
||
|
"value": "Knowledge of Internet and routing protocols - K0470"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of targeting cycles",
|
||
|
"related": [],
|
||
|
"uuid": "0976540f-7854-5ec6-a352-a7da62af1df9",
|
||
|
"value": "Knowledge of targeting cycles - K0551"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence fusion",
|
||
|
"related": [],
|
||
|
"uuid": "8a39106a-8d69-5e24-91c8-f12815fb9955",
|
||
|
"value": "Knowledge of intelligence fusion - K0655"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intrusion detection tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "db644042-0fb4-53e9-a0ac-d8ec8c6464e2",
|
||
|
"value": "Knowledge of intrusion detection tools and techniques - K0732"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of web mail tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "a86dffb7-6c96-55c9-beca-20a8d1ecb72b",
|
||
|
"value": "Knowledge of web mail tools and techniques - K0807"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of front-end intelligence collection systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "36507043-3305-50c4-b376-2d2dc92b803b",
|
||
|
"value": "Knowledge of front-end intelligence collection systems and software - K0816"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cyber attack stages",
|
||
|
"related": [],
|
||
|
"uuid": "df4f8cb3-0cdc-577a-b424-e9f14b8e873b",
|
||
|
"value": "Knowledge of cyber attack stages - K0844"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cyber intrusion activity phases",
|
||
|
"related": [],
|
||
|
"uuid": "f671ae47-71a0-530a-a9f9-db64cd785793",
|
||
|
"value": "Knowledge of cyber intrusion activity phases - K0845"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of malware signature principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "e06b25ff-90c4-58f0-a76c-15b1d7542789",
|
||
|
"value": "Knowledge of malware signature principles and practices - K0860"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of system persistence tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "1dc9ed1c-400d-56f9-ba32-e12e71787c15",
|
||
|
"value": "Knowledge of system persistence tools and techniques - K0973"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence collection development processes",
|
||
|
"related": [],
|
||
|
"uuid": "edba7995-fbb2-5319-916e-4924e88c94f9",
|
||
|
"value": "Knowledge of intelligence collection development processes - K0974"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence collection management tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "77b21424-fde4-50ec-ad6f-bd9d98405102",
|
||
|
"value": "Knowledge of intelligence collection management tools and techniques - K0977"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of information searching tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "ef9c5898-a67b-5945-b9fd-19ed10203646",
|
||
|
"value": "Knowledge of information searching tools and techniques - K0979"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence collection sources",
|
||
|
"related": [],
|
||
|
"uuid": "c77193d6-3f81-5c97-a161-602dca1b1c2c",
|
||
|
"value": "Knowledge of intelligence collection sources - K0980"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of target selection criticality factors",
|
||
|
"related": [],
|
||
|
"uuid": "fb540243-d82f-5470-979a-b20d80e57b2f",
|
||
|
"value": "Knowledge of target selection criticality factors - K0986"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of target selection vulnerability factors",
|
||
|
"related": [],
|
||
|
"uuid": "5bc7c05d-6382-5fe7-b232-447cff272a99",
|
||
|
"value": "Knowledge of target selection vulnerability factors - K0987"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of reporting policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "97046ca4-af9f-5231-acf6-67b64fe21659",
|
||
|
"value": "Knowledge of reporting policies and procedures - K1004"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of midpoint collection principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "c3f904e0-fd0f-539f-aaa0-685ce7ea9b83",
|
||
|
"value": "Knowledge of midpoint collection principles and practices - K1013"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of scripting principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "698c596b-598f-5b7b-b483-aa1e3e081219",
|
||
|
"value": "Knowledge of scripting principles and practices - K1033"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of target intelligence gathering tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "8b619a64-5fc3-5c4f-89cc-30de3031b52d",
|
||
|
"value": "Knowledge of target intelligence gathering tools and techniques - K1041"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of target selection policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "0c5a4b2f-35ac-5d0f-ba2f-514059b97ba6",
|
||
|
"value": "Knowledge of target selection policies and procedures - K1042"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of terminal collection",
|
||
|
"related": [],
|
||
|
"uuid": "55ceae68-3213-5668-a7a8-d0613870ffa4",
|
||
|
"value": "Knowledge of terminal collection - K1046"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of environmental collection",
|
||
|
"related": [],
|
||
|
"uuid": "d79367fc-ba71-53f2-a6a8-c03d32cb798b",
|
||
|
"value": "Knowledge of environmental collection - K1047"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of non-attributable networks",
|
||
|
"related": [],
|
||
|
"uuid": "493d141b-01a5-58d2-8812-8bed3a234e63",
|
||
|
"value": "Knowledge of non-attributable networks - K1105"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of traceroute tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "904a9a35-1c27-5e21-a013-8192581094e3",
|
||
|
"value": "Knowledge of traceroute tools and techniques - K1108"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of organizational objectives",
|
||
|
"related": [],
|
||
|
"uuid": "9662dfc5-f028-57b1-8867-ff58f54cf162",
|
||
|
"value": "Knowledge of organizational objectives - K1187"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of supply chain risk management practices",
|
||
|
"related": [],
|
||
|
"uuid": "f2472128-2696-5d1f-8d44-080c3fef48ee",
|
||
|
"value": "Knowledge of supply chain risk management practices - K1221"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of target requirements",
|
||
|
"related": [],
|
||
|
"uuid": "b68a894f-9294-5d7c-a13b-3d257799e30c",
|
||
|
"value": "Knowledge of target requirements - K1231"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cognitive biases",
|
||
|
"related": [],
|
||
|
"uuid": "b1bb2dfb-a4f4-5f7e-a98d-fe7bbeefa43b",
|
||
|
"value": "Knowledge of cognitive biases - K0658"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of adversarial tactics principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "a5a9b9a3-fe9a-542b-9018-c7af868d63cf",
|
||
|
"value": "Knowledge of adversarial tactics principles and practices - K0788"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of adversarial tactics tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "a1877c8d-71e0-5c8f-8ea0-e5557d9a9954",
|
||
|
"value": "Knowledge of adversarial tactics tools and techniques - K0789"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of adversarial tactics policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "42d488e9-bd3b-57a9-bde1-8f457bc5ed60",
|
||
|
"value": "Knowledge of adversarial tactics policies and procedures - K0790"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of analytic standards and frameworks Skill in assigning analytical confidence ratings",
|
||
|
"related": [],
|
||
|
"uuid": "8a0cba08-9f78-574f-9b2b-ab226249c6f3",
|
||
|
"value": "Knowledge of analytic standards and frameworks Skill in assigning analytical confidence ratings - K0968"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence information repositories",
|
||
|
"related": [],
|
||
|
"uuid": "64b246c6-e816-529c-8227-6e1fa4c3ce55",
|
||
|
"value": "Knowledge of intelligence information repositories - K0989"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of denial and deception tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "ae7017ab-e0fb-56b8-9752-acfd8061795e",
|
||
|
"value": "Knowledge of denial and deception tools and techniques - K0994"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of supervisory control and data acquisition (SCADA) systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "7cb71013-424b-5133-92c6-6502159114d4",
|
||
|
"value": "Knowledge of supervisory control and data acquisition (SCADA) systems and software - K1002"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence collection capabilities and applications",
|
||
|
"related": [],
|
||
|
"uuid": "708dc88c-20d6-588e-9b5b-f9cd9fc5ae2f",
|
||
|
"value": "Knowledge of intelligence collection capabilities and applications - K1005"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence requirements tasking systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "38152699-cf57-5b0b-8cd3-9c6ba598e037",
|
||
|
"value": "Knowledge of intelligence requirements tasking systems and software - K1007"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "8b5e44dd-9eca-5ebf-8bd3-14afefb3fc8b",
|
||
|
"value": "Knowledge of intelligence policies and procedures - K1010"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of request for information processes",
|
||
|
"related": [],
|
||
|
"uuid": "fd0b59ad-bd2c-5b6d-97f1-2f4dd03dce40",
|
||
|
"value": "Knowledge of request for information processes - K1059"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of threat systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "26fffaaf-eeeb-5e33-ad18-1894603faadc",
|
||
|
"value": "Knowledge of threat systems and software - K1068"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of targeting databases",
|
||
|
"related": [],
|
||
|
"uuid": "42fcfba1-1f15-51cc-b3df-e14aa3c00ed3",
|
||
|
"value": "Knowledge of targeting databases - K1106"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of targeting systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "2fbb15bd-ec8f-5061-85c2-fdb6edf1a5ae",
|
||
|
"value": "Knowledge of targeting systems and software - K1107"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of priority intelligence requirements",
|
||
|
"related": [],
|
||
|
"uuid": "9c56136a-f254-5bb1-8737-f8a63e188fdf",
|
||
|
"value": "Knowledge of priority intelligence requirements - K1197"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of dynamic targeting principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "e8d53bdc-04bd-5ed4-b55a-78d9ddeca502",
|
||
|
"value": "Knowledge of dynamic targeting principles and practices - K0995"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of deliberate targeting principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "c438f9aa-8787-5755-a386-161905cb34a5",
|
||
|
"value": "Knowledge of deliberate targeting principles and practices - K0996"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of targeting governing authorities",
|
||
|
"related": [],
|
||
|
"uuid": "e0b59302-41cd-57af-a822-f87ed5ce5d53",
|
||
|
"value": "Knowledge of targeting governing authorities - K1003"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence cycle principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "a0cbcd04-fc70-501f-a1b9-161b24a2cc19",
|
||
|
"value": "Knowledge of intelligence cycle principles and practices - K1006"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of malware characteristics",
|
||
|
"related": [],
|
||
|
"uuid": "dc5ca898-e132-552b-8814-cdf1340a3e34",
|
||
|
"value": "Knowledge of malware characteristics - K1012"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of target estimated recovery times",
|
||
|
"related": [],
|
||
|
"uuid": "3de9e72a-f90d-5bd4-988f-04fa52a1bcfb",
|
||
|
"value": "Knowledge of target estimated recovery times - K1040"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Request For Information (RFI) processes",
|
||
|
"related": [],
|
||
|
"uuid": "cdb13551-d78c-5524-a591-c01eb90076a7",
|
||
|
"value": "Knowledge of Request For Information (RFI) processes - K1064"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of geospatial data analysis tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "a11f03bd-2173-53cc-868d-6c13b15425d5",
|
||
|
"value": "Knowledge of geospatial data analysis tools and techniques - K1104"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of information sanitization methods",
|
||
|
"related": [],
|
||
|
"uuid": "87b96b79-5cdb-5c4d-a196-cd51d5175985",
|
||
|
"value": "Knowledge of information sanitization methods - K1167"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of targeting products",
|
||
|
"related": [],
|
||
|
"uuid": "5d8618f8-f1de-5967-b006-6d2caa71567b",
|
||
|
"value": "Knowledge of targeting products - K1232"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of target characteristics",
|
||
|
"related": [],
|
||
|
"uuid": "8cda3950-2398-5bb4-bf34-704cea2eeb02",
|
||
|
"value": "Knowledge of target characteristics - K1043"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of collection data flow from origin into repositories and tools",
|
||
|
"related": [],
|
||
|
"uuid": "16c9a4c9-de26-54e8-bca4-487f6c01d725",
|
||
|
"value": "Knowledge of collection data flow from origin into repositories and tools - K1051"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of classification guidelines",
|
||
|
"related": [],
|
||
|
"uuid": "3b3697fe-dccc-553b-a453-3da1f1a36c9c",
|
||
|
"value": "Knowledge of classification guidelines - K1116"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network components",
|
||
|
"related": [],
|
||
|
"uuid": "18c3f5f2-a3df-540d-9378-601cafff2de0",
|
||
|
"value": "Knowledge of network components - K1174"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of black-box software testing",
|
||
|
"related": [],
|
||
|
"uuid": "04ba2089-5db9-53f9-88c2-428fa445e30f",
|
||
|
"value": "Knowledge of black-box software testing - K1093"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of customer requirements",
|
||
|
"related": [],
|
||
|
"uuid": "e5247e1c-6041-573f-a10c-8623d0f1dccf",
|
||
|
"value": "Knowledge of customer requirements - K1128"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of evaluation and validation principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "95507cf8-b234-55e4-864d-c2e4ef7a0bb0",
|
||
|
"value": "Knowledge of evaluation and validation principles and practices - K0711"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of industry cybersecurity models and frameworks",
|
||
|
"related": [],
|
||
|
"uuid": "08432f61-324a-5b4a-b5b9-2a1f919b03a7",
|
||
|
"value": "Knowledge of industry cybersecurity models and frameworks - K0879"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of access control models and frameworks",
|
||
|
"related": [],
|
||
|
"uuid": "a9b7cd85-44d3-5126-9297-76aee7c7abc1",
|
||
|
"value": "Knowledge of access control models and frameworks - K0880"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of circuit analysis tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "6db1a46b-2661-5da6-aaa5-21b8a3a10b44",
|
||
|
"value": "Knowledge of circuit analysis tools and techniques - K0883"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of organizational security posture",
|
||
|
"related": [],
|
||
|
"uuid": "95fc21b0-b3ab-5980-896f-30d64c3d3cfb",
|
||
|
"value": "Knowledge of organizational security posture - K1191"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of information technology (IT) architecture models and frameworks",
|
||
|
"related": [],
|
||
|
"uuid": "e53e4d09-2fec-5b35-a994-66c4481c7482",
|
||
|
"value": "Knowledge of information technology (IT) architecture models and frameworks - K0733"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of technology procurement principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "25330898-fc76-5f20-b058-0574ca4b4d10",
|
||
|
"value": "Knowledge of technology procurement principles and practices - K0834"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cyber defense laws and regulations",
|
||
|
"related": [],
|
||
|
"uuid": "8f14e20f-c30f-5d8b-b3c2-dc851009eba6",
|
||
|
"value": "Knowledge of cyber defense laws and regulations - K0892"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of targeting laws and regulations",
|
||
|
"related": [],
|
||
|
"uuid": "2401863c-51f3-5a7f-9894-1fa36509a7e1",
|
||
|
"value": "Knowledge of targeting laws and regulations - K0962"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of exploitation laws and regulations",
|
||
|
"related": [],
|
||
|
"uuid": "8c8faf08-c96d-5231-b6c3-dcd8e227b186",
|
||
|
"value": "Knowledge of exploitation laws and regulations - K0963"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of critical information requirements",
|
||
|
"related": [],
|
||
|
"uuid": "995afa18-8e3f-5a3f-a4ac-9960cd92d288",
|
||
|
"value": "Knowledge of critical information requirements - K1050"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data security controls",
|
||
|
"related": [],
|
||
|
"uuid": "3ed000fc-4584-50f9-871d-e8e177cbfdc3",
|
||
|
"value": "Knowledge of data security controls - K1077"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data privacy controls",
|
||
|
"related": [],
|
||
|
"uuid": "3d33960b-2281-50b5-a902-fd0a6ada852c",
|
||
|
"value": "Knowledge of data privacy controls - K1084"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of configuration management principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "8662c206-8268-511d-8d24-e37b6f6c010a",
|
||
|
"value": "Knowledge of configuration management principles and practices - K1122"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of security requirements",
|
||
|
"related": [],
|
||
|
"uuid": "3448bbd7-3d10-5da2-9e2b-0b21678870b4",
|
||
|
"value": "Knowledge of security requirements - K1213"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of systems architecture",
|
||
|
"related": [],
|
||
|
"uuid": "cfa8767a-f574-500e-a7a4-30c43967cb47",
|
||
|
"value": "Knowledge of systems architecture - K1227"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of systems development",
|
||
|
"related": [],
|
||
|
"uuid": "742c3971-b19d-5ff9-bff1-8b4c51198065",
|
||
|
"value": "Knowledge of systems development - K1228"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of system administration principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "855c0f9c-45eb-5a64-9366-41d551903df5",
|
||
|
"value": "Knowledge of system administration principles and practices - K0770"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of hardening tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "b0a1bd6a-cffd-5348-bb46-e69d2917d978",
|
||
|
"value": "Knowledge of hardening tools and techniques - K0837"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of learning assessment tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "2ac3dc7c-7495-53c2-be77-d08785bf8bde",
|
||
|
"value": "Knowledge of learning assessment tools and techniques - K0881"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Extensible Markup Language (XML) schemas",
|
||
|
"related": [],
|
||
|
"uuid": "384b048f-5724-54eb-866a-b7e22af1ef8b",
|
||
|
"value": "Knowledge of Extensible Markup Language (XML) schemas - K0176"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of digital forensic data principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "afcf05fc-bdf2-5955-acbd-f443c4dc94d6",
|
||
|
"value": "Knowledge of digital forensic data principles and practices - K0696"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of hardware maintenance policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "189d5109-0f64-529a-9304-4098368a7dfe",
|
||
|
"value": "Knowledge of hardware maintenance policies and procedures - K0780"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network configurations",
|
||
|
"related": [],
|
||
|
"uuid": "53f20007-0a26-5622-8d11-92613473f14c",
|
||
|
"value": "Knowledge of network configurations - K0792"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of ethical hacking tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "c8bc4a88-5534-5ab1-8f02-5941ef50d706",
|
||
|
"value": "Knowledge of ethical hacking tools and techniques - K0797"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of digital forensics data characteristics",
|
||
|
"related": [],
|
||
|
"uuid": "5b31c2e0-4b32-5b1c-9486-d1183af23c8c",
|
||
|
"value": "Knowledge of digital forensics data characteristics - K0809"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of digital communication systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "e9e5cd76-e82d-55ba-9b6e-4da5f139e338",
|
||
|
"value": "Knowledge of digital communication systems and software - K0812"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of middleware software capabilities and applications",
|
||
|
"related": [],
|
||
|
"uuid": "f88497b3-8e46-5736-a8bc-8a49d8e2415f",
|
||
|
"value": "Knowledge of middleware software capabilities and applications - K0841"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of ethical hacking principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "317938d6-44d6-595e-bda4-fb2a761298e2",
|
||
|
"value": "Knowledge of ethical hacking principles and practices - K0882"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of covert communication tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "acf512f1-a057-5f30-9316-da35776b2f5b",
|
||
|
"value": "Knowledge of covert communication tools and techniques - K0884"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of operating system structures and internals",
|
||
|
"related": [],
|
||
|
"uuid": "e4e7c54d-8c05-52e4-a41e-6a08e13758a4",
|
||
|
"value": "Knowledge of operating system structures and internals - K0923"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network analysis tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "ae05f19b-8856-5921-912c-ed80440223e0",
|
||
|
"value": "Knowledge of network analysis tools and techniques - K0924"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of wireless communication tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "61e57468-872a-573e-803b-bed7b3b8da3a",
|
||
|
"value": "Knowledge of wireless communication tools and techniques - K0925"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of signal jamming tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "23d5c9fd-e676-5388-8dc5-3e5c1c4a22b9",
|
||
|
"value": "Knowledge of signal jamming tools and techniques - K0926"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network hardware threats and vulnerabilities",
|
||
|
"related": [],
|
||
|
"uuid": "a92f7e69-f37f-5536-84ad-ccd9059ba76f",
|
||
|
"value": "Knowledge of network hardware threats and vulnerabilities - K0936"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of operations security (OPSEC) principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "045218e8-92d2-5e94-aeb4-637556aba743",
|
||
|
"value": "Knowledge of operations security (OPSEC) principles and practices - K1019"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of hardware asset management principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "c0c28c3e-aaa4-543f-80b6-58896b4cfe99",
|
||
|
"value": "Knowledge of hardware asset management principles and practices - K1073"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of mission requirements",
|
||
|
"related": [],
|
||
|
"uuid": "0bcd19bc-4425-531b-a054-37cd627e2691",
|
||
|
"value": "Knowledge of mission requirements - K1172"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of reverse engineering tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "7ab51bd6-57a5-5a21-9b63-b57f7136ebc3",
|
||
|
"value": "Knowledge of reverse engineering tools and techniques - K1207"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of software and sytems engineering life cycle standards",
|
||
|
"related": [],
|
||
|
"uuid": "ce6bf750-aa16-5eb1-a986-08a7ffdc6472",
|
||
|
"value": "Knowledge of software and sytems engineering life cycle standards - K1217"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of operational planning processes",
|
||
|
"related": [],
|
||
|
"uuid": "3a8d52a8-aa67-5612-9049-4157b0b2f03b",
|
||
|
"value": "Knowledge of operational planning processes - K0498"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cybersecurity operation policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "74d17734-365a-50b3-97cf-a1b31df79c68",
|
||
|
"value": "Knowledge of cybersecurity operation policies and procedures - K0644"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data asset management principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "a09db539-527e-5434-ac7c-bc877d661bf7",
|
||
|
"value": "Knowledge of data asset management principles and practices - K0766"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of insider threat laws and regulations",
|
||
|
"related": [],
|
||
|
"uuid": "cf50fb99-9698-59d5-b528-63f052f9611c",
|
||
|
"value": "Knowledge of insider threat laws and regulations - K0784"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of insider threat tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "1b2d7907-6c57-5875-9096-1ec94642b17a",
|
||
|
"value": "Knowledge of insider threat tools and techniques - K0785"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of project management principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "d49ef4b3-4836-5b43-879c-ef400557d142",
|
||
|
"value": "Knowledge of project management principles and practices - K0799"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of evidence admissibility laws and regulations",
|
||
|
"related": [],
|
||
|
"uuid": "bc70fcba-d2de-54d9-9899-51136a7334da",
|
||
|
"value": "Knowledge of evidence admissibility laws and regulations - K0800"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of new and emerging cybersecurity risks",
|
||
|
"related": [],
|
||
|
"uuid": "f4cda90e-51e4-5ed5-9940-67fcc6bdce44",
|
||
|
"value": "Knowledge of new and emerging cybersecurity risks - K0818"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of import and export control laws and regulations",
|
||
|
"related": [],
|
||
|
"uuid": "8e66db64-dc6e-5bf9-9186-6dfbdd479266",
|
||
|
"value": "Knowledge of import and export control laws and regulations - K0819"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of federal agency roles and responsibilities",
|
||
|
"related": [],
|
||
|
"uuid": "d0e746de-b37a-57e9-a996-69a123034bc2",
|
||
|
"value": "Knowledge of federal agency roles and responsibilities - K0821"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of threat vector characteristics",
|
||
|
"related": [],
|
||
|
"uuid": "d3341f1d-a377-54fb-b57b-08ebf14a3a7b",
|
||
|
"value": "Knowledge of threat vector characteristics - K0825"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network attack vectors",
|
||
|
"related": [],
|
||
|
"uuid": "a02efb0e-cdc0-598f-bf9a-49860fcdc689",
|
||
|
"value": "Knowledge of network attack vectors - K0831"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of malware analysis tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "36ac0367-8a96-5b31-bfbd-ca81d3949879",
|
||
|
"value": "Knowledge of malware analysis tools and techniques - K0857"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of crisis management protocols",
|
||
|
"related": [],
|
||
|
"uuid": "1065467b-c6bb-51b0-95c6-9fb765d8e3a6",
|
||
|
"value": "Knowledge of crisis management protocols - K0899"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of crisis management processes",
|
||
|
"related": [],
|
||
|
"uuid": "fef251d0-45d9-59c4-9527-4623e822e324",
|
||
|
"value": "Knowledge of crisis management processes - K0900"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of crisis management tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "20d5d16b-915f-55ba-8ed7-2bbbd71b7cbd",
|
||
|
"value": "Knowledge of crisis management tools and techniques - K0901"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of malware analysis principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "7ee18f37-8cad-5dfa-8e56-b8c48ddc494d",
|
||
|
"value": "Knowledge of malware analysis principles and practices - K0916"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of operational design principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "2f7bf576-3028-5bbd-b97c-d3bb8c4f72a9",
|
||
|
"value": "Knowledge of operational design principles and practices - K0959"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of content management system (CMS) capabilities and applications",
|
||
|
"related": [],
|
||
|
"uuid": "cd086f00-4133-5e2e-a0d2-276106315ce7",
|
||
|
"value": "Knowledge of content management system (CMS) capabilities and applications - K0960"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of planning systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "fd956c80-d91a-528a-89af-5cf04f509466",
|
||
|
"value": "Knowledge of planning systems and software - K0961"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cyber-attack tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "93ee072d-1e8b-5004-968b-b7a763e2c8ac",
|
||
|
"value": "Knowledge of cyber-attack tools and techniques - K0969"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence collection planning processes",
|
||
|
"related": [],
|
||
|
"uuid": "c152ee55-e73d-5833-b229-f70bdc68f04f",
|
||
|
"value": "Knowledge of intelligence collection planning processes - K0978"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of web security principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "9a8608b1-549d-5eaf-aa8a-effdd37814af",
|
||
|
"value": "Knowledge of web security principles and practices - K0984"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of crisis action plan models and frameworks",
|
||
|
"related": [],
|
||
|
"uuid": "1fc22cd1-b9d8-5ac0-94ff-f1575b420d48",
|
||
|
"value": "Knowledge of crisis action plan models and frameworks - K0985"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cyber operations principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "2cbcfa77-8813-53fe-841a-568aadb2049d",
|
||
|
"value": "Knowledge of cyber operations principles and practices - K0990"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of intelligence support activities",
|
||
|
"related": [],
|
||
|
"uuid": "72e346b7-3cf8-5a88-b8d1-d87e202a23bf",
|
||
|
"value": "Knowledge of intelligence support activities - K1008"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of threat intelligence principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "72c74de9-ba49-5fd8-bab3-1d29e36f4855",
|
||
|
"value": "Knowledge of threat intelligence principles and practices - K1009"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network addressing principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "98fa4be7-4ec8-5335-9362-331256305736",
|
||
|
"value": "Knowledge of network addressing principles and practices - K1011"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of operational effectiveness assessment principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "0481b8fd-92c3-5427-a7f9-8bf9b5f6b175",
|
||
|
"value": "Knowledge of operational effectiveness assessment principles and practices - K1017"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of organization decision support tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "a5f3167f-99c3-50dd-8e53-531485e88927",
|
||
|
"value": "Knowledge of organization decision support tools and techniques - K1020"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of decision-making policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "fc3801e7-4641-5a33-960e-22573fe3399f",
|
||
|
"value": "Knowledge of decision-making policies and procedures - K1025"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of target development principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "cf8609db-e2e8-56da-b55d-165836218860",
|
||
|
"value": "Knowledge of target development principles and practices - K1028"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of operational planning tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "0a25e665-d1a7-55dc-a710-b58fbc7efa47",
|
||
|
"value": "Knowledge of operational planning tools and techniques - K1030"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of target research tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "523f2bb0-a43d-5970-b189-45590b72eaa6",
|
||
|
"value": "Knowledge of target research tools and techniques - K1035"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of target organization structures",
|
||
|
"related": [],
|
||
|
"uuid": "559faa37-46b2-5044-92e8-040308fb414b",
|
||
|
"value": "Knowledge of target organization structures - K1036"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of target critical capabilities",
|
||
|
"related": [],
|
||
|
"uuid": "90cb7313-76b2-5dbc-b428-066876c998d9",
|
||
|
"value": "Knowledge of target critical capabilities - K1037"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of target critical vulnerabilities",
|
||
|
"related": [],
|
||
|
"uuid": "5be47f21-0537-5d3e-917e-e024f287c1b6",
|
||
|
"value": "Knowledge of target critical vulnerabilities - K1038"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of red team functions and capabilities",
|
||
|
"related": [],
|
||
|
"uuid": "a97e2c07-f732-5003-ae3b-93ba8737339a",
|
||
|
"value": "Knowledge of red team functions and capabilities - K1054"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network operations principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "f8029bcb-7629-5801-b631-56965d5b6aa6",
|
||
|
"value": "Knowledge of network operations principles and practices - K1065"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of threat behaviors",
|
||
|
"related": [],
|
||
|
"uuid": "658a888c-02b2-5fef-a3b5-0192c5984354",
|
||
|
"value": "Knowledge of threat behaviors - K1066"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of target behaviors",
|
||
|
"related": [],
|
||
|
"uuid": "3cd01a52-c1e7-5b8a-8439-cc42ac3e04c2",
|
||
|
"value": "Knowledge of target behaviors - K1067"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of analytics",
|
||
|
"related": [],
|
||
|
"uuid": "28e68b55-bd87-5008-a2b2-9f13fdeaa229",
|
||
|
"value": "Knowledge of analytics - K1101"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of virtual collaborative workspace tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "d71e40fe-8f41-59d2-a2d3-42fad424ed13",
|
||
|
"value": "Knowledge of virtual collaborative workspace tools and techniques - K1109"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of encryption algorithms",
|
||
|
"related": [],
|
||
|
"uuid": "7f857d42-d54a-524f-a272-1ec76b53f4a8",
|
||
|
"value": "Knowledge of encryption algorithms - K0018"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of microprocessors",
|
||
|
"related": [],
|
||
|
"uuid": "5e881b3a-6b4c-59c5-a6ea-f29b920c8f44",
|
||
|
"value": "Knowledge of microprocessors - K0055"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of technology integration processes",
|
||
|
"related": [],
|
||
|
"uuid": "5dcb9a90-2d34-566a-89e0-7e0a56502656",
|
||
|
"value": "Knowledge of technology integration processes - K0092"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of system optimization techniques",
|
||
|
"related": [],
|
||
|
"uuid": "8e1185d8-7ef7-5d3c-a3a8-580feb0d838b",
|
||
|
"value": "Knowledge of system optimization techniques - K0646"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of computer networking protocols",
|
||
|
"related": [],
|
||
|
"uuid": "747ade0b-dc28-591e-b470-eb0620be5ad0",
|
||
|
"value": "Knowledge of computer networking protocols - K0674"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of risk management processes",
|
||
|
"related": [],
|
||
|
"uuid": "d0aed9ef-4595-512d-96db-749a70f8ae97",
|
||
|
"value": "Knowledge of risk management processes - K0675"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cybersecurity laws and regulations",
|
||
|
"related": [],
|
||
|
"uuid": "0e5566e6-93bf-5d95-a688-b4ea71efa4ba",
|
||
|
"value": "Knowledge of cybersecurity laws and regulations - K0676"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cybersecurity policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "8aa1b283-2196-53c7-b93a-2407a7cf5b38",
|
||
|
"value": "Knowledge of cybersecurity policies and procedures - K0677"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of privacy laws and regulations",
|
||
|
"related": [],
|
||
|
"uuid": "f13b4ec8-6224-51f9-9e25-08f613f3e519",
|
||
|
"value": "Knowledge of privacy laws and regulations - K0678"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of privacy policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "781bc64a-bb2e-550d-b870-9574425fd906",
|
||
|
"value": "Knowledge of privacy policies and procedures - K0679"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cybersecurity principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "15e1da57-4b39-5261-b2d7-92103dd6d7df",
|
||
|
"value": "Knowledge of cybersecurity principles and practices - K0680"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of privacy principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "caed9b79-a7f9-52dd-9a82-fc33afda374a",
|
||
|
"value": "Knowledge of privacy principles and practices - K0681"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cybersecurity threats",
|
||
|
"related": [],
|
||
|
"uuid": "b2f76ba5-8577-5d14-9cb2-44be96e07b51",
|
||
|
"value": "Knowledge of cybersecurity threats - K0682"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cybersecurity vulnerabilities",
|
||
|
"related": [],
|
||
|
"uuid": "c9923ebe-25b1-5d42-a0e3-0246aaf875b1",
|
||
|
"value": "Knowledge of cybersecurity vulnerabilities - K0683"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cybersecurity threat characteristics",
|
||
|
"related": [],
|
||
|
"uuid": "f2731394-e99d-5527-a060-a41c0f226a9a",
|
||
|
"value": "Knowledge of cybersecurity threat characteristics - K0684"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of access control principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "37106b7e-fef4-5184-9bcc-71882f7ff3b7",
|
||
|
"value": "Knowledge of access control principles and practices - K0685"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of authentication and authorization tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "bbb7025d-36a0-5ed2-9481-fc920c7b5070",
|
||
|
"value": "Knowledge of authentication and authorization tools and techniques - K0686"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of business operations standards and best practices",
|
||
|
"related": [],
|
||
|
"uuid": "2956934a-46ba-5436-bef6-844761c213be",
|
||
|
"value": "Knowledge of business operations standards and best practices - K0687"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of common application vulnerabilities",
|
||
|
"related": [],
|
||
|
"uuid": "72eac40c-10d8-57a9-8184-1dae63ff7952",
|
||
|
"value": "Knowledge of common application vulnerabilities - K0688"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network infrastructure principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "bc46ebd1-6ca8-54f4-8ea9-511e33ffd5e3",
|
||
|
"value": "Knowledge of network infrastructure principles and practices - K0689"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of requirements analysis principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "19f32f88-1443-57e4-a816-564fecb5d1ce",
|
||
|
"value": "Knowledge of requirements analysis principles and practices - K0690"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cyber defense tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "2b0e9340-e9ef-5496-95af-3d34d8b8cfde",
|
||
|
"value": "Knowledge of cyber defense tools and techniques - K0691"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of vulnerability assessment tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "48e2fb0a-fa81-5a55-91fd-f40b1ec5d7fc",
|
||
|
"value": "Knowledge of vulnerability assessment tools and techniques - K0692"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of computer algorithm capabilities and applications",
|
||
|
"related": [],
|
||
|
"uuid": "9172777b-5b99-53d0-9929-ca6cf40fd810",
|
||
|
"value": "Knowledge of computer algorithm capabilities and applications - K0694"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cryptographic key management principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "d424d456-ca18-57d2-96cd-17647d3c0572",
|
||
|
"value": "Knowledge of cryptographic key management principles and practices - K0698"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of database systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "e81cf97a-c973-5fbf-83ca-9d734d4906fd",
|
||
|
"value": "Knowledge of database systems and software - K0707"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of business continuity and disaster recovery (BCDR) policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "e5464488-b4ac-5b2d-82e6-f68397093cb4",
|
||
|
"value": "Knowledge of business continuity and disaster recovery (BCDR) policies and procedures - K0709"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of enterprise cybersecurity architecture principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "c504388b-d239-5d0f-ae3c-b845027a839c",
|
||
|
"value": "Knowledge of enterprise cybersecurity architecture principles and practices - K0710"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of electrical engineering principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "51552ffc-d2ce-5970-8f37-c67ce51410e0",
|
||
|
"value": "Knowledge of electrical engineering principles and practices - K0714"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network communications principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "d0dd4b14-c850-5adf-9f68-fd53c27cde60",
|
||
|
"value": "Knowledge of network communications principles and practices - K0718"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of human-computer interaction (HCI) principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "3ce720cb-af6a-5746-8d53-e5a487b4be3c",
|
||
|
"value": "Knowledge of human-computer interaction (HCI) principles and practices - K0719"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Security Assessment and Authorization (SA&A) processes",
|
||
|
"related": [],
|
||
|
"uuid": "00058e7d-695d-5e7b-b4c6-82a6c4032a4c",
|
||
|
"value": "Knowledge of Security Assessment and Authorization (SA&A) processes - K0720"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of analysis standards and best practices",
|
||
|
"related": [],
|
||
|
"uuid": "31cb4acc-a242-5315-bd83-c0e2919efb7a",
|
||
|
"value": "Knowledge of analysis standards and best practices - K0727"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Confidentiality, Integrity and Availability (CIA) principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "ecf34a11-026b-5ae6-abff-ad57798e3358",
|
||
|
"value": "Knowledge of Confidentiality, Integrity and Availability (CIA) principles and practices - K0728"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of non-repudiation principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "1403098e-8d0e-5a15-9d1a-6666d3c17495",
|
||
|
"value": "Knowledge of non-repudiation principles and practices - K0729"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cyber safety principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "bb86da19-ebe4-53b6-b0d2-bbf56fd35ac5",
|
||
|
"value": "Knowledge of cyber safety principles and practices - K0730"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of systems security engineering (SSE) principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "1bb87952-bf49-5126-85b3-cbc6b5b5f972",
|
||
|
"value": "Knowledge of systems security engineering (SSE) principles and practices - K0731"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of information technology (IT) security principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "6f01d26a-753b-52eb-aec3-d5e138d662b5",
|
||
|
"value": "Knowledge of information technology (IT) security principles and practices - K0736"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of mathematics principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "be7f2e7d-f231-5ece-98ab-b71e10afc0a5",
|
||
|
"value": "Knowledge of mathematics principles and practices - K0739"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of identity and access management (IAM) principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "4ee2f73b-04a2-5514-b207-d0142d2cf8fa",
|
||
|
"value": "Knowledge of identity and access management (IAM) principles and practices - K0742"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of new and emerging technologies",
|
||
|
"related": [],
|
||
|
"uuid": "9211bede-118d-5098-8f47-29b8b8cf1330",
|
||
|
"value": "Knowledge of new and emerging technologies - K0743"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of operating system (OS) systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "3e4b2c76-ab54-512e-996e-6789a17b426f",
|
||
|
"value": "Knowledge of operating system (OS) systems and software - K0744"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of parallel and distributed computing principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "ba8596fc-2a5b-5881-a289-5a1380443397",
|
||
|
"value": "Knowledge of parallel and distributed computing principles and practices - K0745"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of process engineering principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "888ff322-f4ef-50c4-8377-4a7cc0272796",
|
||
|
"value": "Knowledge of process engineering principles and practices - K0749"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of system threats",
|
||
|
"related": [],
|
||
|
"uuid": "584af903-8217-5584-8924-e3b4eb7ffc3e",
|
||
|
"value": "Knowledge of system threats - K0751"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of system vulnerabilities",
|
||
|
"related": [],
|
||
|
"uuid": "78959d93-b5f7-5a2b-915c-2f61de3e71a1",
|
||
|
"value": "Knowledge of system vulnerabilities - K0752"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of remote access principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "b6e7f861-0553-52f4-a0a8-d09fa43f2073",
|
||
|
"value": "Knowledge of remote access principles and practices - K0753"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of security management principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "3749bdb2-f151-5d45-bd49-7b5c01013375",
|
||
|
"value": "Knowledge of security management principles and practices - K0756"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of system design tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "236bafd6-9c71-51c9-946e-7e7439ffa746",
|
||
|
"value": "Knowledge of system design tools and techniques - K0757"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of server administration principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "783350ea-5a3f-53d8-8ddd-0f75ff27adfc",
|
||
|
"value": "Knowledge of server administration principles and practices - K0758"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of client and server architecture",
|
||
|
"related": [],
|
||
|
"uuid": "ca5edd17-1f9e-5f4b-a880-f43e1ba459d6",
|
||
|
"value": "Knowledge of client and server architecture - K0759"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of software engineering principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "df13d2c9-c6d7-51f9-b512-0a22764b9539",
|
||
|
"value": "Knowledge of software engineering principles and practices - K0765"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of automated systems analysis tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "2db2c2a9-79fd-5b40-a417-4bbf2417de3d",
|
||
|
"value": "Knowledge of automated systems analysis tools and techniques - K0768"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of systems testing and evaluation tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "f32ef096-89b3-56ea-8334-6ee889cfec14",
|
||
|
"value": "Knowledge of systems testing and evaluation tools and techniques - K0772"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of telecommunications principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "c47bae29-537d-5e89-828f-c5b1d69cbad5",
|
||
|
"value": "Knowledge of telecommunications principles and practices - K0773"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of enterprise information technology (IT) architecture principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "87099a36-c2d5-5eec-bd16-06d2d8d8a404",
|
||
|
"value": "Knowledge of enterprise information technology (IT) architecture principles and practices - K0778"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of systems engineering processes",
|
||
|
"related": [],
|
||
|
"uuid": "8b3bcd60-16f1-5181-9a03-85afc9079ebf",
|
||
|
"value": "Knowledge of systems engineering processes - K0779"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of defense-in-depth principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "bfefb77b-9cb4-506e-8175-adc9dfe1d7a4",
|
||
|
"value": "Knowledge of defense-in-depth principles and practices - K0791"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of secure coding tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "fa5d5024-e50a-5f70-9ace-aa4f7ecfccd8",
|
||
|
"value": "Knowledge of secure coding tools and techniques - K0814"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of risk assessment principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "f1461a58-5df0-5f10-b4d9-b9a167fc3c3d",
|
||
|
"value": "Knowledge of risk assessment principles and practices - K0835"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of threat assessment principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "7429c812-e4f8-5fbf-a9b2-dcc9d29fefaf",
|
||
|
"value": "Knowledge of threat assessment principles and practices - K0836"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of critical infrastructure systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "ca75131c-500e-5bb5-bdcf-46f92c44d860",
|
||
|
"value": "Knowledge of critical infrastructure systems and software - K0839"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of hardware reverse engineering tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "400e3012-f557-5275-bbcd-b15a02b3879b",
|
||
|
"value": "Knowledge of hardware reverse engineering tools and techniques - K0840"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of software reverse engineering tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "8438860d-de15-5a40-916b-8d3472c7fc0a",
|
||
|
"value": "Knowledge of software reverse engineering tools and techniques - K0842"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of secure software deployment principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "c573cf5c-7ba8-50d9-9ed3-556b39a60a2b",
|
||
|
"value": "Knowledge of secure software deployment principles and practices - K0846"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of secure software deployment tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "4c62eadc-84cd-5aa3-bad8-56028fbe6cd2",
|
||
|
"value": "Knowledge of secure software deployment tools and techniques - K0847"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network systems management principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "2d914b1b-9bc7-5b07-b382-849a402b5d14",
|
||
|
"value": "Knowledge of network systems management principles and practices - K0848"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network systems management tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "f8474f35-68ca-5fa3-b295-9b8a9a8d7bcc",
|
||
|
"value": "Knowledge of network systems management tools and techniques - K0849"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of reverse engineering principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "97dd9de3-c7a1-57e1-b442-db9c103697d0",
|
||
|
"value": "Knowledge of reverse engineering principles and practices - K0851"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of encryption tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "37f0c4f5-bd19-55f3-ac59-8a203c42056a",
|
||
|
"value": "Knowledge of encryption tools and techniques - K0859"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data classification standards and best practices",
|
||
|
"related": [],
|
||
|
"uuid": "81c965aa-24d2-5c4a-a5a5-06d10cbaec12",
|
||
|
"value": "Knowledge of data classification standards and best practices - K0865"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data classification tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "7c8eb03b-ef2c-5a6b-a5f5-17496b10a29d",
|
||
|
"value": "Knowledge of data classification tools and techniques - K0866"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of process improvement principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "28b3f1e5-ff83-5631-a60b-dbf1bb6e272f",
|
||
|
"value": "Knowledge of process improvement principles and practices - K0868"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of process maturity models and frameworks",
|
||
|
"related": [],
|
||
|
"uuid": "9f425b57-664f-5c22-9769-2d135c4d5dd4",
|
||
|
"value": "Knowledge of process maturity models and frameworks - K0869"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of enterprise architecture (EA) reference models and frameworks",
|
||
|
"related": [],
|
||
|
"uuid": "af401500-3d21-598b-9fbb-2c2ff3f5b627",
|
||
|
"value": "Knowledge of enterprise architecture (EA) reference models and frameworks - K0870"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of enterprise architecture (EA) principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "36a36447-6d1d-5274-9131-570d96ab0cb4",
|
||
|
"value": "Knowledge of enterprise architecture (EA) principles and practices - K0871"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of service management principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "4659c948-99a6-5f43-a381-e34f321b84a7",
|
||
|
"value": "Knowledge of service management principles and practices - K0872"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of service management standards and best practices",
|
||
|
"related": [],
|
||
|
"uuid": "ffd97e67-ed08-5466-8a81-70ccb514a71b",
|
||
|
"value": "Knowledge of service management standards and best practices - K0873"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of key management service (KMS) principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "6e729a7a-c131-5f64-866a-21846d2223cc",
|
||
|
"value": "Knowledge of key management service (KMS) principles and practices - K0874"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of symmetric encryption principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "5c6bfc12-ba80-5d05-930c-1f53d20b391d",
|
||
|
"value": "Knowledge of symmetric encryption principles and practices - K0875"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of key management service (KMS) key rotation policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "1cd4c395-d676-53c4-8dbd-5d46324724bd",
|
||
|
"value": "Knowledge of key management service (KMS) key rotation policies and procedures - K0876"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of application firewall principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "6e10018b-bb73-5de3-9d26-a5521c9c231e",
|
||
|
"value": "Knowledge of application firewall principles and practices - K0877"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network firewall principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "ff86bdee-3389-56d1-9776-e2d6e2dd418b",
|
||
|
"value": "Knowledge of network firewall principles and practices - K0878"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of the Open Systems Interconnect (OSI) reference model",
|
||
|
"related": [],
|
||
|
"uuid": "0b855034-1c29-5675-8b04-9a20cf808aea",
|
||
|
"value": "Knowledge of the Open Systems Interconnect (OSI) reference model - K0891"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of computer architecture principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "5cc1ab9c-db32-5f0d-9893-9c8c202f3e8d",
|
||
|
"value": "Knowledge of computer architecture principles and practices - K0894"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of multi-level security (MLS) systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "a504724a-cfb1-5545-a19c-38c98ff0e7ef",
|
||
|
"value": "Knowledge of multi-level security (MLS) systems and software - K0906"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cross-domain solutions",
|
||
|
"related": [],
|
||
|
"uuid": "b6959fd5-0aa9-5d72-8c17-ef3c0be0b7a2",
|
||
|
"value": "Knowledge of cross-domain solutions - K0907"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network architecture principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "6cc32d41-5faa-5fe7-9be5-5615f8ff2925",
|
||
|
"value": "Knowledge of network architecture principles and practices - K0915"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Personally Identifiable Information (PII) data security standards and best practices",
|
||
|
"related": [],
|
||
|
"uuid": "7fba4196-537a-5642-a54c-772c35214016",
|
||
|
"value": "Knowledge of Personally Identifiable Information (PII) data security standards and best practices - K0917"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Payment Card Industry (PCI) data security standards and best practices",
|
||
|
"related": [],
|
||
|
"uuid": "f0052965-c509-5ee5-a7dc-da841d9ef595",
|
||
|
"value": "Knowledge of Payment Card Industry (PCI) data security standards and best practices - K0918"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Personal Health Information (PHI) data security standards and best practices",
|
||
|
"related": [],
|
||
|
"uuid": "f929e10a-18da-5333-ac9d-29b03c61b118",
|
||
|
"value": "Knowledge of Personal Health Information (PHI) data security standards and best practices - K0919"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of program protection plan (PPP) principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "44cb1abc-f18b-59af-830c-bb4c10c4e984",
|
||
|
"value": "Knowledge of program protection plan (PPP) principles and practices - K0921"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of configuration management tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "e94976e6-130b-5954-a155-83808bc12f84",
|
||
|
"value": "Knowledge of configuration management tools and techniques - K0927"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of systems engineering principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "911b76f0-1b5a-5177-ac49-be172a2a6339",
|
||
|
"value": "Knowledge of systems engineering principles and practices - K0928"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of N-tier architecture principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "87c384d9-0f56-5f25-aaf3-3cab2d315297",
|
||
|
"value": "Knowledge of N-tier architecture principles and practices - K0933"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data classification policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "a24bae69-3554-54fe-b152-8e03916bd5a5",
|
||
|
"value": "Knowledge of data classification policies and procedures - K0934"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cryptology principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "5d25c7ec-4c0c-5598-abd5-6a8c7953388f",
|
||
|
"value": "Knowledge of cryptology principles and practices - K0942"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of computer engineering principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "3fdd7418-4c8d-5ed1-bce7-cf6f2fbb1556",
|
||
|
"value": "Knowledge of computer engineering principles and practices - K0947"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of embedded systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "fd05e5f9-115f-50af-8c53-a524eb1a0357",
|
||
|
"value": "Knowledge of embedded systems and software - K0948"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of fault tolerance tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "5b885586-0845-5440-88a5-b9196436c833",
|
||
|
"value": "Knowledge of fault tolerance tools and techniques - K0949"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of information theory principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "d80844a4-a2df-5dc6-9759-ad0013226c9d",
|
||
|
"value": "Knowledge of information theory principles and practices - K0952"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of computer networking principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "5f7a7797-dd0e-544f-941a-49ae49d3af24",
|
||
|
"value": "Knowledge of computer networking principles and practices - K0983"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network security principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "8a125129-778b-55de-b7cb-53f14f862873",
|
||
|
"value": "Knowledge of network security principles and practices - K1014"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of routing protocols",
|
||
|
"related": [],
|
||
|
"uuid": "50fbddc9-b108-5e89-bef6-201ae06742a6",
|
||
|
"value": "Knowledge of routing protocols - K1049"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of secure software update principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "ede0afce-27a9-5bd6-8b13-a741de22bf36",
|
||
|
"value": "Knowledge of secure software update principles and practices - K1080"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of secure firmware update principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "f1ff5c6d-de61-50ec-859c-3f46c1c7f232",
|
||
|
"value": "Knowledge of secure firmware update principles and practices - K1081"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of design modeling",
|
||
|
"related": [],
|
||
|
"uuid": "25a798c1-bcc4-5c7c-80f5-36794c5d2230",
|
||
|
"value": "Knowledge of design modeling - K1086"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of design methods",
|
||
|
"related": [],
|
||
|
"uuid": "83c97b76-fd6e-5e22-8dac-b04853183f61",
|
||
|
"value": "Knowledge of design methods - K1095"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of acquisition cybersecurity requirements",
|
||
|
"related": [],
|
||
|
"uuid": "6bdb6a70-707e-5422-8811-b90fa4a7bf43",
|
||
|
"value": "Knowledge of acquisition cybersecurity requirements - K1110"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of application security design principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "5ebbbe29-caa2-5906-b2d2-c4d9115a3337",
|
||
|
"value": "Knowledge of application security design principles and practices - K1111"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Confidentiality, Integrity, Availability, Authenticity, and Non-repudiation (CIAAN) principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "e56adac9-664a-5ec3-acb6-a4a281523c9f",
|
||
|
"value": "Knowledge of Confidentiality, Integrity, Availability, Authenticity, and Non-repudiation (CIAAN) principles and practices - K1120"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cybersecurity requirements",
|
||
|
"related": [],
|
||
|
"uuid": "f0f5fb3a-5d53-58f0-80e8-0b852dd15511",
|
||
|
"value": "Knowledge of cybersecurity requirements - K1137"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data classification levels",
|
||
|
"related": [],
|
||
|
"uuid": "e79c16ba-9f5d-5cf2-a933-c6b2dcbb42d1",
|
||
|
"value": "Knowledge of data classification levels - K1143"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of fail-over or alternate site requirements",
|
||
|
"related": [],
|
||
|
"uuid": "4fa8695c-ee0c-5eeb-953f-2b4c3d6f7c88",
|
||
|
"value": "Knowledge of fail-over or alternate site requirements - K1159"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of material supportability requirements",
|
||
|
"related": [],
|
||
|
"uuid": "771b122d-3a64-571e-be39-d791c98f2bea",
|
||
|
"value": "Knowledge of material supportability requirements - K1169"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of multilevel security requirements",
|
||
|
"related": [],
|
||
|
"uuid": "bb50dc2c-e8ea-54e0-8754-a146430b9276",
|
||
|
"value": "Knowledge of multilevel security requirements - K1173"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Personally Identifiable Information (PII) attributes",
|
||
|
"related": [],
|
||
|
"uuid": "f7721d3f-4b07-550a-ba82-aefc901d1ad6",
|
||
|
"value": "Knowledge of Personally Identifiable Information (PII) attributes - K1194"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of security controls",
|
||
|
"related": [],
|
||
|
"uuid": "fe0a5b45-eede-5f15-aef9-bfb9f297bc14",
|
||
|
"value": "Knowledge of security controls - K1212"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of service-oriented security architecture practices and principles",
|
||
|
"related": [],
|
||
|
"uuid": "e83fd16a-082d-577e-864a-4380e30505f0",
|
||
|
"value": "Knowledge of service-oriented security architecture practices and principles - K1216"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of system backup requirements",
|
||
|
"related": [],
|
||
|
"uuid": "4413cc6d-1b97-5c30-b99b-cc7968882af7",
|
||
|
"value": "Knowledge of system backup requirements - K1223"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of user requirements",
|
||
|
"related": [],
|
||
|
"uuid": "54fdce39-0e4b-5a7a-9152-a435f9dbbe6a",
|
||
|
"value": "Knowledge of user requirements - K1236"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of programming language structures and logic",
|
||
|
"related": [],
|
||
|
"uuid": "a9f7e0d3-6d48-5ed9-894d-775833ee6962",
|
||
|
"value": "Knowledge of programming language structures and logic - K0068"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of code tailoring tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "78862238-34be-5cd3-883a-2cbb35d6a331",
|
||
|
"value": "Knowledge of code tailoring tools and techniques - K0639"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of complex data structure capabilities and applications",
|
||
|
"related": [],
|
||
|
"uuid": "73afd08c-06cf-5f71-8462-22eff38b57de",
|
||
|
"value": "Knowledge of complex data structure capabilities and applications - K0693"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of programming principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "a643e0c4-755b-5294-8424-8c15cac4a7e0",
|
||
|
"value": "Knowledge of programming principles and practices - K0695"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Local Area Networks (LAN)",
|
||
|
"related": [],
|
||
|
"uuid": "b8e620ab-e910-5e10-807a-c2fee2ceb79b",
|
||
|
"value": "Knowledge of Local Area Networks (LAN) - K0712"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Wide Area Networks (WAN)",
|
||
|
"related": [],
|
||
|
"uuid": "55e05049-c0d8-5130-b90d-55a16a098df8",
|
||
|
"value": "Knowledge of Wide Area Networks (WAN) - K0713"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of risk management principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "1eac1609-ea37-52ab-a3d2-bd652dc82733",
|
||
|
"value": "Knowledge of risk management principles and practices - K0721"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of software development principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "d3831feb-a70e-5c51-a4c2-0787bfaa6321",
|
||
|
"value": "Knowledge of software development principles and practices - K0722"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Risk Management Framework (RMF) requirements",
|
||
|
"related": [],
|
||
|
"uuid": "86a6a1dc-763b-55fa-a316-930210d65260",
|
||
|
"value": "Knowledge of Risk Management Framework (RMF) requirements - K0734"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of risk management models and frameworks",
|
||
|
"related": [],
|
||
|
"uuid": "949d1c21-b9a6-57f2-96c4-ec78b01b2812",
|
||
|
"value": "Knowledge of risk management models and frameworks - K0735"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of bandwidth management tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "645eaec3-023a-5f2f-928c-a646502f70ae",
|
||
|
"value": "Knowledge of bandwidth management tools and techniques - K0737"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of low-level programming languages",
|
||
|
"related": [],
|
||
|
"uuid": "963dd547-e502-540a-967c-3be1e83bb3f1",
|
||
|
"value": "Knowledge of low-level programming languages - K0738"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Privacy Impact Assessment (PIA) principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "6d799256-9fd9-5f2e-a1bf-9c8ea8c98063",
|
||
|
"value": "Knowledge of Privacy Impact Assessment (PIA) principles and practices - K0748"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of configuration management (CM) tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "17b07cd1-0da2-5b88-8248-c17a236d726b",
|
||
|
"value": "Knowledge of configuration management (CM) tools and techniques - K0755"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of software debugging principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "42c4d0ad-b3eb-5959-a103-0a9afecb5228",
|
||
|
"value": "Knowledge of software debugging principles and practices - K0762"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of software design tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "9cca9b0d-a576-5bab-a3ea-1409bb69521c",
|
||
|
"value": "Knowledge of software design tools and techniques - K0763"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of software development models and frameworks",
|
||
|
"related": [],
|
||
|
"uuid": "f9f98217-dfcb-5cfd-885a-5125038f453d",
|
||
|
"value": "Knowledge of software development models and frameworks - K0764"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of structured analysis principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "2a350b15-c2e0-5ce3-ab36-cf4787d1bc37",
|
||
|
"value": "Knowledge of structured analysis principles and practices - K0767"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of web service protocols",
|
||
|
"related": [],
|
||
|
"uuid": "02ab9b16-89ca-5376-888d-04dff20e8bc4",
|
||
|
"value": "Knowledge of web service protocols - K0782"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of supply chain risk management principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "fca1528f-bf81-5a06-aed8-b6f88234d70b",
|
||
|
"value": "Knowledge of supply chain risk management principles and practices - K0803"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of interpreted and compiled programming language characteristics",
|
||
|
"related": [],
|
||
|
"uuid": "66069dc2-a024-5b7f-b29d-c77ef774e82d",
|
||
|
"value": "Knowledge of interpreted and compiled programming language characteristics - K0813"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of supply chain risks",
|
||
|
"related": [],
|
||
|
"uuid": "06985783-5371-5825-a574-f8ae751ff77a",
|
||
|
"value": "Knowledge of supply chain risks - K0820"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of software security principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "3bba461a-c569-52a9-aebf-cb914fb7d116",
|
||
|
"value": "Knowledge of software security principles and practices - K0826"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of software quality assurance (SQA) principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "f747163d-9354-5fcf-8bd3-5f12d92d0c8b",
|
||
|
"value": "Knowledge of software quality assurance (SQA) principles and practices - K0827"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of supply chain risk management standards and best practices",
|
||
|
"related": [],
|
||
|
"uuid": "5c01a4d4-74a0-5bba-8afe-a0668eb726bf",
|
||
|
"value": "Knowledge of supply chain risk management standards and best practices - K0828"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of risk management policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "f71e96e7-28cf-5860-8b15-54644c182077",
|
||
|
"value": "Knowledge of risk management policies and procedures - K0920"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of penetration testing principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "4b2a2fd9-3f4d-5634-b808-579338f25af8",
|
||
|
"value": "Knowledge of penetration testing principles and practices - K0955"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of penetration testing tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "f95858a0-f6fd-5495-ad96-73ed9d429bed",
|
||
|
"value": "Knowledge of penetration testing tools and techniques - K0956"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of root cause analysis tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "75393cb1-4d1c-5354-a881-04e26916300b",
|
||
|
"value": "Knowledge of root cause analysis tools and techniques - K0957"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of web application security risks",
|
||
|
"related": [],
|
||
|
"uuid": "9c16379f-0c16-591b-9e6d-66dd00687c0f",
|
||
|
"value": "Knowledge of web application security risks - K1079"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of code analysis tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "1bc1f4ee-5339-5a08-9959-7ad05dcb9970",
|
||
|
"value": "Knowledge of code analysis tools and techniques - K1099"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of coding and testing standards",
|
||
|
"related": [],
|
||
|
"uuid": "4388bd2a-184e-5175-906b-0b8666f5d4c4",
|
||
|
"value": "Knowledge of coding and testing standards - K1117"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of completion criteria",
|
||
|
"related": [],
|
||
|
"uuid": "f27e381f-c288-500b-836b-4b630723d7f9",
|
||
|
"value": "Knowledge of completion criteria - K1118"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cost constraints",
|
||
|
"related": [],
|
||
|
"uuid": "cd5d9be1-e942-5c54-bde6-c8709138c980",
|
||
|
"value": "Knowledge of cost constraints - K1126"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data manipulation principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "da295e38-ced2-5345-a222-11e621aa90f0",
|
||
|
"value": "Knowledge of data manipulation principles and practices - K1148"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data retrieval principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "55b71acb-2b5d-5430-885a-11fcc37fa556",
|
||
|
"value": "Knowledge of data retrieval principles and practices - K1149"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of data storage principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "802132e9-84f6-594d-829f-fe2e45f2ed10",
|
||
|
"value": "Knowledge of data storage principles and practices - K1150"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of enterprise-wide version control systems",
|
||
|
"related": [],
|
||
|
"uuid": "0190b78a-901e-56d2-80a8-690d0382f924",
|
||
|
"value": "Knowledge of enterprise-wide version control systems - K1157"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of independent testing methods",
|
||
|
"related": [],
|
||
|
"uuid": "2b736bcd-e21f-5468-9326-081df9f3d6b7",
|
||
|
"value": "Knowledge of independent testing methods - K1165"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of mathematical models",
|
||
|
"related": [],
|
||
|
"uuid": "2c11f972-434f-5032-91d2-469fd4d3f603",
|
||
|
"value": "Knowledge of mathematical models - K1170"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Public Key Infrastructure (PKI) libraries",
|
||
|
"related": [],
|
||
|
"uuid": "cb5b1d1b-d409-53e3-9957-762e49a923e5",
|
||
|
"value": "Knowledge of Public Key Infrastructure (PKI) libraries - K1203"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of required reporting formats",
|
||
|
"related": [],
|
||
|
"uuid": "215820ba-cf95-5612-a43f-34b1b1252128",
|
||
|
"value": "Knowledge of required reporting formats - K1205"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of risk acceptance and documentation",
|
||
|
"related": [],
|
||
|
"uuid": "4f3531af-f266-5739-8f5f-4e2542c5a694",
|
||
|
"value": "Knowledge of risk acceptance and documentation - K1208"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of secure programming tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "8ceff489-4c34-544b-832c-7f20bb1c889b",
|
||
|
"value": "Knowledge of secure programming tools and techniques - K1210"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of security restrictions",
|
||
|
"related": [],
|
||
|
"uuid": "d2237698-6c98-5936-abb6-dae4e8dc7114",
|
||
|
"value": "Knowledge of security restrictions - K1214"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of security testing tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "1c1bffc7-98d5-5c57-a861-afff0291fa17",
|
||
|
"value": "Knowledge of security testing tools and techniques - K1215"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowlege of certificate management principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "e100520c-ca6f-5271-9ee5-a9beef886c30",
|
||
|
"value": "Knowlege of certificate management principles and practices - K1239"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of cybersecurity practices in the acquisition process",
|
||
|
"related": [],
|
||
|
"uuid": "9d9e5be6-2ba6-52e2-8c02-83d05e37da39",
|
||
|
"value": "Knowledge of cybersecurity practices in the acquisition process - K0653"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of resiliency and redundancy principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "92181aa6-69bf-5fc9-bce7-6a44768894b3",
|
||
|
"value": "Knowledge of resiliency and redundancy principles and practices - K0715"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of host access control (HAC) systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "ef882d08-6813-5ccb-9deb-a8a3c5a8c71c",
|
||
|
"value": "Knowledge of host access control (HAC) systems and software - K0716"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of network access control (NAC) systems and software",
|
||
|
"related": [],
|
||
|
"uuid": "7fc13582-7c11-536f-bd13-1d51afb7d035",
|
||
|
"value": "Knowledge of network access control (NAC) systems and software - K0717"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of policy-based access controls",
|
||
|
"related": [],
|
||
|
"uuid": "be4d7d67-3dff-5bd2-aef5-f3d80e91fa4c",
|
||
|
"value": "Knowledge of policy-based access controls - K0746"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of Risk Adaptive (Adaptable) Access Controls (RAdAC)",
|
||
|
"related": [],
|
||
|
"uuid": "e4ef9868-cdba-56c2-a039-946e67b78102",
|
||
|
"value": "Knowledge of Risk Adaptive (Adaptable) Access Controls (RAdAC) - K0747"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of system design standards and best practices",
|
||
|
"related": [],
|
||
|
"uuid": "aec7388b-70d5-5194-b76a-c9657e3099b1",
|
||
|
"value": "Knowledge of system design standards and best practices - K0769"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of system life cycle management principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "564b1dc1-7a27-501b-835f-aafe8c542b5f",
|
||
|
"value": "Knowledge of system life cycle management principles and practices - K0771"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of supply chain risk management policies and procedures",
|
||
|
"related": [],
|
||
|
"uuid": "99c0442a-d7eb-5c5f-8a5c-1cca645a96a1",
|
||
|
"value": "Knowledge of supply chain risk management policies and procedures - K0838"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of the acquisition life cycle models and frameworks",
|
||
|
"related": [],
|
||
|
"uuid": "5cc905d6-2541-5991-9ab9-038a7d1924c2",
|
||
|
"value": "Knowledge of the acquisition life cycle models and frameworks - K0922"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of countermeasure design principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "682d226e-6a8b-5176-a806-199827438d6b",
|
||
|
"value": "Knowledge of countermeasure design principles and practices - K0937"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of operation assessment processes",
|
||
|
"related": [],
|
||
|
"uuid": "c3984a60-e6ba-5eaa-997d-becbac9206b6",
|
||
|
"value": "Knowledge of operation assessment processes - K1063"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of knowledge management tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "c9ca7423-ff79-57ac-b94a-312dbe03262c",
|
||
|
"value": "Knowledge of knowledge management tools and techniques - K1088"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of analytical tools and techniques",
|
||
|
"related": [],
|
||
|
"uuid": "346cd635-caaa-54c5-b56a-73f859dd06e2",
|
||
|
"value": "Knowledge of analytical tools and techniques - K1100"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of component and interface specifications",
|
||
|
"related": [],
|
||
|
"uuid": "547c4571-0d58-5384-b8a9-a590d105069b",
|
||
|
"value": "Knowledge of component and interface specifications - K1119"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of evaluation and validation requirements",
|
||
|
"related": [],
|
||
|
"uuid": "026fc968-fce5-5e3d-bf93-da49f2308443",
|
||
|
"value": "Knowledge of evaluation and validation requirements - K1158"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of hardware design principles and practices",
|
||
|
"related": [],
|
||
|
"uuid": "6cd1b1bf-8dfa-58e8-bab0-910c237fb1c7",
|
||
|
"value": "Knowledge of hardware design principles and practices - K1164"
|
||
|
},
|
||
|
{
|
||
|
"description": "Knowledge of user needs and requirements",
|
||
|
"related": [],
|
||
|
"uuid": "f16d84d0-83be-5aae-9c07-dffbae3e6cce",
|
||
|
"value": "Knowledge of user needs and requirements - K1235"
|
||
|
}
|
||
|
],
|
||
|
"version": 1
|
||
|
}
|