{ "authors": [ "NIST", "Jean-Louis Huynen" ], "category": "workforce", "description": "Knowledge based on the NIST NICE framework", "name": "NICE Knowledges", "source": "https://csrc.nist.gov/pubs/sp/800/181/r1/final", "type": "nice-framework-knowledges", "uuid": "796e3e82-ca9a-4749-8421-4810ed440755", "values": [ { "description": "Knowledge of ingress filtering tools and techniques", "related": [], "uuid": "c3fa993f-f2db-5056-ac53-14e18aae3619", "value": "Knowledge of ingress filtering tools and techniques - K1082" }, { "description": "Knowledge of risk assessment tools and techniques", "related": [], "uuid": "2660a2f8-5d68-5193-b8c7-f5d65651b984", "value": "Knowledge of risk assessment tools and techniques - K1078" }, { "description": "Knowledge of life cycle development milestones", "related": [], "uuid": "008d0123-c2b9-563d-89b3-e088965a3d9e", "value": "Knowledge of life cycle development milestones - K0670" }, { "description": "Knowledge of contractor management", "related": [], "uuid": "2cc178a3-af4d-58dc-99ad-1681f5e2b0d8", "value": "Knowledge of contractor management - K0669" }, { "description": "Knowledge of contract management", "related": [], "uuid": "1c43820a-1da2-5bad-8588-df0fd9b104d5", "value": "Knowledge of contract management - K0668" }, { "description": "Knowledge of software asset management principles and practices", "related": [], "uuid": "3d0e1e18-3b8d-54c2-841e-95e2b733cdea", "value": "Knowledge of software asset management principles and practices - K1074" }, { "description": "Knowledge of continuous monitoring processes", "related": [], "uuid": "4c756710-3cbc-5612-84a2-146350e3c1d5", "value": "Knowledge of continuous monitoring processes - K1071" }, { "description": "Knowledge of contracts", "related": [], "uuid": "316778fd-8686-5d27-81de-7147cdfa4444", "value": "Knowledge of contracts - K0667" }, { "description": "Knowledge of system security plans", "related": [], "uuid": "da140746-664f-5c47-bd36-a1903f0556a7", "value": "Knowledge of system security plans - K0666" }, { "description": "Knowledge of stakeholder management", "related": [], "uuid": "162ee449-1147-5f62-b2e4-44d35eea83b2", "value": "Knowledge of stakeholder management - K0664" }, { "description": "Knowledge of industry standards and best practices", "related": [], "uuid": "4e0d7d84-307f-5361-892d-bdd455e5f578", "value": "Knowledge of industry standards and best practices - K0663" }, { "description": "Knowledge of systems security engineering", "related": [], "uuid": "0239190b-345e-5262-be0c-a5cb4181e554", "value": "Knowledge of systems security engineering - K0662" }, { "description": "Knowledge of reauthorization processes", "related": [], "uuid": "1a00473f-cac9-53df-b0ef-dd3d19c443e6", "value": "Knowledge of reauthorization processes - K0661" }, { "description": "Knowledge of appropriate use policies and procedures", "related": [], "uuid": "5c42be6f-f117-5db9-a0a1-3eb6b8bfe0ce", "value": "Knowledge of appropriate use policies and procedures - K0660" }, { "description": "Knowledge of risk tolerance principles and practices", "related": [], "uuid": "c047b366-bf81-50cd-93d7-e5af46fc5ebe", "value": "Knowledge of risk tolerance principles and practices - K0822" }, { "description": "Knowledge of cybersecurity engineering", "related": [], "uuid": "e52557ff-6e36-5dde-a41e-7b6e4c626c55", "value": "Knowledge of cybersecurity engineering - K1133" }, { "description": "Knowledge of organizational policy and procedures", "related": [], "uuid": "a12e3886-a915-5980-8900-9f1a355bb7f4", "value": "Knowledge of organizational policy and procedures - K1189" }, { "description": "Knowledge of market research tools and techniques", "related": [], "uuid": "b622c362-eb1c-53fc-b259-acface6706f4", "value": "Knowledge of market research tools and techniques - K0641" }, { "description": "Knowledge of pricing structures", "related": [], "uuid": "7148f95b-5198-5516-b167-2addb872cb8f", "value": "Knowledge of pricing structures - K0642" }, { "description": "Knowledge of supplier assessment criteria", "related": [], "uuid": "bf110aca-1c0d-57b4-b25c-2ae1fe2470ab", "value": "Knowledge of supplier assessment criteria - K0650" }, { "description": "Knowledge of trustworthiness principles", "related": [], "uuid": "6f6d8f51-2d5e-5d64-ad16-0460cbcfb6ef", "value": "Knowledge of trustworthiness principles - K0651" }, { "description": "Knowledge of incident response policies and procedures", "related": [], "uuid": "bc6e8130-bc4e-527d-8ca2-8c5bd5625187", "value": "Knowledge of incident response policies and procedures - K0823" }, { "description": "Knowledge of incident response roles and responsibilities", "related": [], "uuid": "64b5dec1-2106-5f55-96ff-6769d5a8ff14", "value": "Knowledge of incident response roles and responsibilities - K0824" }, { "description": "Knowledge of sustainment principles and practices", "related": [], "uuid": "436228cf-9169-5e90-b270-137230abd3bb", "value": "Knowledge of sustainment principles and practices - K0912" }, { "description": "Knowledge of sustainment processes", "related": [], "uuid": "d20071c6-157f-51cd-a934-fd703c955f4b", "value": "Knowledge of sustainment processes - K0913" }, { "description": "Knowledge of system life cycles", "related": [], "uuid": "7d8b3bc9-cf4e-5c10-b2a0-1d7728e35444", "value": "Knowledge of system life cycles - K1225" }, { "description": "Knowledge of continuous monitoring tools and techniques", "related": [], "uuid": "d8266da9-26d5-5d08-a750-1804f1534532", "value": "Knowledge of continuous monitoring tools and techniques - K1125" }, { "description": "Knowledge of continuous monitoring scoring and grading metrics", "related": [], "uuid": "43a664d6-3e7a-5ada-a074-6b316205b543", "value": "Knowledge of continuous monitoring scoring and grading metrics - K1124" }, { "description": "Knowledge of continuous monitoring principles and practices", "related": [], "uuid": "b520c01b-b799-5a5a-a173-b1af031c5bce", "value": "Knowledge of continuous monitoring principles and practices - K1123" }, { "description": "Knowledge of cybersecurity objectives", "related": [], "uuid": "a1d4d16a-d1f4-5fe5-b74f-6ba2fcd01595", "value": "Knowledge of cybersecurity objectives - K1135" }, { "description": "Knowledge of information architecture principles and practices", "related": [], "uuid": "251558fb-ca83-5caf-845b-a228fc20b3b4", "value": "Knowledge of information architecture principles and practices - K1166" }, { "description": "Knowledge of enterprise cybersecurity architecture", "related": [], "uuid": "ffd758ea-2899-5510-b5e6-fc3a9e33e1c7", "value": "Knowledge of enterprise cybersecurity architecture - K1156" }, { "description": "Knowledge of organizational evaluation and validation requirements", "related": [], "uuid": "b73deb35-c186-5967-b7af-eccf82d17183", "value": "Knowledge of organizational evaluation and validation requirements - K1185" }, { "description": "Knowledge of organizational risk levels", "related": [], "uuid": "909b82bd-714b-5003-a437-aabc90a04760", "value": "Knowledge of organizational risk levels - K1190" }, { "description": "Knowledge of project plans and schedules", "related": [], "uuid": "e37d8a52-02b7-59b2-af12-96ffdcf65aaf", "value": "Knowledge of project plans and schedules - K1202" }, { "description": "Knowledge of programming languages", "related": [], "uuid": "c0613b01-a2b4-5f1a-b778-a3aecd4f408c", "value": "Knowledge of programming languages - K1201" }, { "description": "Knowledge of system characteristics", "related": [], "uuid": "09e88959-bc48-5a00-82dc-8fabcc231c1d", "value": "Knowledge of system characteristics - K1224" }, { "description": "Knowledge of software application, system, and network requirements", "related": [], "uuid": "b8ae0620-abbc-5d70-af11-9353a6312b9d", "value": "Knowledge of software application, system, and network requirements - K1218" }, { "description": "Knowledge of user interfaces", "related": [], "uuid": "cea55969-9897-59cc-ae13-7b2ac534c362", "value": "Knowledge of user interfaces - K1234" }, { "description": "Knowledge of intelligence data gathering principles and practices", "related": [], "uuid": "19c700d9-934c-52db-9da3-85cf1dfd2eb9", "value": "Knowledge of intelligence data gathering principles and practices - K0944" }, { "description": "Knowledge of intelligence data gathering policies and procedures", "related": [], "uuid": "928c2bc5-1bc9-55af-ae1c-524cacbe4d7c", "value": "Knowledge of intelligence data gathering policies and procedures - K0945" }, { "description": "Knowledge of foreign disclosure policies and procedures", "related": [], "uuid": "00d7508d-24e1-5ac8-8cb1-40619f30f8d0", "value": "Knowledge of foreign disclosure policies and procedures - K0954" }, { "description": "Knowledge of privacy disclosure statement laws and regulations", "related": [], "uuid": "11fdf9ec-4bc5-5799-a28d-dc96b8088f7b", "value": "Knowledge of privacy disclosure statement laws and regulations - K1070" }, { "description": "Knowledge of security awareness programs", "related": [], "uuid": "359dde67-609a-5947-ae87-c9051d47b5a0", "value": "Knowledge of security awareness programs - K0638" }, { "description": "Knowledge of virtual learning environments", "related": [], "uuid": "49aac74b-041c-570f-b635-ddfe40537979", "value": "Knowledge of virtual learning environments - K0643" }, { "description": "Knowledge of target audience requirements", "related": [], "uuid": "bc319fd7-ae7a-56a6-997d-bb33a117fa62", "value": "Knowledge of target audience requirements - K0654" }, { "description": "Knowledge of information privacy technologies", "related": [], "uuid": "bf5ccab4-5ab7-5858-b00a-cadcbcfc4f60", "value": "Knowledge of information privacy technologies - K0659" }, { "description": "Knowledge of cognitive domain models and frameworks", "related": [], "uuid": "2f1affb9-98d6-55e1-8bee-762a94530e1f", "value": "Knowledge of cognitive domain models and frameworks - K0801" }, { "description": "Knowledge of instructional design principles and practices", "related": [], "uuid": "be5d73a0-2c5b-5298-baee-37f824075897", "value": "Knowledge of instructional design principles and practices - K0885" }, { "description": "Knowledge of instructional design models and frameworks", "related": [], "uuid": "479f1c1d-42a2-5541-a2e2-00f869decad8", "value": "Knowledge of instructional design models and frameworks - K0886" }, { "description": "Knowledge of Bloom's Taxonomy learning levels", "related": [], "uuid": "ee7a7876-5108-5bdc-92b3-f222203b1b9d", "value": "Knowledge of Bloom's Taxonomy learning levels - K0888" }, { "description": "Knowledge of learning management system (LMS) systems and software", "related": [], "uuid": "df7bf611-16f8-5ed1-82b2-46d9e48d212d", "value": "Knowledge of learning management system (LMS) systems and software - K0889" }, { "description": "Knowledge of learning modes", "related": [], "uuid": "b3cf50a1-6d10-58c5-b18e-b51254c48fb1", "value": "Knowledge of learning modes - K0890" }, { "description": "Knowledge of media production tool and techniques", "related": [], "uuid": "31f6d084-312d-583d-ad99-f1b29bafae8b", "value": "Knowledge of media production tool and techniques - K0905" }, { "description": "Knowledge of needs assessment principles and practices", "related": [], "uuid": "b5fa3ba8-13d2-5384-b50c-4abe72bae5aa", "value": "Knowledge of needs assessment principles and practices - K0910" }, { "description": "Knowledge of cybersecurity competitions", "related": [], "uuid": "f917d86b-2476-5fce-8d9a-777f9694a00d", "value": "Knowledge of cybersecurity competitions - K1083" }, { "description": "Knowledge of federal and state accreditation standards", "related": [], "uuid": "70393d57-45cf-5b0f-8662-bd68a4818ce4", "value": "Knowledge of federal and state accreditation standards - K1160" }, { "description": "Knowledge of organzational privacy policies and procedures", "related": [], "uuid": "676da780-afaf-5b01-bca5-8faae5bf9820", "value": "Knowledge of organzational privacy policies and procedures - K1192" }, { "description": "Knowledge of privacy and data security regulators", "related": [], "uuid": "b08b6b95-52a0-567e-9d4c-e479a2e1d456", "value": "Knowledge of privacy and data security regulators - K1198" }, { "description": "Knowledge of privacy technologies", "related": [], "uuid": "93ba55d7-efcf-56f6-ad35-accecd28723e", "value": "Knowledge of privacy technologies - K1200" }, { "description": "Knowlege of privacy laws and regulations", "related": [], "uuid": "1a22dd84-1469-5ca9-83e6-c85a28ee1f6e", "value": "Knowlege of privacy laws and regulations - K1240" }, { "description": "Knowledge of all-source intelligence reporting policies and procedures", "related": [], "uuid": "bf481996-2321-5700-a6df-a1129e25cb94", "value": "Knowledge of all-source intelligence reporting policies and procedures - K0964" }, { "description": "Knowledge of post implementation review (PIR) processes", "related": [], "uuid": "b6f1f6cd-7cd5-5f48-9986-2e7fd08f97b3", "value": "Knowledge of post implementation review (PIR) processes - K1027" }, { "description": "Knowledge of approved intelligence dissemination processes", "related": [], "uuid": "0ff1101b-ee28-5b29-b1bb-dbee098bf5bd", "value": "Knowledge of approved intelligence dissemination processes - K0359" }, { "description": "Knowledge of language processing tools and techniques", "related": [], "uuid": "e05deaa9-2e48-5017-a767-b3b989e01fb0", "value": "Knowledge of language processing tools and techniques - K0476" }, { "description": "Knowledge of target communication tools and techniques", "related": [], "uuid": "77915e62-849c-594f-ab48-9f97c27a5a5c", "value": "Knowledge of target communication tools and techniques - K0540" }, { "description": "Knowledge of language analysis tools and techniques", "related": [], "uuid": "0360e0bf-24e3-5ef3-bc1b-4e4c4e89aba3", "value": "Knowledge of language analysis tools and techniques - K0965" }, { "description": "Knowledge of voice analysis tools and techniques", "related": [], "uuid": "d068201d-41b6-5283-a2ed-bc4e76d8d00b", "value": "Knowledge of voice analysis tools and techniques - K0966" }, { "description": "Knowledge of graphic materials analysis tools and techniques", "related": [], "uuid": "a8b021e2-7443-5244-ae6b-1648ed8a6bc1", "value": "Knowledge of graphic materials analysis tools and techniques - K0967" }, { "description": "Knowledge of intelligence collection systems and software", "related": [], "uuid": "7313933a-924d-590f-90ec-637f64376c18", "value": "Knowledge of intelligence collection systems and software - K0981" }, { "description": "Knowledge of target language", "related": [], "uuid": "d97a71e3-b950-5a0a-8d82-b60a93f68ca9", "value": "Knowledge of target language - K1034" }, { "description": "Knowledge of target cultural references", "related": [], "uuid": "fedd0cf1-defc-568c-8b93-9d41f279e728", "value": "Knowledge of target cultural references - K1039" }, { "description": "Knowledge of the collection process feedback cycle", "related": [], "uuid": "d7903dc8-2af7-546e-9b89-a298fab8a0a3", "value": "Knowledge of the collection process feedback cycle - K1053" }, { "description": "Knowledge of language analysis principles and practices", "related": [], "uuid": "b9547b5c-e104-5a94-add9-06962da2a60b", "value": "Knowledge of language analysis principles and practices - K1056" }, { "description": "Knowledge of Interactive On-Net (ION) operator roles and responsibilities", "related": [], "uuid": "4733673e-fe4c-5713-a0bd-11b1001db858", "value": "Knowledge of Interactive On-Net (ION) operator roles and responsibilities - K1057" }, { "description": "Knowledge of foreign languages and dialects", "related": [], "uuid": "a25bff83-5b22-57d0-aea2-971832c23f08", "value": "Knowledge of foreign languages and dialects - K1162" }, { "description": "Knowledge of target communication network characteristics", "related": [], "uuid": "25b97fc3-c475-597f-8586-83581f49c938", "value": "Knowledge of target communication network characteristics - K1229" }, { "description": "Knowledge of target communications tools and techniques", "related": [], "uuid": "1a9c6c9c-2220-5677-adcb-f56d73e687d8", "value": "Knowledge of target communications tools and techniques - K1230" }, { "description": "Knowledge of Communications Security (COMSEC) policies and procedures", "related": [], "uuid": "4ec203b8-91ff-54fb-b35d-7b193c9ac628", "value": "Knowledge of Communications Security (COMSEC) policies and procedures - K0671" }, { "description": "Knowledge of the Communications Security (COMSEC) Material Control System (CMCS)", "related": [], "uuid": "53bba8e2-04a6-5a11-915e-a68c7c0b3bc5", "value": "Knowledge of the Communications Security (COMSEC) Material Control System (CMCS) - K0672" }, { "description": "Knowledge of types of Communications Security (COMSEC) incidents", "related": [], "uuid": "1dceb5dd-9db5-5120-865a-f9207de6f014", "value": "Knowledge of types of Communications Security (COMSEC) incidents - K0673" }, { "description": "Knowledge of program management principles and practices", "related": [], "uuid": "35f402fb-5dde-5ea3-b58e-d751a771b054", "value": "Knowledge of program management principles and practices - K0798" }, { "description": "Knowledge of mission assurance practices and principles", "related": [], "uuid": "9a738129-3a0f-5b03-8d8d-4a50523c59ae", "value": "Knowledge of mission assurance practices and principles - K1171" }, { "description": "Knowledge of organization's security strategy", "related": [], "uuid": "37363583-9107-59d0-ba0a-5b3b504b2083", "value": "Knowledge of organization's security strategy - K1179" }, { "description": "Knowledge of industry indicators", "related": [], "uuid": "1c57aee0-bc2a-51fa-b6d2-d78c9b70be08", "value": "Knowledge of industry indicators - K0943" }, { "description": "Knowledge of organizational cybersecurity policies and procedures", "related": [], "uuid": "ce86b908-feb6-5adf-b6d8-dd8a80436854", "value": "Knowledge of organizational cybersecurity policies and procedures - K1183" }, { "description": "Knowledge of organizational human resource (HR) policies and procedures", "related": [], "uuid": "31da8869-a05d-5974-9a24-25dde73708c1", "value": "Knowledge of organizational human resource (HR) policies and procedures - K1186" }, { "description": "Knowledge of research and design processes and procedures", "related": [], "uuid": "29856ef9-e715-51be-a8ef-ea0c20703e1f", "value": "Knowledge of research and design processes and procedures - K1206" }, { "description": "Knowledge of the organizational cybersecurity workforce", "related": [], "uuid": "674a9e80-f59b-57f3-8e8f-c7ba776aff7d", "value": "Knowledge of the organizational cybersecurity workforce - K0640" }, { "description": "Knowledge of career paths", "related": [], "uuid": "575799da-6330-5ce1-a515-5af2b120d184", "value": "Knowledge of career paths - K0648" }, { "description": "Knowledge of organizational career progressions", "related": [], "uuid": "d067e075-7d02-5082-8c84-0f26cb0ec742", "value": "Knowledge of organizational career progressions - K0649" }, { "description": "Knowledge of workforce trends", "related": [], "uuid": "8e1b26aa-59bd-59f7-b17c-4fed54368275", "value": "Knowledge of workforce trends - K0652" }, { "description": "Knowledge of resource management principles and practices", "related": [], "uuid": "8ada7d15-026c-5c86-b18e-43e300ac74a4", "value": "Knowledge of resource management principles and practices - K0754" }, { "description": "Knowledge of training policies and procedures", "related": [], "uuid": "fe3ea4a9-ccb6-5635-ad6a-8b411a3f52ed", "value": "Knowledge of training policies and procedures - K0887" }, { "description": "Knowledge of training systems and software", "related": [], "uuid": "0d8a7cfb-761e-5f55-ac20-162f441ad24b", "value": "Knowledge of training systems and software - K0893" }, { "description": "Knowledge of the NIST Workforce Framework for Cybersecurity (NICE Framework)", "related": [], "uuid": "eb1541cf-f5d8-5286-9769-f5403fe75706", "value": "Knowledge of the NIST Workforce Framework for Cybersecurity (NICE Framework) - K0902" }, { "description": "Knowledge of human resources policies and procedures", "related": [], "uuid": "b0eca096-6336-5cc4-a427-31eba9ec26ae", "value": "Knowledge of human resources policies and procedures - K0908" }, { "description": "Knowledge of personnel systems and software", "related": [], "uuid": "d0b6aff0-dfb0-5a4a-b09b-01aa1105e9e6", "value": "Knowledge of personnel systems and software - K1098" }, { "description": "Knowledge of cybersecurity workforce policies and procedures", "related": [], "uuid": "8f8be2d8-ed43-5a19-b24c-abbf5e2bc647", "value": "Knowledge of cybersecurity workforce policies and procedures - K1140" }, { "description": "Knowledge of organizational cybersecurity workforce requirements", "related": [], "uuid": "ca028e6f-bb19-51f3-9ba0-9e5368728c11", "value": "Knowledge of organizational cybersecurity workforce requirements - K1184" }, { "description": "Knowledge of intelligence processes", "related": [], "uuid": "6cb25de8-bd30-5e8d-acac-aaf091166b37", "value": "Knowledge of intelligence processes - K1058" }, { "description": "Knowledge of priority intelligence collection requirements", "related": [], "uuid": "1954138b-2a15-5e1e-afa5-b89dfdffacc7", "value": "Knowledge of priority intelligence collection requirements - K1196" }, { "description": "Knowledge of service desk principles and practices", "related": [], "uuid": "bb319832-911e-5c40-93eb-a7a60dfa0a24", "value": "Knowledge of service desk principles and practices - K0903" }, { "description": "Knowledge of remote access tools and techniques", "related": [], "uuid": "d931eacc-5428-52c0-a782-716f191b4a3c", "value": "Knowledge of remote access tools and techniques - K0911" }, { "description": "Knowledge of software, hardware, and peripheral equipment repair tools and techniques", "related": [], "uuid": "191b24f9-5cf8-5569-8517-0d6c08c8dd1e", "value": "Knowledge of software, hardware, and peripheral equipment repair tools and techniques - K1090" }, { "description": "Knowledge of asset management policies and procedures", "related": [], "uuid": "2d7ef6bf-1366-59c0-a367-e0b6ec41cd08", "value": "Knowledge of asset management policies and procedures - K1112" }, { "description": "Knowledge of customer experience principles and practices", "related": [], "uuid": "015591bf-bffc-5478-93a5-72b0ba86091f", "value": "Knowledge of customer experience principles and practices - K1127" }, { "description": "Knowledge of Voice over IP (VoIP)", "related": [], "uuid": "9775cd6d-9629-5c81-8d76-dfc6cdfc15c0", "value": "Knowledge of Voice over IP (VoIP) - K0159" }, { "description": "Knowledge of system performance indicators", "related": [], "uuid": "65cbd048-066d-5129-aa1c-c046ced75ea4", "value": "Knowledge of system performance indicators - K0740" }, { "description": "Knowledge of system availability measures", "related": [], "uuid": "8189e05e-3ba6-54ac-b2b2-5dd7b9cc9c85", "value": "Knowledge of system availability measures - K0741" }, { "description": "Knowledge of credential management systems and software", "related": [], "uuid": "276f7e69-a93c-5d5b-a11c-9987a987dce4", "value": "Knowledge of credential management systems and software - K0930" }, { "description": "Knowledge of data-at-rest encryption (DARE) standards and best practices", "related": [], "uuid": "55fb6ccf-bdf0-5946-bfd0-977d3592abff", "value": "Knowledge of data-at-rest encryption (DARE) standards and best practices - K0931" }, { "description": "Knowledge of cryptographic key storage systems and software", "related": [], "uuid": "8114db1b-acc7-5a4a-bbb5-35da6ddf2506", "value": "Knowledge of cryptographic key storage systems and software - K0932" }, { "description": "Knowledge of system availability requirements", "related": [], "uuid": "48d791e2-3c81-5b62-a903-ed9da5138db9", "value": "Knowledge of system availability requirements - K1222" }, { "description": "Knowledge of intelligence collection tasking tools and techniques", "related": [], "uuid": "e163d319-ffcf-56af-a88f-fbef565f97b1", "value": "Knowledge of intelligence collection tasking tools and techniques - K0972" }, { "description": "Knowledge of intelligence collection principles and practices", "related": [], "uuid": "270f17e6-609a-5bfa-b9e7-57875f441eb2", "value": "Knowledge of intelligence collection principles and practices - K0976" }, { "description": "Knowledge of resource and asset readiness reporting policies and procedures", "related": [], "uuid": "519d5c4f-d1d9-5792-8498-1e48d2596131", "value": "Knowledge of resource and asset readiness reporting policies and procedures - K1021" }, { "description": "Knowledge of requirements submission processes", "related": [], "uuid": "004766e5-32d5-5703-9ab7-cbdd31c80bc7", "value": "Knowledge of requirements submission processes - K1026" }, { "description": "Knowledge of production exploitation principles and practices", "related": [], "uuid": "87f523d1-beb9-5142-a5e7-dbfd9f075651", "value": "Knowledge of production exploitation principles and practices - K1029" }, { "description": "Knowledge of tasking processes", "related": [], "uuid": "67730109-96a0-5ad4-84f9-ddf4bdfa1f69", "value": "Knowledge of tasking processes - K1045" }, { "description": "Knowledge of intelligence collection requirements tools and techniques", "related": [], "uuid": "2392e711-6f34-53e0-9920-8f2ef664299b", "value": "Knowledge of intelligence collection requirements tools and techniques - K1048" }, { "description": "Knowledge of the Tasking, Collection, Processing, Exploitation and Dissemination (TCPED) process", "related": [], "uuid": "56961972-a003-5f2a-9234-70d1a4aa46b7", "value": "Knowledge of the Tasking, Collection, Processing, Exploitation and Dissemination (TCPED) process - K1052" }, { "description": "Knowledge of intelligence collection authority policies and procedures", "related": [], "uuid": "e5a43238-b8e3-5af4-bc49-eaf356a8728a", "value": "Knowledge of intelligence collection authority policies and procedures - K1060" }, { "description": "Knowledge of environment preparation tools and techniques", "related": [], "uuid": "0e16222d-acef-59bc-9722-653bd939dc7d", "value": "Knowledge of environment preparation tools and techniques - K1061" }, { "description": "Knowledge of surveillance tools and techniques", "related": [], "uuid": "e4136755-5a5d-576d-97e9-fdf48679b342", "value": "Knowledge of surveillance tools and techniques - K1062" }, { "description": "Knowledge of operational environment risks", "related": [], "uuid": "26d15d65-900b-5aa6-b66e-2c6a4d5fd27b", "value": "Knowledge of operational environment risks - K1178" }, { "description": "Knowledge of priority information requirements", "related": [], "uuid": "a026073e-a18f-5a62-9a70-aba0dce8c860", "value": "Knowledge of priority information requirements - K1195" }, { "description": "Knowledge of data concealment tools and techniques", "related": [], "uuid": "9ebe874b-275a-5422-8a74-75c1307274b4", "value": "Knowledge of data concealment tools and techniques - K0941" }, { "description": "Knowledge of data encryption practices and principles", "related": [], "uuid": "fff705b1-f0ec-5e9a-912d-ca8688c7408a", "value": "Knowledge of data encryption practices and principles - K1145" }, { "description": "Knowledge of steganography practices and principles", "related": [], "uuid": "93d32c4d-70db-5434-8359-c4e3da9dd653", "value": "Knowledge of steganography practices and principles - K1220" }, { "description": "Knowledge of blue force tracking", "related": [], "uuid": "207579e9-d559-54b9-bf9b-bdbb870b44cf", "value": "Knowledge of blue force tracking - K1113" }, { "description": "Knowledge of cybersecurity standards and best practices", "related": [], "uuid": "e2dd5d5b-6ff1-5fb9-9a71-f0ff8a374e3d", "value": "Knowledge of cybersecurity standards and best practices - K1138" }, { "description": "Knowledge of data visualization tools and techniques", "related": [], "uuid": "d1fc41da-ff0b-5015-8422-392fd50e7dbf", "value": "Knowledge of data visualization tools and techniques - K0647" }, { "description": "Knowledge of data administration policies and procedures", "related": [], "uuid": "7115b47b-e060-5d8a-a1b9-d1cf5f0bb07a", "value": "Knowledge of data administration policies and procedures - K0699" }, { "description": "Knowledge of data standardization policies and procedures", "related": [], "uuid": "c5b961f6-0d3d-5d6a-99ec-5fce2986e6b5", "value": "Knowledge of data standardization policies and procedures - K0700" }, { "description": "Knowledge of database management system (DBMS) principles and practices", "related": [], "uuid": "afa19a5b-2bf7-53e0-b102-89515d40bfca", "value": "Knowledge of database management system (DBMS) principles and practices - K0704" }, { "description": "Knowledge of database query language capabilities and applications", "related": [], "uuid": "dfed2def-1d23-5e13-bb30-02a348faa6ab", "value": "Knowledge of database query language capabilities and applications - K0705" }, { "description": "Knowledge of database schema capabilities and applications", "related": [], "uuid": "45092cf9-e839-5f9a-8ea7-335b276bf3c8", "value": "Knowledge of database schema capabilities and applications - K0706" }, { "description": "Knowledge of digital rights management (DRM) tools and techniques", "related": [], "uuid": "9eb74060-abd4-50ca-92bd-255615c17af4", "value": "Knowledge of digital rights management (DRM) tools and techniques - K0708" }, { "description": "Knowledge of query languages", "related": [], "uuid": "7ebdb252-557a-51cb-9c70-023600cb6893", "value": "Knowledge of query languages - K0750" }, { "description": "Knowledge of database application programming interfaces (APIs)", "related": [], "uuid": "7c078ec6-ac69-5b47-a549-1a30aa278129", "value": "Knowledge of database application programming interfaces (APIs) - K0867" }, { "description": "Knowledge of logging tools and technologies", "related": [], "uuid": "8f982130-78d8-5212-9bce-5b0d243f4c92", "value": "Knowledge of logging tools and technologies - K0897" }, { "description": "Knowledge of machine learning principles and practices", "related": [], "uuid": "0b5a20b3-f739-5868-8af4-b1397248ef15", "value": "Knowledge of machine learning principles and practices - K0904" }, { "description": "Knowledge of hexadecimal data", "related": [], "uuid": "a7dbf302-ae8d-5c71-aa3a-bfd4de52d935", "value": "Knowledge of hexadecimal data - K1094" }, { "description": "Knowledge of data mapping tools and techniques", "related": [], "uuid": "9275738a-223a-5c07-94a9-e3720c30353a", "value": "Knowledge of data mapping tools and techniques - K1097" }, { "description": "Knowledge of data gathering tools and techniques", "related": [], "uuid": "bb0ef9b9-6a7d-5405-a80f-b366b1f3960b", "value": "Knowledge of data gathering tools and techniques - K1146" }, { "description": "Knowledge of statistical processes", "related": [], "uuid": "f462f35c-ec7f-534a-aef5-8c5a0499867b", "value": "Knowledge of statistical processes - K1219" }, { "description": "Knowledge of UNIX scripts", "related": [], "uuid": "c1fe04f3-81b1-5a7e-ab16-9806f001e161", "value": "Knowledge of UNIX scripts - K1233" }, { "description": "Knowledge of Windows scripts", "related": [], "uuid": "06c7a87b-5a85-59e3-ba72-34a6c4205a4f", "value": "Knowledge of Windows scripts - K1238" }, { "description": "Knowledge of data storage media characteristics", "related": [], "uuid": "124a1af6-901e-52b4-aeb6-bc1fb4c86dc6", "value": "Knowledge of data storage media characteristics - K0777" }, { "description": "Knowledge of capacity management", "related": [], "uuid": "a847da12-4d7f-5cc2-b7e4-0058cded0fc8", "value": "Knowledge of capacity management - K1114" }, { "description": "Knowledge of configuration management", "related": [], "uuid": "2c7cc69f-6d68-5e9e-8fe1-05e48addb75b", "value": "Knowledge of configuration management - K1121" }, { "description": "Knowledge of financial management", "related": [], "uuid": "f146cda1-7652-5def-b420-e0ddfbce9d98", "value": "Knowledge of financial management - K1161" }, { "description": "Knowledge of content creation tools and techniques", "related": [], "uuid": "8cc8151c-4aa4-5c18-aa94-f1d52c04608f", "value": "Knowledge of content creation tools and techniques - K0774" }, { "description": "Knowledge of collaboration tools and techniques", "related": [], "uuid": "d147b05e-d9f8-5373-93e2-60f2c2798630", "value": "Knowledge of collaboration tools and techniques - K0776" }, { "description": "Knowledge of cloud computing principles and practices", "related": [], "uuid": "8ca48481-3769-5d7e-88c7-79e0ac3ed159", "value": "Knowledge of cloud computing principles and practices - K0863" }, { "description": "Knowledge of knowledge management principles and practices", "related": [], "uuid": "3cf68f70-a980-5bbe-834d-e9eb8c67723a", "value": "Knowledge of knowledge management principles and practices - K0864" }, { "description": "Knowledge of taxonomy models and frameworks", "related": [], "uuid": "455374b7-1eb1-59e8-81dc-6fc5c4626fef", "value": "Knowledge of taxonomy models and frameworks - K0895" }, { "description": "Knowledge of semantic ontology models and frameworks", "related": [], "uuid": "ffebca88-1970-5a10-83e4-e372e2c83273", "value": "Knowledge of semantic ontology models and frameworks - K0896" }, { "description": "Knowledge of content synchronization tools and techniques", "related": [], "uuid": "9e7460b1-2734-5009-b4a0-082d4512136e", "value": "Knowledge of content synchronization tools and techniques - K0929" }, { "description": "Knowledge of performance tuning tools and techniques", "related": [], "uuid": "93166601-b975-573f-99b7-41b1d5a42a52", "value": "Knowledge of performance tuning tools and techniques - K0064" }, { "description": "Knowledge of standard operating procedures (SOPs)", "related": [], "uuid": "28826e21-34a6-54b6-abe8-5b63369d4629", "value": "Knowledge of standard operating procedures (SOPs) - K0645" }, { "description": "Knowledge of incident, event, and problem management policies and procedures", "related": [], "uuid": "299c461f-d804-57e7-a59f-50bddedd9182", "value": "Knowledge of incident, event, and problem management policies and procedures - K0935" }, { "description": "Knowledge of incident reporting policies and procedures", "related": [], "uuid": "405fa90f-c122-58b1-80fe-b94d175b8566", "value": "Knowledge of incident reporting policies and procedures - K0946" }, { "description": "Knowledge of system integration principles and practices", "related": [], "uuid": "ebad0849-9fe9-5446-a9e1-d36e107b2224", "value": "Knowledge of system integration principles and practices - K0958" }, { "description": "Knowledge of automated security control testing tools and techniques", "related": [], "uuid": "7238be80-46fa-5e75-be4c-2d5c1cc66663", "value": "Knowledge of automated security control testing tools and techniques - K1072" }, { "description": "Knowledge of systems administration standard operating policies and procedures", "related": [], "uuid": "b1116e5b-de20-5ee6-83ba-ec59b559954a", "value": "Knowledge of systems administration standard operating policies and procedures - K1226" }, { "description": "Knowledge of cloud service models and frameworks", "related": [], "uuid": "1f8ff896-1a94-59bb-a542-224ca5daf916", "value": "Knowledge of cloud service models and frameworks - K0898" }, { "description": "Knowledge of web filtering systems and software", "related": [], "uuid": "782593d6-81c0-5fbf-8c83-bdba8f47ae6c", "value": "Knowledge of web filtering systems and software - K0811" }, { "description": "Knowledge of NIST Risk Management Framework authorization requirements", "related": [], "uuid": "773a0f2b-9a62-5660-915f-0e290e435a25", "value": "Knowledge of NIST Risk Management Framework authorization requirements - K1177" }, { "description": "Knowledge of security assessment authorization requirements", "related": [], "uuid": "f63c5946-8580-5b3e-b7ab-9cfdd68aa97f", "value": "Knowledge of security assessment authorization requirements - K1211" }, { "description": "Knowledge of Virtual Private Network (VPN) devices", "related": [], "uuid": "9a39beb7-c0cb-5c95-9654-ffc364719614", "value": "Knowledge of Virtual Private Network (VPN) devices - K1237" }, { "description": "Knowledge of risk scoring principles and practices", "related": [], "uuid": "449cc6fb-fcca-505c-a565-095ed3b4c835", "value": "Knowledge of risk scoring principles and practices - K1076" }, { "description": "Knowledge of social engineering tools and techniques", "related": [], "uuid": "f44b9e86-6423-58e4-afb7-31363404111a", "value": "Knowledge of social engineering tools and techniques - K1087" }, { "description": "Knowledge of cyber defense auditing laws and regulations", "related": [], "uuid": "81c5c506-63f5-5661-945d-4494791e8667", "value": "Knowledge of cyber defense auditing laws and regulations - K1129" }, { "description": "Knowledge of cyber defense auditing policies and practices", "related": [], "uuid": "21a8765f-4ae3-57c8-acd9-c0d04fe3629c", "value": "Knowledge of cyber defense auditing policies and practices - K1130" }, { "description": "Knowledge of organizational cybersecurity policies and configurations", "related": [], "uuid": "e756e755-0866-5605-990b-58f1500890d5", "value": "Knowledge of organizational cybersecurity policies and configurations - K1182" }, { "description": "Knowledge of data remediation tools and techniques", "related": [], "uuid": "bd9b6d0c-d7e1-5d9b-ad16-925447cde3b2", "value": "Knowledge of data remediation tools and techniques - K0862" }, { "description": "Knowledge of abnormal physical and physiological behaviors", "related": [], "uuid": "71ab5c27-ea66-58c9-a0b5-3f78599dc800", "value": "Knowledge of abnormal physical and physiological behaviors - K0909" }, { "description": "Knowledge of risk mitigation tools and techniques", "related": [], "uuid": "5de88338-4404-528a-a72e-ec7eab6ad3dc", "value": "Knowledge of risk mitigation tools and techniques - K1031" }, { "description": "Knowledge of data analysis tools and techniques", "related": [], "uuid": "1f665442-8835-5c3a-bc6c-a272bcb6e472", "value": "Knowledge of data analysis tools and techniques - K1096" }, { "description": "Knowledge of cybersecurity threats and vulnerabilities", "related": [], "uuid": "33770b95-c26c-5643-b19a-587c8889e1e3", "value": "Knowledge of cybersecurity threats and vulnerabilities - K1139" }, { "description": "Knowledge of organizational cybersecurity goals and objectives", "related": [], "uuid": "2a278445-eafa-563a-97d6-c8b5e4bba933", "value": "Knowledge of organizational cybersecurity goals and objectives - K1180" }, { "description": "Knowledge of organizational policies and procedures", "related": [], "uuid": "9ea15294-a2eb-5d65-a064-8f1f53a90b43", "value": "Knowledge of organizational policies and procedures - K1188" }, { "description": "Knowledge of risk mitigation principles and practices", "related": [], "uuid": "65b0ae33-c7d5-57f7-964d-fa9330fae461", "value": "Knowledge of risk mitigation principles and practices - K1209" }, { "description": "Knowledge of cultural, political, and organizational assets", "related": [], "uuid": "bcf5eaea-2bb1-5589-b9ca-d54a95b15dc4", "value": "Knowledge of cultural, political, and organizational assets - K1241" }, { "description": "Knowledge of cybersecurity review processes and procedures", "related": [], "uuid": "3713a113-a6ed-59b8-b491-d61391cb09c8", "value": "Knowledge of cybersecurity review processes and procedures - K1242" }, { "description": "Knowledge of cybersecurity threat remediation principles and practices", "related": [], "uuid": "dbd56a53-9d6f-5dd4-b44f-cc3111baf983", "value": "Knowledge of cybersecurity threat remediation principles and practices - K1243" }, { "description": "Knowledge of cybersecurity tools and techniques", "related": [], "uuid": "1644999b-902d-5aac-b737-9879114720d8", "value": "Knowledge of cybersecurity tools and techniques - K1244" }, { "description": "Knowledge of data exfiltration tools and techniques", "related": [], "uuid": "b1d64fc8-d5e3-5ac9-8807-c114d52f625f", "value": "Knowledge of data exfiltration tools and techniques - K1245" }, { "description": "Knowledge of data handling tools and techniques", "related": [], "uuid": "e201c06f-e5d4-5b9a-8152-7726ad927457", "value": "Knowledge of data handling tools and techniques - K1246" }, { "description": "Knowledge of data monitoring tools and techniques", "related": [], "uuid": "ccc7f4e5-1e98-5199-be27-b8585c61d101", "value": "Knowledge of data monitoring tools and techniques - K1247" }, { "description": "Knowledge of digital and physical security vulnerabilities", "related": [], "uuid": "ec8e2fc6-ad2c-595d-a709-e1686e834be7", "value": "Knowledge of digital and physical security vulnerabilities - K1248" }, { "description": "Knowledge of digital and physical security vulnerability remediation principles and practices", "related": [], "uuid": "eeedecc6-43da-55c6-80a4-75b3cb5bf935", "value": "Knowledge of digital and physical security vulnerability remediation principles and practices - K1249" }, { "description": "Knowledge of external organization roles and responsibilities", "related": [], "uuid": "7d6c72db-ac12-586d-b2f1-c3916561a60d", "value": "Knowledge of external organization roles and responsibilities - K1250" }, { "description": "Knowledge of external referrals policies and procedures", "related": [], "uuid": "88ba22cd-60a5-5e79-a749-5f28e9d3bc4a", "value": "Knowledge of external referrals policies and procedures - K1251" }, { "description": "Knowledge of high value asset characteristics", "related": [], "uuid": "e465eb57-4ea4-59f6-b74c-a356aa99b8ea", "value": "Knowledge of high value asset characteristics - K1252" }, { "description": "Knowledge of information collection tools and techniques", "related": [], "uuid": "9ed87f8b-fd41-5ebe-83ba-3a078bf3d0b8", "value": "Knowledge of information collection tools and techniques - K1253" }, { "description": "Knowledge of insider threat hub policies and procedures", "related": [], "uuid": "4c2d09d3-af6b-5baf-9605-2aa7ce3400ac", "value": "Knowledge of insider threat hub policies and procedures - K1254" }, { "description": "Knowledge of insider threat hub operations", "related": [], "uuid": "d5f499bf-777c-54c7-9e5d-e6b802e56c5c", "value": "Knowledge of insider threat hub operations - K1255" }, { "description": "Knowledge of insider threat operational indicators", "related": [], "uuid": "f2be7dfe-bec0-5910-8c2d-1c5ef5681cb5", "value": "Knowledge of insider threat operational indicators - K1256" }, { "description": "Knowledge of insider threat policies and procedures", "related": [], "uuid": "414e8945-4267-58bd-ad0c-720d492ed3eb", "value": "Knowledge of insider threat policies and procedures - K1257" }, { "description": "Knowledge of insider threat tactics", "related": [], "uuid": "f3ffaeae-92c5-5ffc-a179-21e8577c1498", "value": "Knowledge of insider threat tactics - K1258" }, { "description": "Knowledge of insider threat targets", "related": [], "uuid": "1b9ce29a-47d4-51b5-9ab5-7d70a85486bf", "value": "Knowledge of insider threat targets - K1259" }, { "description": "Knowledge of intelligence laws and regulations", "related": [], "uuid": "47a4efd0-9e52-52cf-bc02-49f03183b55a", "value": "Knowledge of intelligence laws and regulations - K1260" }, { "description": "Knowledge of known insider attacks", "related": [], "uuid": "ca2a0dcc-2b15-5a20-8080-53553dbe533f", "value": "Knowledge of known insider attacks - K1261" }, { "description": "Knowledge of network endpoints", "related": [], "uuid": "f70bfa25-f95e-5b1f-9ccb-c6d515908fec", "value": "Knowledge of network endpoints - K1262" }, { "description": "Knowledge of notification policies and procedures", "related": [], "uuid": "213d9283-2d73-56d3-8637-debc1880b852", "value": "Knowledge of notification policies and procedures - K1263" }, { "description": "Knowledge of organizational objectives, resources, and capabilities", "related": [], "uuid": "0b7a2f8b-94e9-511b-9b86-eddee131052f", "value": "Knowledge of organizational objectives, resources, and capabilities - K1265" }, { "description": "Knowledge of previously referred potential insider threats", "related": [], "uuid": "03d5b80f-d4c4-5275-9eae-4c0159174f5f", "value": "Knowledge of previously referred potential insider threats - K1267" }, { "description": "Knowledge of risk reduction metrics", "related": [], "uuid": "e2908ee9-e89f-5109-9bb4-f956a33ac64d", "value": "Knowledge of risk reduction metrics - K1268" }, { "description": "Knowledge of security information and event management (SIEM) tools and techniques", "related": [], "uuid": "85c68b75-e307-5e6c-8519-f8608fc41dc5", "value": "Knowledge of security information and event management (SIEM) tools and techniques - K1269" }, { "description": "Knowledge of suspicious activity response processes", "related": [], "uuid": "72b51301-42dc-59c3-9326-78a6161563b1", "value": "Knowledge of suspicious activity response processes - K1270" }, { "description": "Knowledge of system alert policies and procedures", "related": [], "uuid": "3d1f509e-5f9c-5daa-998e-f55d4b08d2a0", "value": "Knowledge of system alert policies and procedures - K1271" }, { "description": "Knowledge of system components", "related": [], "uuid": "32ded5bb-5cc3-590d-95c8-8d20cb07fc3e", "value": "Knowledge of system components - K1272" }, { "description": "Knowledge of threat investigation policies and procedures", "related": [], "uuid": "d7fb2f7e-f2f8-5d6c-8242-4521c400a1be", "value": "Knowledge of threat investigation policies and procedures - K1273" }, { "description": "Knowledge of threat modeling tools and techniques", "related": [], "uuid": "97c306aa-1cbf-5e50-943b-ef8de741580c", "value": "Knowledge of threat modeling tools and techniques - K1274" }, { "description": "Knowledge of User Activity Monitoring (UAM) tools and techniques", "related": [], "uuid": "734812be-1c75-51f0-b18f-67cccb24d4c3", "value": "Knowledge of User Activity Monitoring (UAM) tools and techniques - K1275" }, { "description": "Knowledge of vulnerability data sources", "related": [], "uuid": "ac641817-b333-5084-8014-b0020ddfb13d", "value": "Knowledge of vulnerability data sources - K0723" }, { "description": "Knowledge of incident response principles and practices", "related": [], "uuid": "b33df331-abbb-5700-a9f2-1da0e5a365a9", "value": "Knowledge of incident response principles and practices - K0724" }, { "description": "Knowledge of incident response tools and techniques", "related": [], "uuid": "b4d3edd0-c279-54db-b6db-f902a2c669b9", "value": "Knowledge of incident response tools and techniques - K0725" }, { "description": "Knowledge of incident handling tools and techniques", "related": [], "uuid": "03d76b12-8887-5414-901f-47f80f599252", "value": "Knowledge of incident handling tools and techniques - K0726" }, { "description": "Knowledge of virtual private network (VPN) systems and software", "related": [], "uuid": "be48211d-d3de-55a6-a5ba-f74ea3d9a20e", "value": "Knowledge of virtual private network (VPN) systems and software - K0781" }, { "description": "Knowledge of network attack characteristics", "related": [], "uuid": "0d88abb6-befa-51ae-9d95-0668bf25de1e", "value": "Knowledge of network attack characteristics - K0783" }, { "description": "Knowledge of file extensions", "related": [], "uuid": "c296abd5-f236-56e5-a1af-d99c1bc174ba", "value": "Knowledge of file extensions - K0793" }, { "description": "Knowledge of command-line tools and techniques", "related": [], "uuid": "d2bef6a4-9b12-5645-aed5-b874b2a0e499", "value": "Knowledge of command-line tools and techniques - K0805" }, { "description": "Knowledge of account creation policies and procedures", "related": [], "uuid": "8db4e15e-b186-5c72-bfd7-739dec6c974a", "value": "Knowledge of account creation policies and procedures - K0829" }, { "description": "Knowledge of password policies and procedures", "related": [], "uuid": "d9e14c9e-5e27-5c4f-a0c1-f7d39d678c12", "value": "Knowledge of password policies and procedures - K0830" }, { "description": "Knowledge of cyberattack characteristics", "related": [], "uuid": "fe6277b7-3237-50b3-ac51-aed13342cb80", "value": "Knowledge of cyberattack characteristics - K0832" }, { "description": "Knowledge of cyberattack actor characteristics", "related": [], "uuid": "3af3488f-0ee4-5dfb-bd2b-3e7f70f3f2dc", "value": "Knowledge of cyberattack actor characteristics - K0833" }, { "description": "Knowledge of network port capabilities and applications", "related": [], "uuid": "16110281-54e7-5092-8be3-14234b193e03", "value": "Knowledge of network port capabilities and applications - K0861" }, { "description": "Knowledge of network mapping principles and practices", "related": [], "uuid": "95008d51-ca07-5286-82c1-ddd9d0a50c3c", "value": "Knowledge of network mapping principles and practices - K0938" }, { "description": "Knowledge of packet-level analysis tools and techniques", "related": [], "uuid": "26474da0-6dee-570d-97af-69ac37659aad", "value": "Knowledge of packet-level analysis tools and techniques - K0939" }, { "description": "Knowledge of subnet tools and techniques", "related": [], "uuid": "c07a8e3c-a194-5bd4-86da-043a595d1626", "value": "Knowledge of subnet tools and techniques - K0940" }, { "description": "Knowledge of Intrusion Detection System (IDS) tools and techniques", "related": [], "uuid": "5889dd5e-0446-5156-b519-cbd37a81b897", "value": "Knowledge of Intrusion Detection System (IDS) tools and techniques - K0950" }, { "description": "Knowledge of Intrusion Prevention System (IPS) tools and techniques", "related": [], "uuid": "1c62b424-0223-50d3-97be-3d061fc4a30f", "value": "Knowledge of Intrusion Prevention System (IPS) tools and techniques - K0951" }, { "description": "Knowledge of protocol analyzer tools and techniques", "related": [], "uuid": "1ce8035b-086d-55b3-8d26-c6232735d229", "value": "Knowledge of protocol analyzer tools and techniques - K1089" }, { "description": "Knowledge of cyber defense monitoring tools", "related": [], "uuid": "4a20861a-6d6e-5627-80aa-f8960ee944b0", "value": "Knowledge of cyber defense monitoring tools - K1131" }, { "description": "Knowledge of cyber defense system analysis tools", "related": [], "uuid": "9a4daffc-3a3d-5652-825d-0799c087c52b", "value": "Knowledge of cyber defense system analysis tools - K1132" }, { "description": "Knowledge of data correlation tools and techniques", "related": [], "uuid": "288b4e94-c6e0-5143-834d-b052e28e9bb3", "value": "Knowledge of data correlation tools and techniques - K1144" }, { "description": "Knowledge of intrusion set tools and techniques", "related": [], "uuid": "d425e38a-2577-53ea-94d4-a856aa786d57", "value": "Knowledge of intrusion set tools and techniques - K1168" }, { "description": "Knowledge of network topologies", "related": [], "uuid": "86a32808-bf7b-55f1-8840-9d2be560f913", "value": "Knowledge of network topologies - K1176" }, { "description": "Knowledge of organizational cybersecurity incident response plans", "related": [], "uuid": "89f3a8fb-7f69-5db2-928f-7f8a7d63043b", "value": "Knowledge of organizational cybersecurity incident response plans - K1181" }, { "description": "Knowledge of packet analysis tools and techniques", "related": [], "uuid": "3555e0f5-7aca-5be8-a750-2a70650cd38e", "value": "Knowledge of packet analysis tools and techniques - K1193" }, { "description": "Knowledge of server diagnostic tools and techniques", "related": [], "uuid": "a1df486f-4fea-5bde-ab67-d5d4ef95fe2d", "value": "Knowledge of server diagnostic tools and techniques - K0760" }, { "description": "Knowledge of Fault Detection and Diagnostics (FDD) tools and techniques", "related": [], "uuid": "e431d5ae-2b1e-5cf4-a42a-76f4f4f7465a", "value": "Knowledge of Fault Detection and Diagnostics (FDD) tools and techniques - K0761" }, { "description": "Knowledge of file system implementation principles and practices", "related": [], "uuid": "e5f691df-d624-5c6a-95c3-257fdcf063d4", "value": "Knowledge of file system implementation principles and practices - K0794" }, { "description": "Knowledge of digital evidence seizure policies and procedures", "related": [], "uuid": "ad64a899-c5bb-501b-97f3-d253d2fbe974", "value": "Knowledge of digital evidence seizure policies and procedures - K0795" }, { "description": "Knowledge of digital evidence preservation policies and procedures", "related": [], "uuid": "5ee4ac51-a67c-5a8f-8f42-8e3bb3d203ee", "value": "Knowledge of digital evidence preservation policies and procedures - K0796" }, { "description": "Knowledge of chain of custody policies and procedures", "related": [], "uuid": "f29ca9e1-ec7f-5634-bb09-dbde831a30f0", "value": "Knowledge of chain of custody policies and procedures - K0802" }, { "description": "Knowledge of persistent data principles and practices", "related": [], "uuid": "46582ab3-5851-5b67-8b74-ebc4fc9ff4b7", "value": "Knowledge of persistent data principles and practices - K0804" }, { "description": "Knowledge of system file characteristics", "related": [], "uuid": "be6ae27f-7aba-52f5-ae4b-772293c7ff62", "value": "Knowledge of system file characteristics - K0808" }, { "description": "Knowledge of event correlation tools and techniques", "related": [], "uuid": "5b446d89-98f4-592a-9002-56ff3aca782d", "value": "Knowledge of event correlation tools and techniques - K0817" }, { "description": "Knowledge of data carving tools and techniques", "related": [], "uuid": "5a405b82-8451-55aa-9953-0ed37e278f42", "value": "Knowledge of data carving tools and techniques - K0850" }, { "description": "Knowledge of anti-forensics tools and techniques", "related": [], "uuid": "76775b12-13a2-5882-90c8-e0946d38a06a", "value": "Knowledge of anti-forensics tools and techniques - K0852" }, { "description": "Knowledge of forensics lab design principles and practices", "related": [], "uuid": "e77bbb67-f8be-5803-b8af-1c00e1aa1ebf", "value": "Knowledge of forensics lab design principles and practices - K0853" }, { "description": "Knowledge of forensics lab design systems and software", "related": [], "uuid": "558d22c9-27bf-5f2a-9b5d-bf422cb6c168", "value": "Knowledge of forensics lab design systems and software - K0854" }, { "description": "Knowledge of debugging tools and techniques", "related": [], "uuid": "2be7fe99-f4ed-5254-9dca-7adc8b7ca85a", "value": "Knowledge of debugging tools and techniques - K0855" }, { "description": "Knowledge of filename extension abuse", "related": [], "uuid": "b622cf80-fa4d-5b6b-bd09-ff22b7bcd6c4", "value": "Knowledge of filename extension abuse - K0856" }, { "description": "Knowledge of binary analysis tools and techniques", "related": [], "uuid": "c473b439-89e4-5e6b-ba56-429a530ea8bf", "value": "Knowledge of binary analysis tools and techniques - K0914" }, { "description": "Knowledge of code obfuscation tools and techniques", "related": [], "uuid": "bf376f9e-471d-5c78-8834-838ccac33edf", "value": "Knowledge of code obfuscation tools and techniques - K1016" }, { "description": "Knowledge of media forensics", "related": [], "uuid": "2af6f3d4-f6f3-5db6-9456-6216e5c15c4e", "value": "Knowledge of media forensics - K1091" }, { "description": "Knowledge of digital forensics tools and techniques", "related": [], "uuid": "5fd1aed8-706c-5c4d-b6b0-3f2703bfd4ac", "value": "Knowledge of digital forensics tools and techniques - K1092" }, { "description": "Knowledge of Chain of Custody (CoC) processes and procedures", "related": [], "uuid": "b5b99be4-7b9a-5a37-81e9-4712d902bc87", "value": "Knowledge of Chain of Custody (CoC) processes and procedures - K1115" }, { "description": "Knowledge of data integrity principles and practices", "related": [], "uuid": "e7ff593b-d4d2-5826-bc00-71d99f56567b", "value": "Knowledge of data integrity principles and practices - K1147" }, { "description": "Knowledge of digital evidence cataloging tools and techniques", "related": [], "uuid": "7f3aa382-a5d4-53a5-bce4-35693b90cc37", "value": "Knowledge of digital evidence cataloging tools and techniques - K1151" }, { "description": "Knowledge of digital evidence extraction tools and techniques", "related": [], "uuid": "9ade887b-8380-5707-877c-01d834bcb88d", "value": "Knowledge of digital evidence extraction tools and techniques - K1152" }, { "description": "Knowledge of digital evidence handling principles and practices", "related": [], "uuid": "bddbce01-830f-5850-8aed-d7693f46b511", "value": "Knowledge of digital evidence handling principles and practices - K1153" }, { "description": "Knowledge of digital evidence packaging tools and techniques", "related": [], "uuid": "bbbe2275-8862-5c3f-a84a-1a3158953726", "value": "Knowledge of digital evidence packaging tools and techniques - K1154" }, { "description": "Knowledge of digital evidence preservation tools and techniques", "related": [], "uuid": "2bb413b1-cb8a-5be6-9972-c04e6ad300f0", "value": "Knowledge of digital evidence preservation tools and techniques - K1155" }, { "description": "Knowledge of forensic image processing tools and techniques", "related": [], "uuid": "a099ddf9-bf17-58de-ad84-56820409e858", "value": "Knowledge of forensic image processing tools and techniques - K1163" }, { "description": "Knowledge of network monitoring tools and techniques", "related": [], "uuid": "d9b38b3a-328b-591e-8c2c-5d509925714e", "value": "Knowledge of network monitoring tools and techniques - K1175" }, { "description": "Knowledge of wireless applications vulnerabilities", "related": [], "uuid": "999cf1c7-b2c2-5921-bd2c-802dc01cf21f", "value": "Knowledge of wireless applications vulnerabilities - K0375" }, { "description": "Knowledge of malware", "related": [], "uuid": "5112a672-dbe2-5af0-b764-a87037a13b9b", "value": "Knowledge of malware - K0480" }, { "description": "Knowledge of decryption", "related": [], "uuid": "bcc12ecc-af8c-5ecd-90f4-11be976e08ad", "value": "Knowledge of decryption - K0635" }, { "description": "Knowledge of decryption tools and techniques", "related": [], "uuid": "2d1a81c0-41b2-5cb9-8a63-4568975b39c7", "value": "Knowledge of decryption tools and techniques - K0636" }, { "description": "Knowledge of data repositories", "related": [], "uuid": "86aaefc8-52c0-5a4a-a1b5-77203e93b1dd", "value": "Knowledge of data repositories - K0637" }, { "description": "Knowledge of network collection tools and techniques", "related": [], "uuid": "2ceba69a-d1ee-57e1-97df-a449452fcd8c", "value": "Knowledge of network collection tools and techniques - K0656" }, { "description": "Knowledge of network collection policies and procedures", "related": [], "uuid": "dc79212d-07c5-5d4a-9ee7-ea5b7a6ad4f0", "value": "Knowledge of network collection policies and procedures - K0657" }, { "description": "Knowledge of encryption algorithm capabilities and applications", "related": [], "uuid": "dfd33f0b-6346-540b-aa92-54e46e8869fe", "value": "Knowledge of encryption algorithm capabilities and applications - K0697" }, { "description": "Knowledge of data backup and recovery policies and procedures", "related": [], "uuid": "a463b26c-5f49-53bd-a01c-1901af563a53", "value": "Knowledge of data backup and recovery policies and procedures - K0701" }, { "description": "Knowledge of data warehousing principles and practices", "related": [], "uuid": "58ad05fa-93a0-55c9-87fe-975dfd379ea2", "value": "Knowledge of data warehousing principles and practices - K0702" }, { "description": "Knowledge of data mining principles and practices", "related": [], "uuid": "6dbbe2a3-0921-5192-8801-dbe588e65f6f", "value": "Knowledge of data mining principles and practices - K0703" }, { "description": "Knowledge of information management tools and techniques", "related": [], "uuid": "4e39ad78-6eb5-5a46-b5bc-48db1496841c", "value": "Knowledge of information management tools and techniques - K0775" }, { "description": "Knowledge of physical computer components", "related": [], "uuid": "ee470baf-978b-5b31-a393-434c969528e3", "value": "Knowledge of physical computer components - K0786" }, { "description": "Knowledge of computer peripherals", "related": [], "uuid": "0c89a962-6bf5-59e3-bf6f-d6f9ed2d0b84", "value": "Knowledge of computer peripherals - K0787" }, { "description": "Knowledge of machine virtualization tools and techniques", "related": [], "uuid": "3e656e32-8ecf-55a3-b1cf-93e76269f890", "value": "Knowledge of machine virtualization tools and techniques - K0806" }, { "description": "Knowledge of deployable forensics principles and practices", "related": [], "uuid": "900d86af-1069-5a21-94b8-56c56f2d7001", "value": "Knowledge of deployable forensics principles and practices - K0810" }, { "description": "Knowledge of intelligence collection management processes", "related": [], "uuid": "b203fa28-1b0d-51a2-958b-c340509debdf", "value": "Knowledge of intelligence collection management processes - K0815" }, { "description": "Knowledge of virtual machine detection tools and techniques", "related": [], "uuid": "9c50a93e-0426-5bde-8c19-9fbd8f4c364b", "value": "Knowledge of virtual machine detection tools and techniques - K0858" }, { "description": "Knowledge of data mining tools and techniques", "related": [], "uuid": "1653e923-0e1f-58ce-95ea-c7961840f3cc", "value": "Knowledge of data mining tools and techniques - K0953" }, { "description": "Knowledge of auditing policies and procedures", "related": [], "uuid": "261cd103-9446-52f4-b8e6-458bc0fe7955", "value": "Knowledge of auditing policies and procedures - K0970" }, { "description": "Knowledge of logging policies and procedures", "related": [], "uuid": "b51d1699-b391-58a2-8708-6b574d444820", "value": "Knowledge of logging policies and procedures - K0971" }, { "description": "Knowledge of software application vulnerabilities", "related": [], "uuid": "83270faf-3060-56a3-ab07-017252511b75", "value": "Knowledge of software application vulnerabilities - K0975" }, { "description": "Knowledge of active defense tools and techniques", "related": [], "uuid": "2f3e9254-651e-59bc-a9ee-16b87c870c52", "value": "Knowledge of active defense tools and techniques - K0988" }, { "description": "Knowledge of database administration principles and practices", "related": [], "uuid": "adfcf428-a5a5-51b8-8723-c05fd9c19bfb", "value": "Knowledge of database administration principles and practices - K0991" }, { "description": "Knowledge of database maintenance principles and practices", "related": [], "uuid": "443b225e-92ec-50b3-9b82-8322471565d5", "value": "Knowledge of database maintenance principles and practices - K0992" }, { "description": "Knowledge of deconfliction processes", "related": [], "uuid": "21f3e1a8-416b-58f1-b87b-4015a3b51731", "value": "Knowledge of deconfliction processes - K0993" }, { "description": "Knowledge of Wireless Local Area Network (WLAN) tools and techniques", "related": [], "uuid": "c3d73292-c5b4-539a-94e9-dda03c7df736", "value": "Knowledge of Wireless Local Area Network (WLAN) tools and techniques - K0998" }, { "description": "Knowledge of information management principles and practices", "related": [], "uuid": "b9de3af4-84fb-5dd7-84dc-46853f125167", "value": "Knowledge of information management principles and practices - K0999" }, { "description": "Knowledge of evasion principles and practices", "related": [], "uuid": "19081784-6fe1-5ac8-bbb0-d0e39090e493", "value": "Knowledge of evasion principles and practices - K1000" }, { "description": "Knowledge of evasion tools and techniques", "related": [], "uuid": "7288b19d-fa47-53a4-9af1-6fd77bb04aad", "value": "Knowledge of evasion tools and techniques - K1001" }, { "description": "Knowledge of network topology principles and practices", "related": [], "uuid": "9ef2cd99-ab68-5a24-afcd-971ecbfda5ae", "value": "Knowledge of network topology principles and practices - K1015" }, { "description": "Knowledge of network exploitation tools and techniques", "related": [], "uuid": "fb3f90ca-151f-5fb9-b976-7798c2650c9f", "value": "Knowledge of network exploitation tools and techniques - K1023" }, { "description": "Knowledge of partnership policies and procedures", "related": [], "uuid": "ad132dfb-57b4-5fb4-9b2d-5b4b222713d8", "value": "Knowledge of partnership policies and procedures - K1024" }, { "description": "Knowledge of satellite-based communication systems and software", "related": [], "uuid": "69c33569-5901-572e-8bea-8baae24cbfcc", "value": "Knowledge of satellite-based communication systems and software - K1032" }, { "description": "Knowledge of digital forensics principles and practices", "related": [], "uuid": "98fd4a5b-d7fe-55a7-a396-406ed24db2a2", "value": "Knowledge of digital forensics principles and practices - K1055" }, { "description": "Knowledge of virtual machine tools and technologies", "related": [], "uuid": "9afa506d-fecd-5511-92b4-ccdbf11cd471", "value": "Knowledge of virtual machine tools and technologies - K1069" }, { "description": "Knowledge of exploitation tools and techniques", "related": [], "uuid": "fc5ee907-6e48-5329-a95f-3f686615fee6", "value": "Knowledge of exploitation tools and techniques - K1085" }, { "description": "Knowledge of remote command line tools and techniques", "related": [], "uuid": "837873eb-98de-55ea-bbf3-8bcd406db628", "value": "Knowledge of remote command line tools and techniques - K1102" }, { "description": "Knowledge of Graphic User Interface (GUI) tools and techniques", "related": [], "uuid": "abda837d-ac2a-5b40-b91f-feb2d899055e", "value": "Knowledge of Graphic User Interface (GUI) tools and techniques - K1103" }, { "description": "Knowledge of Internet and routing protocols", "related": [], "uuid": "e76e7c18-1d91-5029-94b0-8efbde268c59", "value": "Knowledge of Internet and routing protocols - K0470" }, { "description": "Knowledge of targeting cycles", "related": [], "uuid": "0976540f-7854-5ec6-a352-a7da62af1df9", "value": "Knowledge of targeting cycles - K0551" }, { "description": "Knowledge of intelligence fusion", "related": [], "uuid": "8a39106a-8d69-5e24-91c8-f12815fb9955", "value": "Knowledge of intelligence fusion - K0655" }, { "description": "Knowledge of intrusion detection tools and techniques", "related": [], "uuid": "db644042-0fb4-53e9-a0ac-d8ec8c6464e2", "value": "Knowledge of intrusion detection tools and techniques - K0732" }, { "description": "Knowledge of web mail tools and techniques", "related": [], "uuid": "a86dffb7-6c96-55c9-beca-20a8d1ecb72b", "value": "Knowledge of web mail tools and techniques - K0807" }, { "description": "Knowledge of front-end intelligence collection systems and software", "related": [], "uuid": "36507043-3305-50c4-b376-2d2dc92b803b", "value": "Knowledge of front-end intelligence collection systems and software - K0816" }, { "description": "Knowledge of cyber attack stages", "related": [], "uuid": "df4f8cb3-0cdc-577a-b424-e9f14b8e873b", "value": "Knowledge of cyber attack stages - K0844" }, { "description": "Knowledge of cyber intrusion activity phases", "related": [], "uuid": "f671ae47-71a0-530a-a9f9-db64cd785793", "value": "Knowledge of cyber intrusion activity phases - K0845" }, { "description": "Knowledge of malware signature principles and practices", "related": [], "uuid": "e06b25ff-90c4-58f0-a76c-15b1d7542789", "value": "Knowledge of malware signature principles and practices - K0860" }, { "description": "Knowledge of system persistence tools and techniques", "related": [], "uuid": "1dc9ed1c-400d-56f9-ba32-e12e71787c15", "value": "Knowledge of system persistence tools and techniques - K0973" }, { "description": "Knowledge of intelligence collection development processes", "related": [], "uuid": "edba7995-fbb2-5319-916e-4924e88c94f9", "value": "Knowledge of intelligence collection development processes - K0974" }, { "description": "Knowledge of intelligence collection management tools and techniques", "related": [], "uuid": "77b21424-fde4-50ec-ad6f-bd9d98405102", "value": "Knowledge of intelligence collection management tools and techniques - K0977" }, { "description": "Knowledge of information searching tools and techniques", "related": [], "uuid": "ef9c5898-a67b-5945-b9fd-19ed10203646", "value": "Knowledge of information searching tools and techniques - K0979" }, { "description": "Knowledge of intelligence collection sources", "related": [], "uuid": "c77193d6-3f81-5c97-a161-602dca1b1c2c", "value": "Knowledge of intelligence collection sources - K0980" }, { "description": "Knowledge of target selection criticality factors", "related": [], "uuid": "fb540243-d82f-5470-979a-b20d80e57b2f", "value": "Knowledge of target selection criticality factors - K0986" }, { "description": "Knowledge of target selection vulnerability factors", "related": [], "uuid": "5bc7c05d-6382-5fe7-b232-447cff272a99", "value": "Knowledge of target selection vulnerability factors - K0987" }, { "description": "Knowledge of reporting policies and procedures", "related": [], "uuid": "97046ca4-af9f-5231-acf6-67b64fe21659", "value": "Knowledge of reporting policies and procedures - K1004" }, { "description": "Knowledge of midpoint collection principles and practices", "related": [], "uuid": "c3f904e0-fd0f-539f-aaa0-685ce7ea9b83", "value": "Knowledge of midpoint collection principles and practices - K1013" }, { "description": "Knowledge of scripting principles and practices", "related": [], "uuid": "698c596b-598f-5b7b-b483-aa1e3e081219", "value": "Knowledge of scripting principles and practices - K1033" }, { "description": "Knowledge of target intelligence gathering tools and techniques", "related": [], "uuid": "8b619a64-5fc3-5c4f-89cc-30de3031b52d", "value": "Knowledge of target intelligence gathering tools and techniques - K1041" }, { "description": "Knowledge of target selection policies and procedures", "related": [], "uuid": "0c5a4b2f-35ac-5d0f-ba2f-514059b97ba6", "value": "Knowledge of target selection policies and procedures - K1042" }, { "description": "Knowledge of terminal collection", "related": [], "uuid": "55ceae68-3213-5668-a7a8-d0613870ffa4", "value": "Knowledge of terminal collection - K1046" }, { "description": "Knowledge of environmental collection", "related": [], "uuid": "d79367fc-ba71-53f2-a6a8-c03d32cb798b", "value": "Knowledge of environmental collection - K1047" }, { "description": "Knowledge of non-attributable networks", "related": [], "uuid": "493d141b-01a5-58d2-8812-8bed3a234e63", "value": "Knowledge of non-attributable networks - K1105" }, { "description": "Knowledge of traceroute tools and techniques", "related": [], "uuid": "904a9a35-1c27-5e21-a013-8192581094e3", "value": "Knowledge of traceroute tools and techniques - K1108" }, { "description": "Knowledge of organizational objectives", "related": [], "uuid": "9662dfc5-f028-57b1-8867-ff58f54cf162", "value": "Knowledge of organizational objectives - K1187" }, { "description": "Knowledge of supply chain risk management practices", "related": [], "uuid": "f2472128-2696-5d1f-8d44-080c3fef48ee", "value": "Knowledge of supply chain risk management practices - K1221" }, { "description": "Knowledge of target requirements", "related": [], "uuid": "b68a894f-9294-5d7c-a13b-3d257799e30c", "value": "Knowledge of target requirements - K1231" }, { "description": "Knowledge of cognitive biases", "related": [], "uuid": "b1bb2dfb-a4f4-5f7e-a98d-fe7bbeefa43b", "value": "Knowledge of cognitive biases - K0658" }, { "description": "Knowledge of adversarial tactics principles and practices", "related": [], "uuid": "a5a9b9a3-fe9a-542b-9018-c7af868d63cf", "value": "Knowledge of adversarial tactics principles and practices - K0788" }, { "description": "Knowledge of adversarial tactics tools and techniques", "related": [], "uuid": "a1877c8d-71e0-5c8f-8ea0-e5557d9a9954", "value": "Knowledge of adversarial tactics tools and techniques - K0789" }, { "description": "Knowledge of adversarial tactics policies and procedures", "related": [], "uuid": "42d488e9-bd3b-57a9-bde1-8f457bc5ed60", "value": "Knowledge of adversarial tactics policies and procedures - K0790" }, { "description": "Knowledge of analytic standards and frameworks Skill in assigning analytical confidence ratings", "related": [], "uuid": "8a0cba08-9f78-574f-9b2b-ab226249c6f3", "value": "Knowledge of analytic standards and frameworks Skill in assigning analytical confidence ratings - K0968" }, { "description": "Knowledge of intelligence information repositories", "related": [], "uuid": "64b246c6-e816-529c-8227-6e1fa4c3ce55", "value": "Knowledge of intelligence information repositories - K0989" }, { "description": "Knowledge of denial and deception tools and techniques", "related": [], "uuid": "ae7017ab-e0fb-56b8-9752-acfd8061795e", "value": "Knowledge of denial and deception tools and techniques - K0994" }, { "description": "Knowledge of supervisory control and data acquisition (SCADA) systems and software", "related": [], "uuid": "7cb71013-424b-5133-92c6-6502159114d4", "value": "Knowledge of supervisory control and data acquisition (SCADA) systems and software - K1002" }, { "description": "Knowledge of intelligence collection capabilities and applications", "related": [], "uuid": "708dc88c-20d6-588e-9b5b-f9cd9fc5ae2f", "value": "Knowledge of intelligence collection capabilities and applications - K1005" }, { "description": "Knowledge of intelligence requirements tasking systems and software", "related": [], "uuid": "38152699-cf57-5b0b-8cd3-9c6ba598e037", "value": "Knowledge of intelligence requirements tasking systems and software - K1007" }, { "description": "Knowledge of intelligence policies and procedures", "related": [], "uuid": "8b5e44dd-9eca-5ebf-8bd3-14afefb3fc8b", "value": "Knowledge of intelligence policies and procedures - K1010" }, { "description": "Knowledge of request for information processes", "related": [], "uuid": "fd0b59ad-bd2c-5b6d-97f1-2f4dd03dce40", "value": "Knowledge of request for information processes - K1059" }, { "description": "Knowledge of threat systems and software", "related": [], "uuid": "26fffaaf-eeeb-5e33-ad18-1894603faadc", "value": "Knowledge of threat systems and software - K1068" }, { "description": "Knowledge of targeting databases", "related": [], "uuid": "42fcfba1-1f15-51cc-b3df-e14aa3c00ed3", "value": "Knowledge of targeting databases - K1106" }, { "description": "Knowledge of targeting systems and software", "related": [], "uuid": "2fbb15bd-ec8f-5061-85c2-fdb6edf1a5ae", "value": "Knowledge of targeting systems and software - K1107" }, { "description": "Knowledge of priority intelligence requirements", "related": [], "uuid": "9c56136a-f254-5bb1-8737-f8a63e188fdf", "value": "Knowledge of priority intelligence requirements - K1197" }, { "description": "Knowledge of dynamic targeting principles and practices", "related": [], "uuid": "e8d53bdc-04bd-5ed4-b55a-78d9ddeca502", "value": "Knowledge of dynamic targeting principles and practices - K0995" }, { "description": "Knowledge of deliberate targeting principles and practices", "related": [], "uuid": "c438f9aa-8787-5755-a386-161905cb34a5", "value": "Knowledge of deliberate targeting principles and practices - K0996" }, { "description": "Knowledge of targeting governing authorities", "related": [], "uuid": "e0b59302-41cd-57af-a822-f87ed5ce5d53", "value": "Knowledge of targeting governing authorities - K1003" }, { "description": "Knowledge of intelligence cycle principles and practices", "related": [], "uuid": "a0cbcd04-fc70-501f-a1b9-161b24a2cc19", "value": "Knowledge of intelligence cycle principles and practices - K1006" }, { "description": "Knowledge of malware characteristics", "related": [], "uuid": "dc5ca898-e132-552b-8814-cdf1340a3e34", "value": "Knowledge of malware characteristics - K1012" }, { "description": "Knowledge of target estimated recovery times", "related": [], "uuid": "3de9e72a-f90d-5bd4-988f-04fa52a1bcfb", "value": "Knowledge of target estimated recovery times - K1040" }, { "description": "Knowledge of Request For Information (RFI) processes", "related": [], "uuid": "cdb13551-d78c-5524-a591-c01eb90076a7", "value": "Knowledge of Request For Information (RFI) processes - K1064" }, { "description": "Knowledge of geospatial data analysis tools and techniques", "related": [], "uuid": "a11f03bd-2173-53cc-868d-6c13b15425d5", "value": "Knowledge of geospatial data analysis tools and techniques - K1104" }, { "description": "Knowledge of information sanitization methods", "related": [], "uuid": "87b96b79-5cdb-5c4d-a196-cd51d5175985", "value": "Knowledge of information sanitization methods - K1167" }, { "description": "Knowledge of targeting products", "related": [], "uuid": "5d8618f8-f1de-5967-b006-6d2caa71567b", "value": "Knowledge of targeting products - K1232" }, { "description": "Knowledge of target characteristics", "related": [], "uuid": "8cda3950-2398-5bb4-bf34-704cea2eeb02", "value": "Knowledge of target characteristics - K1043" }, { "description": "Knowledge of collection data flow from origin into repositories and tools", "related": [], "uuid": "16c9a4c9-de26-54e8-bca4-487f6c01d725", "value": "Knowledge of collection data flow from origin into repositories and tools - K1051" }, { "description": "Knowledge of classification guidelines", "related": [], "uuid": "3b3697fe-dccc-553b-a453-3da1f1a36c9c", "value": "Knowledge of classification guidelines - K1116" }, { "description": "Knowledge of network components", "related": [], "uuid": "18c3f5f2-a3df-540d-9378-601cafff2de0", "value": "Knowledge of network components - K1174" }, { "description": "Knowledge of black-box software testing", "related": [], "uuid": "04ba2089-5db9-53f9-88c2-428fa445e30f", "value": "Knowledge of black-box software testing - K1093" }, { "description": "Knowledge of customer requirements", "related": [], "uuid": "e5247e1c-6041-573f-a10c-8623d0f1dccf", "value": "Knowledge of customer requirements - K1128" }, { "description": "Knowledge of evaluation and validation principles and practices", "related": [], "uuid": "95507cf8-b234-55e4-864d-c2e4ef7a0bb0", "value": "Knowledge of evaluation and validation principles and practices - K0711" }, { "description": "Knowledge of industry cybersecurity models and frameworks", "related": [], "uuid": "08432f61-324a-5b4a-b5b9-2a1f919b03a7", "value": "Knowledge of industry cybersecurity models and frameworks - K0879" }, { "description": "Knowledge of access control models and frameworks", "related": [], "uuid": "a9b7cd85-44d3-5126-9297-76aee7c7abc1", "value": "Knowledge of access control models and frameworks - K0880" }, { "description": "Knowledge of circuit analysis tools and techniques", "related": [], "uuid": "6db1a46b-2661-5da6-aaa5-21b8a3a10b44", "value": "Knowledge of circuit analysis tools and techniques - K0883" }, { "description": "Knowledge of organizational security posture", "related": [], "uuid": "95fc21b0-b3ab-5980-896f-30d64c3d3cfb", "value": "Knowledge of organizational security posture - K1191" }, { "description": "Knowledge of information technology (IT) architecture models and frameworks", "related": [], "uuid": "e53e4d09-2fec-5b35-a994-66c4481c7482", "value": "Knowledge of information technology (IT) architecture models and frameworks - K0733" }, { "description": "Knowledge of technology procurement principles and practices", "related": [], "uuid": "25330898-fc76-5f20-b058-0574ca4b4d10", "value": "Knowledge of technology procurement principles and practices - K0834" }, { "description": "Knowledge of cyber defense laws and regulations", "related": [], "uuid": "8f14e20f-c30f-5d8b-b3c2-dc851009eba6", "value": "Knowledge of cyber defense laws and regulations - K0892" }, { "description": "Knowledge of targeting laws and regulations", "related": [], "uuid": "2401863c-51f3-5a7f-9894-1fa36509a7e1", "value": "Knowledge of targeting laws and regulations - K0962" }, { "description": "Knowledge of exploitation laws and regulations", "related": [], "uuid": "8c8faf08-c96d-5231-b6c3-dcd8e227b186", "value": "Knowledge of exploitation laws and regulations - K0963" }, { "description": "Knowledge of critical information requirements", "related": [], "uuid": "995afa18-8e3f-5a3f-a4ac-9960cd92d288", "value": "Knowledge of critical information requirements - K1050" }, { "description": "Knowledge of data security controls", "related": [], "uuid": "3ed000fc-4584-50f9-871d-e8e177cbfdc3", "value": "Knowledge of data security controls - K1077" }, { "description": "Knowledge of data privacy controls", "related": [], "uuid": "3d33960b-2281-50b5-a902-fd0a6ada852c", "value": "Knowledge of data privacy controls - K1084" }, { "description": "Knowledge of configuration management principles and practices", "related": [], "uuid": "8662c206-8268-511d-8d24-e37b6f6c010a", "value": "Knowledge of configuration management principles and practices - K1122" }, { "description": "Knowledge of security requirements", "related": [], "uuid": "3448bbd7-3d10-5da2-9e2b-0b21678870b4", "value": "Knowledge of security requirements - K1213" }, { "description": "Knowledge of systems architecture", "related": [], "uuid": "cfa8767a-f574-500e-a7a4-30c43967cb47", "value": "Knowledge of systems architecture - K1227" }, { "description": "Knowledge of systems development", "related": [], "uuid": "742c3971-b19d-5ff9-bff1-8b4c51198065", "value": "Knowledge of systems development - K1228" }, { "description": "Knowledge of system administration principles and practices", "related": [], "uuid": "855c0f9c-45eb-5a64-9366-41d551903df5", "value": "Knowledge of system administration principles and practices - K0770" }, { "description": "Knowledge of hardening tools and techniques", "related": [], "uuid": "b0a1bd6a-cffd-5348-bb46-e69d2917d978", "value": "Knowledge of hardening tools and techniques - K0837" }, { "description": "Knowledge of learning assessment tools and techniques", "related": [], "uuid": "2ac3dc7c-7495-53c2-be77-d08785bf8bde", "value": "Knowledge of learning assessment tools and techniques - K0881" }, { "description": "Knowledge of Extensible Markup Language (XML) schemas", "related": [], "uuid": "384b048f-5724-54eb-866a-b7e22af1ef8b", "value": "Knowledge of Extensible Markup Language (XML) schemas - K0176" }, { "description": "Knowledge of digital forensic data principles and practices", "related": [], "uuid": "afcf05fc-bdf2-5955-acbd-f443c4dc94d6", "value": "Knowledge of digital forensic data principles and practices - K0696" }, { "description": "Knowledge of hardware maintenance policies and procedures", "related": [], "uuid": "189d5109-0f64-529a-9304-4098368a7dfe", "value": "Knowledge of hardware maintenance policies and procedures - K0780" }, { "description": "Knowledge of network configurations", "related": [], "uuid": "53f20007-0a26-5622-8d11-92613473f14c", "value": "Knowledge of network configurations - K0792" }, { "description": "Knowledge of ethical hacking tools and techniques", "related": [], "uuid": "c8bc4a88-5534-5ab1-8f02-5941ef50d706", "value": "Knowledge of ethical hacking tools and techniques - K0797" }, { "description": "Knowledge of digital forensics data characteristics", "related": [], "uuid": "5b31c2e0-4b32-5b1c-9486-d1183af23c8c", "value": "Knowledge of digital forensics data characteristics - K0809" }, { "description": "Knowledge of digital communication systems and software", "related": [], "uuid": "e9e5cd76-e82d-55ba-9b6e-4da5f139e338", "value": "Knowledge of digital communication systems and software - K0812" }, { "description": "Knowledge of middleware software capabilities and applications", "related": [], "uuid": "f88497b3-8e46-5736-a8bc-8a49d8e2415f", "value": "Knowledge of middleware software capabilities and applications - K0841" }, { "description": "Knowledge of ethical hacking principles and practices", "related": [], "uuid": "317938d6-44d6-595e-bda4-fb2a761298e2", "value": "Knowledge of ethical hacking principles and practices - K0882" }, { "description": "Knowledge of covert communication tools and techniques", "related": [], "uuid": "acf512f1-a057-5f30-9316-da35776b2f5b", "value": "Knowledge of covert communication tools and techniques - K0884" }, { "description": "Knowledge of operating system structures and internals", "related": [], "uuid": "e4e7c54d-8c05-52e4-a41e-6a08e13758a4", "value": "Knowledge of operating system structures and internals - K0923" }, { "description": "Knowledge of network analysis tools and techniques", "related": [], "uuid": "ae05f19b-8856-5921-912c-ed80440223e0", "value": "Knowledge of network analysis tools and techniques - K0924" }, { "description": "Knowledge of wireless communication tools and techniques", "related": [], "uuid": "61e57468-872a-573e-803b-bed7b3b8da3a", "value": "Knowledge of wireless communication tools and techniques - K0925" }, { "description": "Knowledge of signal jamming tools and techniques", "related": [], "uuid": "23d5c9fd-e676-5388-8dc5-3e5c1c4a22b9", "value": "Knowledge of signal jamming tools and techniques - K0926" }, { "description": "Knowledge of network hardware threats and vulnerabilities", "related": [], "uuid": "a92f7e69-f37f-5536-84ad-ccd9059ba76f", "value": "Knowledge of network hardware threats and vulnerabilities - K0936" }, { "description": "Knowledge of operations security (OPSEC) principles and practices", "related": [], "uuid": "045218e8-92d2-5e94-aeb4-637556aba743", "value": "Knowledge of operations security (OPSEC) principles and practices - K1019" }, { "description": "Knowledge of hardware asset management principles and practices", "related": [], "uuid": "c0c28c3e-aaa4-543f-80b6-58896b4cfe99", "value": "Knowledge of hardware asset management principles and practices - K1073" }, { "description": "Knowledge of mission requirements", "related": [], "uuid": "0bcd19bc-4425-531b-a054-37cd627e2691", "value": "Knowledge of mission requirements - K1172" }, { "description": "Knowledge of reverse engineering tools and techniques", "related": [], "uuid": "7ab51bd6-57a5-5a21-9b63-b57f7136ebc3", "value": "Knowledge of reverse engineering tools and techniques - K1207" }, { "description": "Knowledge of software and sytems engineering life cycle standards", "related": [], "uuid": "ce6bf750-aa16-5eb1-a986-08a7ffdc6472", "value": "Knowledge of software and sytems engineering life cycle standards - K1217" }, { "description": "Knowledge of operational planning processes", "related": [], "uuid": "3a8d52a8-aa67-5612-9049-4157b0b2f03b", "value": "Knowledge of operational planning processes - K0498" }, { "description": "Knowledge of cybersecurity operation policies and procedures", "related": [], "uuid": "74d17734-365a-50b3-97cf-a1b31df79c68", "value": "Knowledge of cybersecurity operation policies and procedures - K0644" }, { "description": "Knowledge of data asset management principles and practices", "related": [], "uuid": "a09db539-527e-5434-ac7c-bc877d661bf7", "value": "Knowledge of data asset management principles and practices - K0766" }, { "description": "Knowledge of insider threat laws and regulations", "related": [], "uuid": "cf50fb99-9698-59d5-b528-63f052f9611c", "value": "Knowledge of insider threat laws and regulations - K0784" }, { "description": "Knowledge of insider threat tools and techniques", "related": [], "uuid": "1b2d7907-6c57-5875-9096-1ec94642b17a", "value": "Knowledge of insider threat tools and techniques - K0785" }, { "description": "Knowledge of project management principles and practices", "related": [], "uuid": "d49ef4b3-4836-5b43-879c-ef400557d142", "value": "Knowledge of project management principles and practices - K0799" }, { "description": "Knowledge of evidence admissibility laws and regulations", "related": [], "uuid": "bc70fcba-d2de-54d9-9899-51136a7334da", "value": "Knowledge of evidence admissibility laws and regulations - K0800" }, { "description": "Knowledge of new and emerging cybersecurity risks", "related": [], "uuid": "f4cda90e-51e4-5ed5-9940-67fcc6bdce44", "value": "Knowledge of new and emerging cybersecurity risks - K0818" }, { "description": "Knowledge of import and export control laws and regulations", "related": [], "uuid": "8e66db64-dc6e-5bf9-9186-6dfbdd479266", "value": "Knowledge of import and export control laws and regulations - K0819" }, { "description": "Knowledge of federal agency roles and responsibilities", "related": [], "uuid": "d0e746de-b37a-57e9-a996-69a123034bc2", "value": "Knowledge of federal agency roles and responsibilities - K0821" }, { "description": "Knowledge of threat vector characteristics", "related": [], "uuid": "d3341f1d-a377-54fb-b57b-08ebf14a3a7b", "value": "Knowledge of threat vector characteristics - K0825" }, { "description": "Knowledge of network attack vectors", "related": [], "uuid": "a02efb0e-cdc0-598f-bf9a-49860fcdc689", "value": "Knowledge of network attack vectors - K0831" }, { "description": "Knowledge of malware analysis tools and techniques", "related": [], "uuid": "36ac0367-8a96-5b31-bfbd-ca81d3949879", "value": "Knowledge of malware analysis tools and techniques - K0857" }, { "description": "Knowledge of crisis management protocols", "related": [], "uuid": "1065467b-c6bb-51b0-95c6-9fb765d8e3a6", "value": "Knowledge of crisis management protocols - K0899" }, { "description": "Knowledge of crisis management processes", "related": [], "uuid": "fef251d0-45d9-59c4-9527-4623e822e324", "value": "Knowledge of crisis management processes - K0900" }, { "description": "Knowledge of crisis management tools and techniques", "related": [], "uuid": "20d5d16b-915f-55ba-8ed7-2bbbd71b7cbd", "value": "Knowledge of crisis management tools and techniques - K0901" }, { "description": "Knowledge of malware analysis principles and practices", "related": [], "uuid": "7ee18f37-8cad-5dfa-8e56-b8c48ddc494d", "value": "Knowledge of malware analysis principles and practices - K0916" }, { "description": "Knowledge of operational design principles and practices", "related": [], "uuid": "2f7bf576-3028-5bbd-b97c-d3bb8c4f72a9", "value": "Knowledge of operational design principles and practices - K0959" }, { "description": "Knowledge of content management system (CMS) capabilities and applications", "related": [], "uuid": "cd086f00-4133-5e2e-a0d2-276106315ce7", "value": "Knowledge of content management system (CMS) capabilities and applications - K0960" }, { "description": "Knowledge of planning systems and software", "related": [], "uuid": "fd956c80-d91a-528a-89af-5cf04f509466", "value": "Knowledge of planning systems and software - K0961" }, { "description": "Knowledge of cyber-attack tools and techniques", "related": [], "uuid": "93ee072d-1e8b-5004-968b-b7a763e2c8ac", "value": "Knowledge of cyber-attack tools and techniques - K0969" }, { "description": "Knowledge of intelligence collection planning processes", "related": [], "uuid": "c152ee55-e73d-5833-b229-f70bdc68f04f", "value": "Knowledge of intelligence collection planning processes - K0978" }, { "description": "Knowledge of web security principles and practices", "related": [], "uuid": "9a8608b1-549d-5eaf-aa8a-effdd37814af", "value": "Knowledge of web security principles and practices - K0984" }, { "description": "Knowledge of crisis action plan models and frameworks", "related": [], "uuid": "1fc22cd1-b9d8-5ac0-94ff-f1575b420d48", "value": "Knowledge of crisis action plan models and frameworks - K0985" }, { "description": "Knowledge of cyber operations principles and practices", "related": [], "uuid": "2cbcfa77-8813-53fe-841a-568aadb2049d", "value": "Knowledge of cyber operations principles and practices - K0990" }, { "description": "Knowledge of intelligence support activities", "related": [], "uuid": "72e346b7-3cf8-5a88-b8d1-d87e202a23bf", "value": "Knowledge of intelligence support activities - K1008" }, { "description": "Knowledge of threat intelligence principles and practices", "related": [], "uuid": "72c74de9-ba49-5fd8-bab3-1d29e36f4855", "value": "Knowledge of threat intelligence principles and practices - K1009" }, { "description": "Knowledge of network addressing principles and practices", "related": [], "uuid": "98fa4be7-4ec8-5335-9362-331256305736", "value": "Knowledge of network addressing principles and practices - K1011" }, { "description": "Knowledge of operational effectiveness assessment principles and practices", "related": [], "uuid": "0481b8fd-92c3-5427-a7f9-8bf9b5f6b175", "value": "Knowledge of operational effectiveness assessment principles and practices - K1017" }, { "description": "Knowledge of organization decision support tools and techniques", "related": [], "uuid": "a5f3167f-99c3-50dd-8e53-531485e88927", "value": "Knowledge of organization decision support tools and techniques - K1020" }, { "description": "Knowledge of decision-making policies and procedures", "related": [], "uuid": "fc3801e7-4641-5a33-960e-22573fe3399f", "value": "Knowledge of decision-making policies and procedures - K1025" }, { "description": "Knowledge of target development principles and practices", "related": [], "uuid": "cf8609db-e2e8-56da-b55d-165836218860", "value": "Knowledge of target development principles and practices - K1028" }, { "description": "Knowledge of operational planning tools and techniques", "related": [], "uuid": "0a25e665-d1a7-55dc-a710-b58fbc7efa47", "value": "Knowledge of operational planning tools and techniques - K1030" }, { "description": "Knowledge of target research tools and techniques", "related": [], "uuid": "523f2bb0-a43d-5970-b189-45590b72eaa6", "value": "Knowledge of target research tools and techniques - K1035" }, { "description": "Knowledge of target organization structures", "related": [], "uuid": "559faa37-46b2-5044-92e8-040308fb414b", "value": "Knowledge of target organization structures - K1036" }, { "description": "Knowledge of target critical capabilities", "related": [], "uuid": "90cb7313-76b2-5dbc-b428-066876c998d9", "value": "Knowledge of target critical capabilities - K1037" }, { "description": "Knowledge of target critical vulnerabilities", "related": [], "uuid": "5be47f21-0537-5d3e-917e-e024f287c1b6", "value": "Knowledge of target critical vulnerabilities - K1038" }, { "description": "Knowledge of red team functions and capabilities", "related": [], "uuid": "a97e2c07-f732-5003-ae3b-93ba8737339a", "value": "Knowledge of red team functions and capabilities - K1054" }, { "description": "Knowledge of network operations principles and practices", "related": [], "uuid": "f8029bcb-7629-5801-b631-56965d5b6aa6", "value": "Knowledge of network operations principles and practices - K1065" }, { "description": "Knowledge of threat behaviors", "related": [], "uuid": "658a888c-02b2-5fef-a3b5-0192c5984354", "value": "Knowledge of threat behaviors - K1066" }, { "description": "Knowledge of target behaviors", "related": [], "uuid": "3cd01a52-c1e7-5b8a-8439-cc42ac3e04c2", "value": "Knowledge of target behaviors - K1067" }, { "description": "Knowledge of analytics", "related": [], "uuid": "28e68b55-bd87-5008-a2b2-9f13fdeaa229", "value": "Knowledge of analytics - K1101" }, { "description": "Knowledge of virtual collaborative workspace tools and techniques", "related": [], "uuid": "d71e40fe-8f41-59d2-a2d3-42fad424ed13", "value": "Knowledge of virtual collaborative workspace tools and techniques - K1109" }, { "description": "Knowledge of encryption algorithms", "related": [], "uuid": "7f857d42-d54a-524f-a272-1ec76b53f4a8", "value": "Knowledge of encryption algorithms - K0018" }, { "description": "Knowledge of microprocessors", "related": [], "uuid": "5e881b3a-6b4c-59c5-a6ea-f29b920c8f44", "value": "Knowledge of microprocessors - K0055" }, { "description": "Knowledge of technology integration processes", "related": [], "uuid": "5dcb9a90-2d34-566a-89e0-7e0a56502656", "value": "Knowledge of technology integration processes - K0092" }, { "description": "Knowledge of system optimization techniques", "related": [], "uuid": "8e1185d8-7ef7-5d3c-a3a8-580feb0d838b", "value": "Knowledge of system optimization techniques - K0646" }, { "description": "Knowledge of computer networking protocols", "related": [], "uuid": "747ade0b-dc28-591e-b470-eb0620be5ad0", "value": "Knowledge of computer networking protocols - K0674" }, { "description": "Knowledge of risk management processes", "related": [], "uuid": "d0aed9ef-4595-512d-96db-749a70f8ae97", "value": "Knowledge of risk management processes - K0675" }, { "description": "Knowledge of cybersecurity laws and regulations", "related": [], "uuid": "0e5566e6-93bf-5d95-a688-b4ea71efa4ba", "value": "Knowledge of cybersecurity laws and regulations - K0676" }, { "description": "Knowledge of cybersecurity policies and procedures", "related": [], "uuid": "8aa1b283-2196-53c7-b93a-2407a7cf5b38", "value": "Knowledge of cybersecurity policies and procedures - K0677" }, { "description": "Knowledge of privacy laws and regulations", "related": [], "uuid": "f13b4ec8-6224-51f9-9e25-08f613f3e519", "value": "Knowledge of privacy laws and regulations - K0678" }, { "description": "Knowledge of privacy policies and procedures", "related": [], "uuid": "781bc64a-bb2e-550d-b870-9574425fd906", "value": "Knowledge of privacy policies and procedures - K0679" }, { "description": "Knowledge of cybersecurity principles and practices", "related": [], "uuid": "15e1da57-4b39-5261-b2d7-92103dd6d7df", "value": "Knowledge of cybersecurity principles and practices - K0680" }, { "description": "Knowledge of privacy principles and practices", "related": [], "uuid": "caed9b79-a7f9-52dd-9a82-fc33afda374a", "value": "Knowledge of privacy principles and practices - K0681" }, { "description": "Knowledge of cybersecurity threats", "related": [], "uuid": "b2f76ba5-8577-5d14-9cb2-44be96e07b51", "value": "Knowledge of cybersecurity threats - K0682" }, { "description": "Knowledge of cybersecurity vulnerabilities", "related": [], "uuid": "c9923ebe-25b1-5d42-a0e3-0246aaf875b1", "value": "Knowledge of cybersecurity vulnerabilities - K0683" }, { "description": "Knowledge of cybersecurity threat characteristics", "related": [], "uuid": "f2731394-e99d-5527-a060-a41c0f226a9a", "value": "Knowledge of cybersecurity threat characteristics - K0684" }, { "description": "Knowledge of access control principles and practices", "related": [], "uuid": "37106b7e-fef4-5184-9bcc-71882f7ff3b7", "value": "Knowledge of access control principles and practices - K0685" }, { "description": "Knowledge of authentication and authorization tools and techniques", "related": [], "uuid": "bbb7025d-36a0-5ed2-9481-fc920c7b5070", "value": "Knowledge of authentication and authorization tools and techniques - K0686" }, { "description": "Knowledge of business operations standards and best practices", "related": [], "uuid": "2956934a-46ba-5436-bef6-844761c213be", "value": "Knowledge of business operations standards and best practices - K0687" }, { "description": "Knowledge of common application vulnerabilities", "related": [], "uuid": "72eac40c-10d8-57a9-8184-1dae63ff7952", "value": "Knowledge of common application vulnerabilities - K0688" }, { "description": "Knowledge of network infrastructure principles and practices", "related": [], "uuid": "bc46ebd1-6ca8-54f4-8ea9-511e33ffd5e3", "value": "Knowledge of network infrastructure principles and practices - K0689" }, { "description": "Knowledge of requirements analysis principles and practices", "related": [], "uuid": "19f32f88-1443-57e4-a816-564fecb5d1ce", "value": "Knowledge of requirements analysis principles and practices - K0690" }, { "description": "Knowledge of cyber defense tools and techniques", "related": [], "uuid": "2b0e9340-e9ef-5496-95af-3d34d8b8cfde", "value": "Knowledge of cyber defense tools and techniques - K0691" }, { "description": "Knowledge of vulnerability assessment tools and techniques", "related": [], "uuid": "48e2fb0a-fa81-5a55-91fd-f40b1ec5d7fc", "value": "Knowledge of vulnerability assessment tools and techniques - K0692" }, { "description": "Knowledge of computer algorithm capabilities and applications", "related": [], "uuid": "9172777b-5b99-53d0-9929-ca6cf40fd810", "value": "Knowledge of computer algorithm capabilities and applications - K0694" }, { "description": "Knowledge of cryptographic key management principles and practices", "related": [], "uuid": "d424d456-ca18-57d2-96cd-17647d3c0572", "value": "Knowledge of cryptographic key management principles and practices - K0698" }, { "description": "Knowledge of database systems and software", "related": [], "uuid": "e81cf97a-c973-5fbf-83ca-9d734d4906fd", "value": "Knowledge of database systems and software - K0707" }, { "description": "Knowledge of business continuity and disaster recovery (BCDR) policies and procedures", "related": [], "uuid": "e5464488-b4ac-5b2d-82e6-f68397093cb4", "value": "Knowledge of business continuity and disaster recovery (BCDR) policies and procedures - K0709" }, { "description": "Knowledge of enterprise cybersecurity architecture principles and practices", "related": [], "uuid": "c504388b-d239-5d0f-ae3c-b845027a839c", "value": "Knowledge of enterprise cybersecurity architecture principles and practices - K0710" }, { "description": "Knowledge of electrical engineering principles and practices", "related": [], "uuid": "51552ffc-d2ce-5970-8f37-c67ce51410e0", "value": "Knowledge of electrical engineering principles and practices - K0714" }, { "description": "Knowledge of network communications principles and practices", "related": [], "uuid": "d0dd4b14-c850-5adf-9f68-fd53c27cde60", "value": "Knowledge of network communications principles and practices - K0718" }, { "description": "Knowledge of human-computer interaction (HCI) principles and practices", "related": [], "uuid": "3ce720cb-af6a-5746-8d53-e5a487b4be3c", "value": "Knowledge of human-computer interaction (HCI) principles and practices - K0719" }, { "description": "Knowledge of Security Assessment and Authorization (SA&A) processes", "related": [], "uuid": "00058e7d-695d-5e7b-b4c6-82a6c4032a4c", "value": "Knowledge of Security Assessment and Authorization (SA&A) processes - K0720" }, { "description": "Knowledge of analysis standards and best practices", "related": [], "uuid": "31cb4acc-a242-5315-bd83-c0e2919efb7a", "value": "Knowledge of analysis standards and best practices - K0727" }, { "description": "Knowledge of Confidentiality, Integrity and Availability (CIA) principles and practices", "related": [], "uuid": "ecf34a11-026b-5ae6-abff-ad57798e3358", "value": "Knowledge of Confidentiality, Integrity and Availability (CIA) principles and practices - K0728" }, { "description": "Knowledge of non-repudiation principles and practices", "related": [], "uuid": "1403098e-8d0e-5a15-9d1a-6666d3c17495", "value": "Knowledge of non-repudiation principles and practices - K0729" }, { "description": "Knowledge of cyber safety principles and practices", "related": [], "uuid": "bb86da19-ebe4-53b6-b0d2-bbf56fd35ac5", "value": "Knowledge of cyber safety principles and practices - K0730" }, { "description": "Knowledge of systems security engineering (SSE) principles and practices", "related": [], "uuid": "1bb87952-bf49-5126-85b3-cbc6b5b5f972", "value": "Knowledge of systems security engineering (SSE) principles and practices - K0731" }, { "description": "Knowledge of information technology (IT) security principles and practices", "related": [], "uuid": "6f01d26a-753b-52eb-aec3-d5e138d662b5", "value": "Knowledge of information technology (IT) security principles and practices - K0736" }, { "description": "Knowledge of mathematics principles and practices", "related": [], "uuid": "be7f2e7d-f231-5ece-98ab-b71e10afc0a5", "value": "Knowledge of mathematics principles and practices - K0739" }, { "description": "Knowledge of identity and access management (IAM) principles and practices", "related": [], "uuid": "4ee2f73b-04a2-5514-b207-d0142d2cf8fa", "value": "Knowledge of identity and access management (IAM) principles and practices - K0742" }, { "description": "Knowledge of new and emerging technologies", "related": [], "uuid": "9211bede-118d-5098-8f47-29b8b8cf1330", "value": "Knowledge of new and emerging technologies - K0743" }, { "description": "Knowledge of operating system (OS) systems and software", "related": [], "uuid": "3e4b2c76-ab54-512e-996e-6789a17b426f", "value": "Knowledge of operating system (OS) systems and software - K0744" }, { "description": "Knowledge of parallel and distributed computing principles and practices", "related": [], "uuid": "ba8596fc-2a5b-5881-a289-5a1380443397", "value": "Knowledge of parallel and distributed computing principles and practices - K0745" }, { "description": "Knowledge of process engineering principles and practices", "related": [], "uuid": "888ff322-f4ef-50c4-8377-4a7cc0272796", "value": "Knowledge of process engineering principles and practices - K0749" }, { "description": "Knowledge of system threats", "related": [], "uuid": "584af903-8217-5584-8924-e3b4eb7ffc3e", "value": "Knowledge of system threats - K0751" }, { "description": "Knowledge of system vulnerabilities", "related": [], "uuid": "78959d93-b5f7-5a2b-915c-2f61de3e71a1", "value": "Knowledge of system vulnerabilities - K0752" }, { "description": "Knowledge of remote access principles and practices", "related": [], "uuid": "b6e7f861-0553-52f4-a0a8-d09fa43f2073", "value": "Knowledge of remote access principles and practices - K0753" }, { "description": "Knowledge of security management principles and practices", "related": [], "uuid": "3749bdb2-f151-5d45-bd49-7b5c01013375", "value": "Knowledge of security management principles and practices - K0756" }, { "description": "Knowledge of system design tools and techniques", "related": [], "uuid": "236bafd6-9c71-51c9-946e-7e7439ffa746", "value": "Knowledge of system design tools and techniques - K0757" }, { "description": "Knowledge of server administration principles and practices", "related": [], "uuid": "783350ea-5a3f-53d8-8ddd-0f75ff27adfc", "value": "Knowledge of server administration principles and practices - K0758" }, { "description": "Knowledge of client and server architecture", "related": [], "uuid": "ca5edd17-1f9e-5f4b-a880-f43e1ba459d6", "value": "Knowledge of client and server architecture - K0759" }, { "description": "Knowledge of software engineering principles and practices", "related": [], "uuid": "df13d2c9-c6d7-51f9-b512-0a22764b9539", "value": "Knowledge of software engineering principles and practices - K0765" }, { "description": "Knowledge of automated systems analysis tools and techniques", "related": [], "uuid": "2db2c2a9-79fd-5b40-a417-4bbf2417de3d", "value": "Knowledge of automated systems analysis tools and techniques - K0768" }, { "description": "Knowledge of systems testing and evaluation tools and techniques", "related": [], "uuid": "f32ef096-89b3-56ea-8334-6ee889cfec14", "value": "Knowledge of systems testing and evaluation tools and techniques - K0772" }, { "description": "Knowledge of telecommunications principles and practices", "related": [], "uuid": "c47bae29-537d-5e89-828f-c5b1d69cbad5", "value": "Knowledge of telecommunications principles and practices - K0773" }, { "description": "Knowledge of enterprise information technology (IT) architecture principles and practices", "related": [], "uuid": "87099a36-c2d5-5eec-bd16-06d2d8d8a404", "value": "Knowledge of enterprise information technology (IT) architecture principles and practices - K0778" }, { "description": "Knowledge of systems engineering processes", "related": [], "uuid": "8b3bcd60-16f1-5181-9a03-85afc9079ebf", "value": "Knowledge of systems engineering processes - K0779" }, { "description": "Knowledge of defense-in-depth principles and practices", "related": [], "uuid": "bfefb77b-9cb4-506e-8175-adc9dfe1d7a4", "value": "Knowledge of defense-in-depth principles and practices - K0791" }, { "description": "Knowledge of secure coding tools and techniques", "related": [], "uuid": "fa5d5024-e50a-5f70-9ace-aa4f7ecfccd8", "value": "Knowledge of secure coding tools and techniques - K0814" }, { "description": "Knowledge of risk assessment principles and practices", "related": [], "uuid": "f1461a58-5df0-5f10-b4d9-b9a167fc3c3d", "value": "Knowledge of risk assessment principles and practices - K0835" }, { "description": "Knowledge of threat assessment principles and practices", "related": [], "uuid": "7429c812-e4f8-5fbf-a9b2-dcc9d29fefaf", "value": "Knowledge of threat assessment principles and practices - K0836" }, { "description": "Knowledge of critical infrastructure systems and software", "related": [], "uuid": "ca75131c-500e-5bb5-bdcf-46f92c44d860", "value": "Knowledge of critical infrastructure systems and software - K0839" }, { "description": "Knowledge of hardware reverse engineering tools and techniques", "related": [], "uuid": "400e3012-f557-5275-bbcd-b15a02b3879b", "value": "Knowledge of hardware reverse engineering tools and techniques - K0840" }, { "description": "Knowledge of software reverse engineering tools and techniques", "related": [], "uuid": "8438860d-de15-5a40-916b-8d3472c7fc0a", "value": "Knowledge of software reverse engineering tools and techniques - K0842" }, { "description": "Knowledge of secure software deployment principles and practices", "related": [], "uuid": "c573cf5c-7ba8-50d9-9ed3-556b39a60a2b", "value": "Knowledge of secure software deployment principles and practices - K0846" }, { "description": "Knowledge of secure software deployment tools and techniques", "related": [], "uuid": "4c62eadc-84cd-5aa3-bad8-56028fbe6cd2", "value": "Knowledge of secure software deployment tools and techniques - K0847" }, { "description": "Knowledge of network systems management principles and practices", "related": [], "uuid": "2d914b1b-9bc7-5b07-b382-849a402b5d14", "value": "Knowledge of network systems management principles and practices - K0848" }, { "description": "Knowledge of network systems management tools and techniques", "related": [], "uuid": "f8474f35-68ca-5fa3-b295-9b8a9a8d7bcc", "value": "Knowledge of network systems management tools and techniques - K0849" }, { "description": "Knowledge of reverse engineering principles and practices", "related": [], "uuid": "97dd9de3-c7a1-57e1-b442-db9c103697d0", "value": "Knowledge of reverse engineering principles and practices - K0851" }, { "description": "Knowledge of encryption tools and techniques", "related": [], "uuid": "37f0c4f5-bd19-55f3-ac59-8a203c42056a", "value": "Knowledge of encryption tools and techniques - K0859" }, { "description": "Knowledge of data classification standards and best practices", "related": [], "uuid": "81c965aa-24d2-5c4a-a5a5-06d10cbaec12", "value": "Knowledge of data classification standards and best practices - K0865" }, { "description": "Knowledge of data classification tools and techniques", "related": [], "uuid": "7c8eb03b-ef2c-5a6b-a5f5-17496b10a29d", "value": "Knowledge of data classification tools and techniques - K0866" }, { "description": "Knowledge of process improvement principles and practices", "related": [], "uuid": "28b3f1e5-ff83-5631-a60b-dbf1bb6e272f", "value": "Knowledge of process improvement principles and practices - K0868" }, { "description": "Knowledge of process maturity models and frameworks", "related": [], "uuid": "9f425b57-664f-5c22-9769-2d135c4d5dd4", "value": "Knowledge of process maturity models and frameworks - K0869" }, { "description": "Knowledge of enterprise architecture (EA) reference models and frameworks", "related": [], "uuid": "af401500-3d21-598b-9fbb-2c2ff3f5b627", "value": "Knowledge of enterprise architecture (EA) reference models and frameworks - K0870" }, { "description": "Knowledge of enterprise architecture (EA) principles and practices", "related": [], "uuid": "36a36447-6d1d-5274-9131-570d96ab0cb4", "value": "Knowledge of enterprise architecture (EA) principles and practices - K0871" }, { "description": "Knowledge of service management principles and practices", "related": [], "uuid": "4659c948-99a6-5f43-a381-e34f321b84a7", "value": "Knowledge of service management principles and practices - K0872" }, { "description": "Knowledge of service management standards and best practices", "related": [], "uuid": "ffd97e67-ed08-5466-8a81-70ccb514a71b", "value": "Knowledge of service management standards and best practices - K0873" }, { "description": "Knowledge of key management service (KMS) principles and practices", "related": [], "uuid": "6e729a7a-c131-5f64-866a-21846d2223cc", "value": "Knowledge of key management service (KMS) principles and practices - K0874" }, { "description": "Knowledge of symmetric encryption principles and practices", "related": [], "uuid": "5c6bfc12-ba80-5d05-930c-1f53d20b391d", "value": "Knowledge of symmetric encryption principles and practices - K0875" }, { "description": "Knowledge of key management service (KMS) key rotation policies and procedures", "related": [], "uuid": "1cd4c395-d676-53c4-8dbd-5d46324724bd", "value": "Knowledge of key management service (KMS) key rotation policies and procedures - K0876" }, { "description": "Knowledge of application firewall principles and practices", "related": [], "uuid": "6e10018b-bb73-5de3-9d26-a5521c9c231e", "value": "Knowledge of application firewall principles and practices - K0877" }, { "description": "Knowledge of network firewall principles and practices", "related": [], "uuid": "ff86bdee-3389-56d1-9776-e2d6e2dd418b", "value": "Knowledge of network firewall principles and practices - K0878" }, { "description": "Knowledge of the Open Systems Interconnect (OSI) reference model", "related": [], "uuid": "0b855034-1c29-5675-8b04-9a20cf808aea", "value": "Knowledge of the Open Systems Interconnect (OSI) reference model - K0891" }, { "description": "Knowledge of computer architecture principles and practices", "related": [], "uuid": "5cc1ab9c-db32-5f0d-9893-9c8c202f3e8d", "value": "Knowledge of computer architecture principles and practices - K0894" }, { "description": "Knowledge of multi-level security (MLS) systems and software", "related": [], "uuid": "a504724a-cfb1-5545-a19c-38c98ff0e7ef", "value": "Knowledge of multi-level security (MLS) systems and software - K0906" }, { "description": "Knowledge of cross-domain solutions", "related": [], "uuid": "b6959fd5-0aa9-5d72-8c17-ef3c0be0b7a2", "value": "Knowledge of cross-domain solutions - K0907" }, { "description": "Knowledge of network architecture principles and practices", "related": [], "uuid": "6cc32d41-5faa-5fe7-9be5-5615f8ff2925", "value": "Knowledge of network architecture principles and practices - K0915" }, { "description": "Knowledge of Personally Identifiable Information (PII) data security standards and best practices", "related": [], "uuid": "7fba4196-537a-5642-a54c-772c35214016", "value": "Knowledge of Personally Identifiable Information (PII) data security standards and best practices - K0917" }, { "description": "Knowledge of Payment Card Industry (PCI) data security standards and best practices", "related": [], "uuid": "f0052965-c509-5ee5-a7dc-da841d9ef595", "value": "Knowledge of Payment Card Industry (PCI) data security standards and best practices - K0918" }, { "description": "Knowledge of Personal Health Information (PHI) data security standards and best practices", "related": [], "uuid": "f929e10a-18da-5333-ac9d-29b03c61b118", "value": "Knowledge of Personal Health Information (PHI) data security standards and best practices - K0919" }, { "description": "Knowledge of program protection plan (PPP) principles and practices", "related": [], "uuid": "44cb1abc-f18b-59af-830c-bb4c10c4e984", "value": "Knowledge of program protection plan (PPP) principles and practices - K0921" }, { "description": "Knowledge of configuration management tools and techniques", "related": [], "uuid": "e94976e6-130b-5954-a155-83808bc12f84", "value": "Knowledge of configuration management tools and techniques - K0927" }, { "description": "Knowledge of systems engineering principles and practices", "related": [], "uuid": "911b76f0-1b5a-5177-ac49-be172a2a6339", "value": "Knowledge of systems engineering principles and practices - K0928" }, { "description": "Knowledge of N-tier architecture principles and practices", "related": [], "uuid": "87c384d9-0f56-5f25-aaf3-3cab2d315297", "value": "Knowledge of N-tier architecture principles and practices - K0933" }, { "description": "Knowledge of data classification policies and procedures", "related": [], "uuid": "a24bae69-3554-54fe-b152-8e03916bd5a5", "value": "Knowledge of data classification policies and procedures - K0934" }, { "description": "Knowledge of cryptology principles and practices", "related": [], "uuid": "5d25c7ec-4c0c-5598-abd5-6a8c7953388f", "value": "Knowledge of cryptology principles and practices - K0942" }, { "description": "Knowledge of computer engineering principles and practices", "related": [], "uuid": "3fdd7418-4c8d-5ed1-bce7-cf6f2fbb1556", "value": "Knowledge of computer engineering principles and practices - K0947" }, { "description": "Knowledge of embedded systems and software", "related": [], "uuid": "fd05e5f9-115f-50af-8c53-a524eb1a0357", "value": "Knowledge of embedded systems and software - K0948" }, { "description": "Knowledge of fault tolerance tools and techniques", "related": [], "uuid": "5b885586-0845-5440-88a5-b9196436c833", "value": "Knowledge of fault tolerance tools and techniques - K0949" }, { "description": "Knowledge of information theory principles and practices", "related": [], "uuid": "d80844a4-a2df-5dc6-9759-ad0013226c9d", "value": "Knowledge of information theory principles and practices - K0952" }, { "description": "Knowledge of computer networking principles and practices", "related": [], "uuid": "5f7a7797-dd0e-544f-941a-49ae49d3af24", "value": "Knowledge of computer networking principles and practices - K0983" }, { "description": "Knowledge of network security principles and practices", "related": [], "uuid": "8a125129-778b-55de-b7cb-53f14f862873", "value": "Knowledge of network security principles and practices - K1014" }, { "description": "Knowledge of routing protocols", "related": [], "uuid": "50fbddc9-b108-5e89-bef6-201ae06742a6", "value": "Knowledge of routing protocols - K1049" }, { "description": "Knowledge of secure software update principles and practices", "related": [], "uuid": "ede0afce-27a9-5bd6-8b13-a741de22bf36", "value": "Knowledge of secure software update principles and practices - K1080" }, { "description": "Knowledge of secure firmware update principles and practices", "related": [], "uuid": "f1ff5c6d-de61-50ec-859c-3f46c1c7f232", "value": "Knowledge of secure firmware update principles and practices - K1081" }, { "description": "Knowledge of design modeling", "related": [], "uuid": "25a798c1-bcc4-5c7c-80f5-36794c5d2230", "value": "Knowledge of design modeling - K1086" }, { "description": "Knowledge of design methods", "related": [], "uuid": "83c97b76-fd6e-5e22-8dac-b04853183f61", "value": "Knowledge of design methods - K1095" }, { "description": "Knowledge of acquisition cybersecurity requirements", "related": [], "uuid": "6bdb6a70-707e-5422-8811-b90fa4a7bf43", "value": "Knowledge of acquisition cybersecurity requirements - K1110" }, { "description": "Knowledge of application security design principles and practices", "related": [], "uuid": "5ebbbe29-caa2-5906-b2d2-c4d9115a3337", "value": "Knowledge of application security design principles and practices - K1111" }, { "description": "Knowledge of Confidentiality, Integrity, Availability, Authenticity, and Non-repudiation (CIAAN) principles and practices", "related": [], "uuid": "e56adac9-664a-5ec3-acb6-a4a281523c9f", "value": "Knowledge of Confidentiality, Integrity, Availability, Authenticity, and Non-repudiation (CIAAN) principles and practices - K1120" }, { "description": "Knowledge of cybersecurity requirements", "related": [], "uuid": "f0f5fb3a-5d53-58f0-80e8-0b852dd15511", "value": "Knowledge of cybersecurity requirements - K1137" }, { "description": "Knowledge of data classification levels", "related": [], "uuid": "e79c16ba-9f5d-5cf2-a933-c6b2dcbb42d1", "value": "Knowledge of data classification levels - K1143" }, { "description": "Knowledge of fail-over or alternate site requirements", "related": [], "uuid": "4fa8695c-ee0c-5eeb-953f-2b4c3d6f7c88", "value": "Knowledge of fail-over or alternate site requirements - K1159" }, { "description": "Knowledge of material supportability requirements", "related": [], "uuid": "771b122d-3a64-571e-be39-d791c98f2bea", "value": "Knowledge of material supportability requirements - K1169" }, { "description": "Knowledge of multilevel security requirements", "related": [], "uuid": "bb50dc2c-e8ea-54e0-8754-a146430b9276", "value": "Knowledge of multilevel security requirements - K1173" }, { "description": "Knowledge of Personally Identifiable Information (PII) attributes", "related": [], "uuid": "f7721d3f-4b07-550a-ba82-aefc901d1ad6", "value": "Knowledge of Personally Identifiable Information (PII) attributes - K1194" }, { "description": "Knowledge of security controls", "related": [], "uuid": "fe0a5b45-eede-5f15-aef9-bfb9f297bc14", "value": "Knowledge of security controls - K1212" }, { "description": "Knowledge of service-oriented security architecture practices and principles", "related": [], "uuid": "e83fd16a-082d-577e-864a-4380e30505f0", "value": "Knowledge of service-oriented security architecture practices and principles - K1216" }, { "description": "Knowledge of system backup requirements", "related": [], "uuid": "4413cc6d-1b97-5c30-b99b-cc7968882af7", "value": "Knowledge of system backup requirements - K1223" }, { "description": "Knowledge of user requirements", "related": [], "uuid": "54fdce39-0e4b-5a7a-9152-a435f9dbbe6a", "value": "Knowledge of user requirements - K1236" }, { "description": "Knowledge of programming language structures and logic", "related": [], "uuid": "a9f7e0d3-6d48-5ed9-894d-775833ee6962", "value": "Knowledge of programming language structures and logic - K0068" }, { "description": "Knowledge of code tailoring tools and techniques", "related": [], "uuid": "78862238-34be-5cd3-883a-2cbb35d6a331", "value": "Knowledge of code tailoring tools and techniques - K0639" }, { "description": "Knowledge of complex data structure capabilities and applications", "related": [], "uuid": "73afd08c-06cf-5f71-8462-22eff38b57de", "value": "Knowledge of complex data structure capabilities and applications - K0693" }, { "description": "Knowledge of programming principles and practices", "related": [], "uuid": "a643e0c4-755b-5294-8424-8c15cac4a7e0", "value": "Knowledge of programming principles and practices - K0695" }, { "description": "Knowledge of Local Area Networks (LAN)", "related": [], "uuid": "b8e620ab-e910-5e10-807a-c2fee2ceb79b", "value": "Knowledge of Local Area Networks (LAN) - K0712" }, { "description": "Knowledge of Wide Area Networks (WAN)", "related": [], "uuid": "55e05049-c0d8-5130-b90d-55a16a098df8", "value": "Knowledge of Wide Area Networks (WAN) - K0713" }, { "description": "Knowledge of risk management principles and practices", "related": [], "uuid": "1eac1609-ea37-52ab-a3d2-bd652dc82733", "value": "Knowledge of risk management principles and practices - K0721" }, { "description": "Knowledge of software development principles and practices", "related": [], "uuid": "d3831feb-a70e-5c51-a4c2-0787bfaa6321", "value": "Knowledge of software development principles and practices - K0722" }, { "description": "Knowledge of Risk Management Framework (RMF) requirements", "related": [], "uuid": "86a6a1dc-763b-55fa-a316-930210d65260", "value": "Knowledge of Risk Management Framework (RMF) requirements - K0734" }, { "description": "Knowledge of risk management models and frameworks", "related": [], "uuid": "949d1c21-b9a6-57f2-96c4-ec78b01b2812", "value": "Knowledge of risk management models and frameworks - K0735" }, { "description": "Knowledge of bandwidth management tools and techniques", "related": [], "uuid": "645eaec3-023a-5f2f-928c-a646502f70ae", "value": "Knowledge of bandwidth management tools and techniques - K0737" }, { "description": "Knowledge of low-level programming languages", "related": [], "uuid": "963dd547-e502-540a-967c-3be1e83bb3f1", "value": "Knowledge of low-level programming languages - K0738" }, { "description": "Knowledge of Privacy Impact Assessment (PIA) principles and practices", "related": [], "uuid": "6d799256-9fd9-5f2e-a1bf-9c8ea8c98063", "value": "Knowledge of Privacy Impact Assessment (PIA) principles and practices - K0748" }, { "description": "Knowledge of configuration management (CM) tools and techniques", "related": [], "uuid": "17b07cd1-0da2-5b88-8248-c17a236d726b", "value": "Knowledge of configuration management (CM) tools and techniques - K0755" }, { "description": "Knowledge of software debugging principles and practices", "related": [], "uuid": "42c4d0ad-b3eb-5959-a103-0a9afecb5228", "value": "Knowledge of software debugging principles and practices - K0762" }, { "description": "Knowledge of software design tools and techniques", "related": [], "uuid": "9cca9b0d-a576-5bab-a3ea-1409bb69521c", "value": "Knowledge of software design tools and techniques - K0763" }, { "description": "Knowledge of software development models and frameworks", "related": [], "uuid": "f9f98217-dfcb-5cfd-885a-5125038f453d", "value": "Knowledge of software development models and frameworks - K0764" }, { "description": "Knowledge of structured analysis principles and practices", "related": [], "uuid": "2a350b15-c2e0-5ce3-ab36-cf4787d1bc37", "value": "Knowledge of structured analysis principles and practices - K0767" }, { "description": "Knowledge of web service protocols", "related": [], "uuid": "02ab9b16-89ca-5376-888d-04dff20e8bc4", "value": "Knowledge of web service protocols - K0782" }, { "description": "Knowledge of supply chain risk management principles and practices", "related": [], "uuid": "fca1528f-bf81-5a06-aed8-b6f88234d70b", "value": "Knowledge of supply chain risk management principles and practices - K0803" }, { "description": "Knowledge of interpreted and compiled programming language characteristics", "related": [], "uuid": "66069dc2-a024-5b7f-b29d-c77ef774e82d", "value": "Knowledge of interpreted and compiled programming language characteristics - K0813" }, { "description": "Knowledge of supply chain risks", "related": [], "uuid": "06985783-5371-5825-a574-f8ae751ff77a", "value": "Knowledge of supply chain risks - K0820" }, { "description": "Knowledge of software security principles and practices", "related": [], "uuid": "3bba461a-c569-52a9-aebf-cb914fb7d116", "value": "Knowledge of software security principles and practices - K0826" }, { "description": "Knowledge of software quality assurance (SQA) principles and practices", "related": [], "uuid": "f747163d-9354-5fcf-8bd3-5f12d92d0c8b", "value": "Knowledge of software quality assurance (SQA) principles and practices - K0827" }, { "description": "Knowledge of supply chain risk management standards and best practices", "related": [], "uuid": "5c01a4d4-74a0-5bba-8afe-a0668eb726bf", "value": "Knowledge of supply chain risk management standards and best practices - K0828" }, { "description": "Knowledge of risk management policies and procedures", "related": [], "uuid": "f71e96e7-28cf-5860-8b15-54644c182077", "value": "Knowledge of risk management policies and procedures - K0920" }, { "description": "Knowledge of penetration testing principles and practices", "related": [], "uuid": "4b2a2fd9-3f4d-5634-b808-579338f25af8", "value": "Knowledge of penetration testing principles and practices - K0955" }, { "description": "Knowledge of penetration testing tools and techniques", "related": [], "uuid": "f95858a0-f6fd-5495-ad96-73ed9d429bed", "value": "Knowledge of penetration testing tools and techniques - K0956" }, { "description": "Knowledge of root cause analysis tools and techniques", "related": [], "uuid": "75393cb1-4d1c-5354-a881-04e26916300b", "value": "Knowledge of root cause analysis tools and techniques - K0957" }, { "description": "Knowledge of web application security risks", "related": [], "uuid": "9c16379f-0c16-591b-9e6d-66dd00687c0f", "value": "Knowledge of web application security risks - K1079" }, { "description": "Knowledge of code analysis tools and techniques", "related": [], "uuid": "1bc1f4ee-5339-5a08-9959-7ad05dcb9970", "value": "Knowledge of code analysis tools and techniques - K1099" }, { "description": "Knowledge of coding and testing standards", "related": [], "uuid": "4388bd2a-184e-5175-906b-0b8666f5d4c4", "value": "Knowledge of coding and testing standards - K1117" }, { "description": "Knowledge of completion criteria", "related": [], "uuid": "f27e381f-c288-500b-836b-4b630723d7f9", "value": "Knowledge of completion criteria - K1118" }, { "description": "Knowledge of cost constraints", "related": [], "uuid": "cd5d9be1-e942-5c54-bde6-c8709138c980", "value": "Knowledge of cost constraints - K1126" }, { "description": "Knowledge of data manipulation principles and practices", "related": [], "uuid": "da295e38-ced2-5345-a222-11e621aa90f0", "value": "Knowledge of data manipulation principles and practices - K1148" }, { "description": "Knowledge of data retrieval principles and practices", "related": [], "uuid": "55b71acb-2b5d-5430-885a-11fcc37fa556", "value": "Knowledge of data retrieval principles and practices - K1149" }, { "description": "Knowledge of data storage principles and practices", "related": [], "uuid": "802132e9-84f6-594d-829f-fe2e45f2ed10", "value": "Knowledge of data storage principles and practices - K1150" }, { "description": "Knowledge of enterprise-wide version control systems", "related": [], "uuid": "0190b78a-901e-56d2-80a8-690d0382f924", "value": "Knowledge of enterprise-wide version control systems - K1157" }, { "description": "Knowledge of independent testing methods", "related": [], "uuid": "2b736bcd-e21f-5468-9326-081df9f3d6b7", "value": "Knowledge of independent testing methods - K1165" }, { "description": "Knowledge of mathematical models", "related": [], "uuid": "2c11f972-434f-5032-91d2-469fd4d3f603", "value": "Knowledge of mathematical models - K1170" }, { "description": "Knowledge of Public Key Infrastructure (PKI) libraries", "related": [], "uuid": "cb5b1d1b-d409-53e3-9957-762e49a923e5", "value": "Knowledge of Public Key Infrastructure (PKI) libraries - K1203" }, { "description": "Knowledge of required reporting formats", "related": [], "uuid": "215820ba-cf95-5612-a43f-34b1b1252128", "value": "Knowledge of required reporting formats - K1205" }, { "description": "Knowledge of risk acceptance and documentation", "related": [], "uuid": "4f3531af-f266-5739-8f5f-4e2542c5a694", "value": "Knowledge of risk acceptance and documentation - K1208" }, { "description": "Knowledge of secure programming tools and techniques", "related": [], "uuid": "8ceff489-4c34-544b-832c-7f20bb1c889b", "value": "Knowledge of secure programming tools and techniques - K1210" }, { "description": "Knowledge of security restrictions", "related": [], "uuid": "d2237698-6c98-5936-abb6-dae4e8dc7114", "value": "Knowledge of security restrictions - K1214" }, { "description": "Knowledge of security testing tools and techniques", "related": [], "uuid": "1c1bffc7-98d5-5c57-a861-afff0291fa17", "value": "Knowledge of security testing tools and techniques - K1215" }, { "description": "Knowlege of certificate management principles and practices", "related": [], "uuid": "e100520c-ca6f-5271-9ee5-a9beef886c30", "value": "Knowlege of certificate management principles and practices - K1239" }, { "description": "Knowledge of cybersecurity practices in the acquisition process", "related": [], "uuid": "9d9e5be6-2ba6-52e2-8c02-83d05e37da39", "value": "Knowledge of cybersecurity practices in the acquisition process - K0653" }, { "description": "Knowledge of resiliency and redundancy principles and practices", "related": [], "uuid": "92181aa6-69bf-5fc9-bce7-6a44768894b3", "value": "Knowledge of resiliency and redundancy principles and practices - K0715" }, { "description": "Knowledge of host access control (HAC) systems and software", "related": [], "uuid": "ef882d08-6813-5ccb-9deb-a8a3c5a8c71c", "value": "Knowledge of host access control (HAC) systems and software - K0716" }, { "description": "Knowledge of network access control (NAC) systems and software", "related": [], "uuid": "7fc13582-7c11-536f-bd13-1d51afb7d035", "value": "Knowledge of network access control (NAC) systems and software - K0717" }, { "description": "Knowledge of policy-based access controls", "related": [], "uuid": "be4d7d67-3dff-5bd2-aef5-f3d80e91fa4c", "value": "Knowledge of policy-based access controls - K0746" }, { "description": "Knowledge of Risk Adaptive (Adaptable) Access Controls (RAdAC)", "related": [], "uuid": "e4ef9868-cdba-56c2-a039-946e67b78102", "value": "Knowledge of Risk Adaptive (Adaptable) Access Controls (RAdAC) - K0747" }, { "description": "Knowledge of system design standards and best practices", "related": [], "uuid": "aec7388b-70d5-5194-b76a-c9657e3099b1", "value": "Knowledge of system design standards and best practices - K0769" }, { "description": "Knowledge of system life cycle management principles and practices", "related": [], "uuid": "564b1dc1-7a27-501b-835f-aafe8c542b5f", "value": "Knowledge of system life cycle management principles and practices - K0771" }, { "description": "Knowledge of supply chain risk management policies and procedures", "related": [], "uuid": "99c0442a-d7eb-5c5f-8a5c-1cca645a96a1", "value": "Knowledge of supply chain risk management policies and procedures - K0838" }, { "description": "Knowledge of the acquisition life cycle models and frameworks", "related": [], "uuid": "5cc905d6-2541-5991-9ab9-038a7d1924c2", "value": "Knowledge of the acquisition life cycle models and frameworks - K0922" }, { "description": "Knowledge of countermeasure design principles and practices", "related": [], "uuid": "682d226e-6a8b-5176-a806-199827438d6b", "value": "Knowledge of countermeasure design principles and practices - K0937" }, { "description": "Knowledge of operation assessment processes", "related": [], "uuid": "c3984a60-e6ba-5eaa-997d-becbac9206b6", "value": "Knowledge of operation assessment processes - K1063" }, { "description": "Knowledge of knowledge management tools and techniques", "related": [], "uuid": "c9ca7423-ff79-57ac-b94a-312dbe03262c", "value": "Knowledge of knowledge management tools and techniques - K1088" }, { "description": "Knowledge of analytical tools and techniques", "related": [], "uuid": "346cd635-caaa-54c5-b56a-73f859dd06e2", "value": "Knowledge of analytical tools and techniques - K1100" }, { "description": "Knowledge of component and interface specifications", "related": [], "uuid": "547c4571-0d58-5384-b8a9-a590d105069b", "value": "Knowledge of component and interface specifications - K1119" }, { "description": "Knowledge of evaluation and validation requirements", "related": [], "uuid": "026fc968-fce5-5e3d-bf93-da49f2308443", "value": "Knowledge of evaluation and validation requirements - K1158" }, { "description": "Knowledge of hardware design principles and practices", "related": [], "uuid": "6cd1b1bf-8dfa-58e8-bab0-910c237fb1c7", "value": "Knowledge of hardware design principles and practices - K1164" }, { "description": "Knowledge of user needs and requirements", "related": [], "uuid": "f16d84d0-83be-5aae-9c07-dffbae3e6cce", "value": "Knowledge of user needs and requirements - K1235" } ], "version": 1 }