22
|
Knowledge of computer networking concepts and protocols, and network security methodologies.
|
87
|
Knowledge of network traffic analysis methods.
|
108
|
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
|
264
|
Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
|
1158
|
Knowledge of cybersecurity principles.
|
1159
|
Knowledge of cyber threats and vulnerabilities.
|
3106
|
Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless).
|
3107
|
Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.).
|
3129
|
Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).
|
3137
|
Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration).
|
3154
|
Knowledge of classification and control markings standards, policies and procedures.
|
3177
|
Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).
|
3188
|
Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).
|
3262
|
Knowledge of evolving/emerging communications technologies.
|
3274
|
Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber attack, cyber defense), principles, capabilities, limitations, and effects.
|
3292
|
Knowledge of how modern digital and telephony networks impact cyber operations.
|
3293
|
Knowledge of how modern wireless communications systems impact cyber operations.
|
3298
|
Knowledge of how to extract, analyze, and use metadata.
|
3335
|
Knowledge of intelligence disciplines.
|
3342
|
Knowledge of intelligence support to planning, execution, and assessment.
|
3374
|
Knowledge of malware.
|
3431
|
Knowledge of OSI model and underlying network protocols (e.g., TCP/IP).
|
3441
|
Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.
|
3539
|
Knowledge of telecommunications fundamentals.
|
3543
|
Knowledge of the basic structure, architecture, and design of modern communication networks.
|
3545
|
Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
|
3561
|
Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.
|
3582
|
Knowledge of the intelligence frameworks, processes, and related systems.
|
3584
|
Knowledge of intelligence preparation of the environment and similar processes.
|
3630
|
Knowledge of the ways in which targets or threats use the Internet.
|
3651
|
Knowledge of what constitutes a “threat” to a network.
|
3659
|
Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems.
|
6900
|
Knowledge of specific operational impacts of cybersecurity lapses.
|
52
|
Knowledge of human-computer interaction principles.
|
3095
|
Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).
|
3098
|
Knowledge of virtualization products (Vmware, Virtual PC).
|
3205
|
Knowledge of current computer-based intrusion sets.
|
3253
|
Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).
|
3271
|
Knowledge of internal and external partner cyber operations capabilities and tools.
|
3277
|
Knowledge of general SCADA system components.
|
3286
|
Knowledge of host-based security products and how they affect exploitation and vulnerability.
|
3291
|
Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP).
|
3334
|
Knowledge of intelligence confidence levels.
|
3343
|
Knowledge of cyber intelligence/information collection capabilities and repositories.
|
3358
|
Knowledge of organizational hierarchy and cyber decision making processes.
|
3419
|
Knowledge of organization or partner exploitation of digital networks.
|
3446
|
Knowledge of analytical constructs and their use in assessing the operational environment.
|
3460
|
Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions.
|
3504
|
Knowledge of threat and/or target systems.
|
3527
|
Knowledge of target development (i.e., concepts, roles, responsibilities, products, etc.).
|
3528
|
Knowledge of specific target identifiers, and their usage.
|
3533
|
Knowledge of target vetting and validation procedures.
|
3587
|
Knowledge of targeting cycles.
|
3615
|
Knowledge of the structure and intent of organization specific plans, guidance and authorizations.
|