| K001 |
Knowledge of computer networking concepts and protocols, and network security methodologies. |
| K0002 |
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
| K0003 |
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. |
| K0004 |
Knowledge of cybersecurity and privacy principles. |
| K0005 |
Knowledge of cyber threats and vulnerabilities. |
| K0006 |
Knowledge of specific operational impacts of cybersecurity lapses. |
| K0017 |
Knowledge of concepts and practices of processing digital forensic data. |
| K0021 |
Knowledge of data backup and recovery. |
| K0042 |
Knowledge of incident response and handling methodologies. |
| K0060 |
Knowledge of operating systems. |
| K0070 |
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
| K0077 |
Knowledge of server and client operating systems. |
| K0078 |
Knowledge of server diagnostic tools and fault identification techniques. |
| K0107 |
Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations. |
| K0109 |
Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
| K0117 |
Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]). |
| K0118 |
Knowledge of processes for seizing and preserving digital evidence. |
| K0119 |
Knowledge of hacking methodologies. |
| K0122 |
Knowledge of investigative implications of hardware, Operating Systems, and network technologies. |
| K0123 |
Knowledge of legal governance related to admissibility (e.g. Rules of Evidence). |
| K0125 |
Knowledge of processes for collecting, packaging, transporting, and storing electronic evidence while maintaining chain of custody. |
| K0128 |
Knowledge of types and collection of persistent data. |
| K0131 |
Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies. |
| K0132 |
Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files. |
| K0133 |
Knowledge of types of digital forensics data and how to recognize them. |
| K0134 |
Knowledge of deployable forensics. |
| K0145 |
Knowledge of security event correlation tools. |
| K0155 |
Knowledge of electronic evidence law. |
| K0156 |
Knowledge of legal rules of evidence and court procedure. |
| K0167 |
Knowledge of system administration, network, and operating system hardening techniques. |
| K0168 |
Knowledge of applicable laws, statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures. |
| K0179 |
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
| K0182 |
Knowledge of data carving tools and techniques (e.g., Foremost). |
| K0183 |
Knowledge of reverse engineering concepts. |
| K0184 |
Knowledge of anti-forensics tactics, techniques, and procedures. |
| K0185 |
Knowledge of forensics lab design configuration and support applications (e.g., VMWare, Wireshark). |
| K0186 |
Knowledge of debugging procedures and tools. |
| K0187 |
Knowledge of file type abuse by adversaries for anomalous behavior. |
| K0188 |
Knowledge of malware analysis tools (e.g., Oily Debug, Ida Pro). |
| K0189 |
Knowledge of malware with virtual machine detection (e.g. virtual aware malware, debugger aware malware, and unpacked malware that looks for VM-related strings in your computer??s display device). |
| K0305 |
Knowledge of data concealment (e.g. encryption algorithms and steganography). |
| K0624 |
Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list) |