Page: List

Education Framework Search
Education Framework Search
Search By Keyword(s)
 
 
Education Create & List Record Buttons
Green Buttons Create Records
 
Cyan Buttons List Records
Type Framework Workforce Category Specialty Area Work Role Task Knowledge Description Skill Ability
 
Education Framework List: Framework Knowledge Description
Framework Name Description Show
NICE K0001 Knowledge of computer networking concepts and protocols, and network security methodologies. Show
NICE K0002 Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). Show
NICE K0003 Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. Show
NICE K0004 Knowledge of cybersecurity and privacy principles. Show
NICE K0005 Knowledge of cyber threats and vulnerabilities. Show
NICE K0006 Knowledge of specific operational impacts of cybersecurity lapses. Show
NICE K0007 Knowledge of authentication, authorization, and access control methods. Show
NICE K0008 Knowledge of applicable business processes and operations of customer organizations. Show
NICE K0009 Knowledge of application vulnerabilities. Show
NICE K0010 Knowledge of communication methods, principles, and concepts that support the network infrastructure. Show
NICE K0011 Knowledge of capabilities and applications of network equipment including routers, switches, bridges, servers, transmission media, and related hardware. Show
NICE K0012 Knowledge of capabilities and requirements analysis. Show
NICE K0013 Knowledge of cyber defense and vulnerability assessment tools and their capabilities. Show
NICE K0014 Knowledge of complex data structures. Show
NICE K0015 Knowledge of computer algorithms. Show
NICE K0016 Knowledge of computer programming principles Show
NICE K0017 Knowledge of concepts and practices of processing digital forensic data. Show
NICE K0018 Knowledge of encryption algorithms Show
NICE K0019 Knowledge of cryptography and cryptographic key management concepts Show
NICE K0020 Knowledge of data administration and data standardization policies. Show
NICE K0021 Knowledge of data backup and recovery. Show
NICE K0022 Knowledge of data mining and data warehousing principles. Show
NICE K0023 Knowledge of database management systems, query languages, table relationships, and views. Show
NICE K0024 Knowledge of database systems. Show
NICE K0025 Knowledge of digital rights management. Show
NICE K0026 Knowledge of business continuity and disaster recovery continuity of operations plans. Show
NICE K0027 Knowledge of organization's enterprise information security architecture. Show
NICE K0028 Knowledge of organization's evaluation and validation requirements. Show
NICE K0029 Knowledge of organization's Local and Wide Area Network connections. Show
NICE K0030 Knowledge of electrical engineering as applied to computer architecture (e.g., circuit boards, processors, chips, and computer hardware). Show
NICE K0031 Knowledge of enterprise messaging systems and associated software. Show
NICE K0032 Knowledge of resiliency and redundancy. Show
NICE K0033 Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists). Show
NICE K0034 Knowledge of network services and protocols interactions that provide network communications. Show
NICE K0035 Knowledge of installation, integration, and optimization of system components. Show
NICE K0036 Knowledge of human-computer interaction principles. Show
NICE K0037 Knowledge of Security Assessment and Authorization process. Show
NICE K0038 Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data. Show
NICE K0039 Knowledge of cybersecurity and privacy principles and methods that apply to software development. Show
NICE K0040 Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins). Show
NICE K0041 Knowledge of incident categories, incident responses, and timelines for responses. Show
NICE K0042 Knowledge of incident response and handling methodologies. Show
NICE K0043 Knowledge of industry-standard and organizationally accepted analysis principles and methods. Show
NICE K0044 Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Show
NICE K0045 Knowledge of information security systems engineering principles (NIST SP 800-160). Show
NICE K0046 Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions. Show
NICE K0047 Knowledge of information technology (IT) architectural concepts and frameworks. Show
NICE K0048 Knowledge of Risk Management Framework (RMF) requirements. Show
NICE K0049 Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). Show
NICE K0050 Knowledge of local area and wide area networking principles and concepts including bandwidth management. Show
NICE K0051 Knowledge of low-level computer languages (e.g., assembly languages). Show
NICE K0052 Knowledge of mathematics (e.g. logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis). Show
NICE K0053 Knowledge of measures or indicators of system performance and availability. Show
NICE K0054 Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities. Show
NICE K0055 Knowledge of microprocessors. Show
NICE K0056 Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML). Show
NICE K0057 Knowledge of network hardware devices and functions. Show
NICE K0058 Knowledge of network traffic analysis methods. Show
NICE K0059 Knowledge of new and emerging information technology (IT) and cybersecurity technologies. Show
NICE K0060 Knowledge of operating systems. Show
NICE K0061 Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). Show
NICE K0062 Knowledge of packet-level analysis. Show
NICE K0063 Knowledge of parallel and distributed computing concepts. Show
NICE K0064 Knowledge of performance tuning tools and techniques. Show
NICE K0065 Knowledge of policy-based and risk adaptive access controls. Show
NICE K0066 Knowledge of Privacy Impact Assessments. Show
NICE K0067 Knowledge of process engineering concepts. Show
NICE K0068 Knowledge of programming language structures and logic. Show
NICE K0069 Knowledge of query languages such as SQL (structured query language). Show
NICE K0070 Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). Show
NICE K0071 Knowledge of remote access technology concepts. Show
NICE K0072 Knowledge of resource management principles and techniques. Show
NICE K0073 Knowledge of secure configuration management techniques. (e.g., Security Technical Implementation Guides (STIGs), cybersecurity best practices on cisecurity.org). Show
NICE K0074 Knowledge of key concepts in security management (e.g., Release Management, Patch Management). Show
NICE K0075 Knowledge of security system design tools, methods, and techniques. Show
NICE K0076 Knowledge of server administration and systems engineering theories, concepts, and methods. Show
NICE K0077 Knowledge of server and client operating systems. Show
NICE K0078 Knowledge of server diagnostic tools and fault identification techniques. Show
NICE K0079 Knowledge of software debugging principles. Show
NICE K0080 Knowledge of software design tools, methods, and techniques. Show
NICE K0081 Knowledge of software development models (e.g., Waterfall Model, Spiral Model). Show
NICE K0082 Knowledge of software engineering. Show
NICE K0083 Knowledge of sources, characteristics, and uses of the organization’s data assets. Show
NICE K0084 Knowledge of structured analysis principles and methods. Show
NICE K0085 WITHDRAWN: Knowledge of system and application security threats and vulnerabilities. (See K0070) Show
NICE K0086 Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools. Show
NICE K0087 Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design. Show
NICE K0088 Knowledge of systems administration concepts. Show
NICE K0089 Knowledge of systems diagnostic tools and fault identification techniques. Show
NICE K0090 Knowledge of system life cycle management principles, including software security and usability. Show
NICE K0091 Knowledge of systems testing and evaluation methods. Show
NICE K0092 Knowledge of technology integration processes. Show
NICE K0093 Knowledge of telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing). Show
NICE K0094 Knowledge of the capabilities and functionality associated with content creation technologies (e.g., wikis, social networking, content management systems, blogs). Show
NICE K0095 Knowledge of the capabilities and functionality associated with various technologies for organizing and managing information (e.g., databases, bookmarking engines). Show
NICE K0096 Knowledge of the capabilities and functionality of various collaborative technologies (e.g., groupware, SharePoint). Show
NICE K0097 Knowledge of the characteristics of physical and virtual data storage media. Show
NICE K0098 Knowledge of the cyber defense Service Provider reporting structure and processes within one’s own organization. Show
NICE K0099 WITHDRAWN: Knowledge of the common networking protocols (e.g., TCP/IP), services (e.g., web, mail, Domain Name Server), and how they interact to provide network communications. Show
NICE K0100 Knowledge of the enterprise information technology (IT) architecture. Show
NICE K0101 Knowledge of the organization’s enterprise information technology (IT) goals and objectives. Show
NICE K0102 Knowledge of the systems engineering process. Show
NICE K0103 Knowledge of the type and frequency of routine hardware maintenance. Show
NICE K0104 Knowledge of Virtual Private Network (VPN) security. Show
NICE K0105 Knowledge of web services (e.g., service-oriented architecture, Simple Object Access Protocol, and web service description language). Show
NICE K0106 Knowledge of what constitutes a network attack and a network attack’s relationship to both threats and vulnerabilities. Show
NICE K0107 Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations. Show
NICE K0108 Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless). Show
NICE K0109 Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). Show
NICE K0110 Knowledge of adversarial tactics, techniques, and procedures. Show
NICE K0111 Knowledge of network tools (e.g., ping, traceroute, nslookup) Show
NICE K0112 Knowledge of defense-in-depth principles and network security architecture. Show
NICE K0113 Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN). Show
NICE K0114 Knowledge of electronic devices (e.g., computer systems/components, access control devices, digital cameras, digital scanners, electronic organizers, hard drives, memory cards, modems, network components, networked appliances, networked home control devices, printers, removable storage devices, telephones, copiers, facsimile machines, etc.). Show
NICE K0115 Knowledge that technology that can be exploited. Show
NICE K0116 Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip). Show
NICE K0117 Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]). Show
NICE K0118 Knowledge of processes for seizing and preserving digital evidence. Show
NICE K0119 Knowledge of hacking methodologies. Show
NICE K0120 Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise. Show
NICE K0121 Knowledge of information security program management and project management principles and techniques. Show
NICE K0122 Knowledge of investigative implications of hardware, Operating Systems, and network technologies. Show
NICE K0123 Knowledge of legal governance related to admissibility (e.g. Rules of Evidence). Show
NICE K0124 Knowledge of multiple cognitive domains and tools and methods applicable for learning in each domain. Show
NICE K0125 Knowledge of processes for collecting, packaging, transporting, and storing electronic evidence while maintaining chain of custody. Show
NICE K0126 Knowledge of Supply Chain Risk Management Practices (NIST SP 800-161) Show
NICE K0127 Knowledge of the nature and function of the relevant information structure (e.g., National Information Infrastructure). Show
NICE K0128 Knowledge of types and collection of persistent data. Show
NICE K0129 Knowledge of command-line tools (e.g., mkdir, mv, ls, passwd, grep). Show
NICE K0130 Knowledge of virtualization technologies and virtual machine development and maintenance. Show
NICE K0131 Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies. Show
NICE K0132 Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files. Show
NICE K0133 Knowledge of types of digital forensics data and how to recognize them. Show
NICE K0134 Knowledge of deployable forensics. Show
NICE K0135 Knowledge of web filtering technologies. Show
NICE K0136 Knowledge of the capabilities of different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts). Show
NICE K0137 Knowledge of the range of existing networks (e.g., PBX, LANs, WANs, WIFI, SCADA). Show
NICE K0138 Knowledge of Wi-Fi. Show
NICE K0139 Knowledge of interpreted and compiled computer languages. Show
NICE K0140 Knowledge of secure coding techniques. Show
NICE K0141 WITHDRAWN: Integrated into K0420 Show
NICE K0142 Knowledge of collection management processes, capabilities, and limitations. Show
NICE K0143 Knowledge of front-end collection systems, including traffic collection, filtering, and selection. Show
NICE K0144 Knowledge of social dynamics of computer attackers in a global context. Show
NICE K0145 Knowledge of security event correlation tools. Show
NICE K0146 Knowledge of the organization's core business/mission processes. Show
NICE K0147 Knowledge of emerging security issues, risks, and vulnerabilities. Show
NICE K0148 Knowledge of import/export control regulations and responsible agencies for the purposes of reducing supply chain risk. Show
NICE K0149 Knowledge of organization's risk tolerance and/or risk management approach. Show
NICE K0150 Knowledge of enterprise incident response program, roles, and responsibilities. Show
NICE K0151 Knowledge of current and emerging threats/threat vectors. Show
NICE K0152 Knowledge of software related information technology (IT) security principles and methods (e.g., modularization, layering, abstraction, data hiding, simplicity/minimization). Show
NICE K0153 Knowledge of software quality assurance process. Show
NICE K0154 Knowledge of supply chain risk management standards, processes, and practices. Show
NICE K0155 Knowledge of electronic evidence law. Show
NICE K0156 Knowledge of legal rules of evidence and court procedure. Show
NICE K0157 Knowledge of cyber defense and information security policies, procedures, and regulations. Show
NICE K0158 Knowledge of organizational information technology (IT) user security policies (e.g., account creation, password rules, access control). Show
NICE K0159 Knowledge of Voice over IP (VoIP). Show
NICE K0160 Knowledge of the common attack vectors on the network layer. Show
NICE K0161 Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). Show
NICE K0162 Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored). Show
NICE K0163 Knowledge of critical information technology (IT) procurement requirements. Show
NICE K0164 Knowledge of functionality, quality, and security requirements and how these will apply to specific items of supply (i.e., elements and processes). Show
NICE K0165 Knowledge of risk/threat assessment. Show
NICE K0166 WITHDRAWN: Knowledge of the nature and function of the relevant information structure. (See K0127) Show
NICE K0167 Knowledge of system administration, network, and operating system hardening techniques. Show
NICE K0168 Knowledge of applicable laws, statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures. Show
NICE K0169 Knowledge of information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures. Show
NICE K0170 Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations. Show
NICE K0171 Knowledge of hardware reverse engineering techniques. Show
NICE K0172 Knowledge of middleware (e.g., enterprise service bus and message queuing). Show
NICE K0173 WITHDRAWN: Integrated into K0499 (prior to draft SP 800-181) Show
NICE K0174 Knowledge of networking protocols. Show
NICE K0175 Knowledge of software reverse engineering techniques. Show
NICE K0176 Knowledge of Extensible Markup Language (XML) schemas. Show
NICE K0177 Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). Show
NICE K0178 Knowledge of secure software deployment methodologies, tools, and practices. Show
NICE K0179 Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). Show
NICE K0180 Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. Show
NICE K0181 WITHDRAWN: Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification [RFID], Infrared Networking [IR], Wireless Fidelity [Wi-Fi]. paging, cellular, satellite dishes), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly. (See K0274) Show
NICE K0182 Knowledge of data carving tools and techniques (e.g., Foremost). Show
NICE K0183 Knowledge of reverse engineering concepts. Show
NICE K0184 Knowledge of anti-forensics tactics, techniques, and procedures. Show
NICE K0185 Knowledge of forensics lab design configuration and support applications (e.g., VMWare, Wireshark). Show
NICE K0186 Knowledge of debugging procedures and tools. Show
NICE K0187 Knowledge of file type abuse by adversaries for anomalous behavior. Show
NICE K0188 Knowledge of malware analysis tools (e.g., Oily Debug, Ida Pro). Show
NICE K0189 Knowledge of malware with virtual machine detection (e.g. virtual aware malware, debugger aware malware, and unpacked malware that looks for VM-related strings in your computer’s display device). Show
NICE K0190 Knowledge of encryption methodologies. Show
NICE K0191 Knowledge of signature implementation impact for viruses, malware, and attacks. Show
NICE K0192 Knowledge of Windows/Unix ports and services. Show
NICE K0193 Knowledge of advanced data remediation security features in databases. Show
NICE K0194 Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. Show
NICE K0195 Knowledge of data classification standards and methodologies based on sensitivity and other risk factors. Show
NICE K0196 Knowledge of Import/Export Regulations related to cryptography and other security technologies. Show
NICE K0197 Knowledge of database access application programming interfaces (e.g., Java Database Connectivity [JDBC]). Show
NICE K0198 Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions). Show
NICE K0199 Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zachman, Federal Enterprise Architecture [FEA]). Show
NICE K0200 Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). Show
NICE K0201 Knowledge of symmetric key rotation techniques and concepts. Show
NICE K0202 Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing). Show
NICE K0203 Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). Show
NICE K0204 Knowledge of learning assessment techniques (rubrics, evaluation plans, tests, quizzes). Show
NICE K0205 Knowledge of basic system, network, and OS hardening techniques. Show
NICE K0206 Knowledge of ethical hacking principles and techniques. Show
NICE K0207 Knowledge of circuit analysis. Show
NICE K0208 Knowledge of computer based training and e-learning services. Show
NICE K0209 Knowledge of covert communication techniques. Show
NICE K0210 Knowledge of data backup and restoration concepts. Show
NICE K0211 Knowledge of confidentiality, integrity, and availability requirements. Show
NICE K0212 Knowledge of cybersecurity-enabled software products. Show
NICE K0213 Knowledge of instructional design and evaluation models (e.g., ADDIE, Smith/Ragan model, Gagne’s Events of Instruction, Kirkpatrick’s model of evaluation). Show
NICE K0214 Knowledge of the Risk Management Framework Assessment Methodology. Show
NICE K0215 Knowledge of organizational training policies. Show
NICE K0216 Knowledge of learning levels (i.e., Bloom’s Taxonomy of learning). Show
NICE K0217 Knowledge of Learning Management Systems and their use in managing learning. Show
NICE K0218 Knowledge of learning styles (e.g., assimilator, auditory, kinesthetic). Show
NICE K0219 WITHDRAWN: Knowledge of local area network (LAN) and wide area network (WAN) principles. (See K0050) Show
NICE K0220 Knowledge of modes of learning (e.g., rote learning, observation). Show
NICE K0221 Knowledge of OSI model and underlying network protocols (e.g., TCP/IP). Show
NICE K0222 Knowledge of relevant laws, legal authorities, restrictions, and regulations pertaining to cyber defense activities. Show
NICE K0223 WITHDRAWN: Integrated into K0073 Show
NICE K0224 Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. Show
NICE K0225 WITHDRAWN: Knowledge of the common networking protocol and services deployed at CC/S/A. (See K0565) Show
NICE K0226 Knowledge of organizational training systems. Show
NICE K0227 Knowledge of various types of computer architectures. Show
NICE K0228 Knowledge of taxonomy and semantic ontology theory. Show
NICE K0229 Knowledge of applications that can log errors, exceptions, and application faults and logging. Show
NICE K0230 Knowledge of cloud service models and how those models can limit incident response. Show
NICE K0231 Knowledge of crisis management protocols, processes, and techniques. Show
NICE K0232 WITHDRAWN: Knowledge of critical protocols (e.g., IPSEC, AES, GRE, IKE). Show
NICE K0233 Knowledge of the National Cybersecurity Workforce Framework, work roles, and associated tasks, knowledge, skills, and abilities. Show
NICE K0234 Knowledge of full spectrum cyber capabilities (e.g., defense, attack, exploitation). Show
NICE K0235 Knowledge of how to leverage research and development centers, think tanks, academic research, and industry systems. Show
NICE K0236 Knowledge of how to utilize Hadoop, Java, Python, SQL, Hive, and Pig to explore data. Show
NICE K0237 Knowledge of industry best practices for service desk. Show
NICE K0238 Knowledge of machine learning theory and principles. Show
NICE K0239 Knowledge of media production, communication, and dissemination techniques and methods, including alternative ways to inform via written, oral, and visual media. Show
NICE K0240 Knowledge of multi-level security systems and cross domain solutions. Show
NICE K0241 Knowledge of organizational human resource policies, processes, and procedures. Show
NICE K0242 Knowledge of organizational security policies. Show
NICE K0243 Knowledge of organizational training and education policies, processes, and procedures. Show
NICE K0244 Knowledge of physical and physiological behaviors that may indicate suspicious or abnormal activity. Show
NICE K0245 Knowledge of principles and processes for conducting training and education needs assessment. Show
NICE K0246 Knowledge of relevant concepts, procedures, software, equipment, and technology applications. Show
NICE K0247 Knowledge of remote access processes, tools, and capabilities related to customer support. Show
NICE K0248 Knowledge of strategic theory and practice. Show
NICE K0249 Knowledge of sustainment technologies, processes and strategies. Show
NICE K0250 Knowledge of Test & Evaluation processes for learners. Show
NICE K0251 Knowledge of the judicial process, including the presentation of facts and evidence. Show
NICE K0252 Knowledge of training and education principles and methods for curriculum design, teaching and instruction for individuals and groups, and the measurement of training and education effects. Show
NICE K0253 WITHDRAWN: Integrated into K0227 Show
NICE K0254 Knowledge of binary analysis. Show
NICE K0255 Knowledge of network architecture concepts including topology, protocols, and components. Show
NICE K0256 WITHDRAWN: Integrated into K0224 Show
NICE K0257 Knowledge of information technology (IT) acquisition/procurement requirements. Show
NICE K0258 Knowledge of test procedures, principles, and methodologies (e.g., Capabilities and Maturity Model Integration (CMMI)). Show
NICE K0259 Knowledge of malware analysis concepts and methodologies. Show
NICE K0260 Knowledge of Personally Identifiable Information (PII) data security standards. Show
NICE K0261 Knowledge of Payment Card Industry (PCI) data security standards. Show
NICE K0262 Knowledge of Personal Health Information (PHI) data security standards. Show
NICE K0263 Knowledge of information technology (IT) risk management policies, requirements, and procedures. Show
NICE K0264 Knowledge of program protection planning (e.g. information technology (IT) supply chain security/risk management policies, anti-tampering techniques, and requirements). Show
NICE K0265 Knowledge of infrastructure supporting information technology (IT) for safety, performance, and reliability. Show
NICE K0266 Knowledge of how to evaluate the trustworthiness of the supplier and/or product. Show
NICE K0267 Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures. Show
NICE K0268 Knowledge of forensic footprint identification. Show
NICE K0269 Knowledge of mobile communications architecture. Show
NICE K0270 Knowledge of the acquisition/procurement life cycle process. Show
NICE K0271 Knowledge of operating system structures and internals (e.g., process management, directory structure, installed applications). Show
NICE K0272 Knowledge of network analysis tools used to identify software communications vulnerabilities. Show
NICE K0273 WITHDRAWN: Knowledge of general kill chain (e.g., footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). Show
NICE K0274 Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly. Show
NICE K0275 Knowledge of configuration management techniques. Show
NICE K0276 Knowledge of security management. Show
NICE K0277 Knowledge of current and emerging data encryption (e.g., Column and Tablespace Encryption, file and disk encryption) security features in databases (e.g. built-in cryptographic key management features). Show
NICE K0278 Knowledge of current and emerging data remediation security features in databases. Show
NICE K0279 WITHDRAWN: Knowledge of database access application programming interfaces (APIs) (e.g., Java Database Connectivity [JDBC]). Show
NICE K0280 Knowledge of systems engineering theories, concepts, and methods. Show
NICE K0281 Knowledge of information technology (IT) service catalogues. Show
NICE K0282 WITHDRAWN: Integrated into K0200 Show
NICE K0283 Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud). Show
NICE K0284 Knowledge of developing and applying user credential management system. Show
NICE K0285 Knowledge of implementing enterprise key escrow systems to support data-at-rest encryption. Show
NICE K0286 Knowledge of N-tiered typologies (e.g. including server and client operating systems). Show
NICE K0287 Knowledge of an organization's information classification program and procedures for information compromise. Show
NICE K0288 Knowledge of industry standard security models. Show
NICE K0289 Knowledge of system/server diagnostic tools and fault identification techniques. Show
NICE K0290 Knowledge of systems security testing and evaluation methods. Show
NICE K0291 Knowledge of the enterprise information technology (IT) architectural concepts and patterns (e.g., baseline, validated design, and target architectures.) Show
NICE K0292 Knowledge of the operations and processes for incident, problem, and event management. Show
NICE K0293 Knowledge of integrating the organization’s goals and objectives into the architecture. Show
NICE K0294 Knowledge of IT system operation, maintenance, and security needed to keep equipment functioning properly. Show
NICE K0295 Knowledge of confidentiality, integrity, and availability principles. Show
NICE K0296 Knowledge of capabilities, applications, and potential vulnerabilities of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware. Show
NICE K0297 Knowledge of countermeasure design for identified security risks. Show
NICE K0298 Knowledge of countermeasures for identified security risks. Show
NICE K0299 Knowledge in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. Show
NICE K0300 Knowledge of network mapping and recreating network topologies. Show
NICE K0301 Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump). Show
NICE K0302 Knowledge of the basic operation of computers. Show
NICE K0303 Knowledge of the use of sub-netting tools. Show
NICE K0304 Knowledge of concepts and practices of processing digital forensic data. Show
NICE K0305 Knowledge of data concealment (e.g. encryption algorithms and steganography). Show
NICE K0306 WITHDRAWN: Knowledge of basic physical computer components and architectures Show
NICE K0307 WITHDRAWN: Knowledge of common network tools (e.g., ping, traceroute, nslookup). (See K0111) Show
NICE K0308 Knowledge of cryptology. Show
NICE K0309 Knowledge of emerging technologies that have potential for exploitation. Show
NICE K0310 Knowledge of hacking methodologies. Show
NICE K0311 Knowledge of industry indicators useful for identifying technology trends. Show
NICE K0312 Knowledge of intelligence gathering principles, policies, and procedures including legal authorities and restrictions. Show
NICE K0313 Knowledge of external organizations and academic institutions with cyber focus (e.g., cyber curriculum/training and Research & Development). Show
NICE K0314 Knowledge of industry technologies’ potential cybersecurity vulnerabilities. Show
NICE K0315 Knowledge of the principal methods, procedures, and techniques of gathering information and producing, reporting, and sharing information. Show
NICE K0316 Knowledge of business or military operation plans, concept operation plans, orders, policies, and standing rules of engagement. Show
NICE K0317 Knowledge of procedures used for documenting and querying reported incidents, problems, and events. Show
NICE K0318 Knowledge of operating system command-line tools. Show
NICE K0319 Knowledge of technical delivery capabilities and their limitations. Show
NICE K0320 Knowledge of organization's evaluation and validation criteria. Show
NICE K0321 Knowledge of engineering concepts as applied to computer architecture and associated computer hardware/software. Show
NICE K0322 Knowledge of embedded systems. Show
NICE K0323 Knowledge of system fault tolerance methodologies. Show
NICE K0324 Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications. Show
NICE K0325 Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression). Show
NICE K0326 Knowledge of demilitarized zones. Show
NICE K0327 WITHDRAWN: Knowledge of local area network (LAN), wide area network (WAN) and enterprise principles and concepts, including bandwidth management. (See K0050) Show
NICE K0328 WITHDRAWN: Knowledge of mathematics, including logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis. Show
NICE K0329 WITHDRAWN: Knowledge of statistics. Show
NICE K0330 Knowledge of successful capabilities to identify the solutions to less common and more complex system problems. Show
NICE K0331 WITHDRAWN: Knowledge of network protocols (e.g., Transmission Control Protocol (TCP), Internet Protocol (IP), Dynamic Host Configuration Protocol (DHCP)), and directory services (e.g., Domain Name System (DNS)). (See K0332) Show
NICE K0332 Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. Show
NICE K0333 Knowledge of network design processes, to include understanding of security objectives, operational objectives, and trade-offs. Show
NICE K0334 Knowledge of network traffic analysis (tools, methodologies, processes). Show
NICE K0335 Knowledge of current and emerging cyber technologies. Show
NICE K0336 Knowledge of access authentication methods. Show
NICE K0337 WITHDRAWN: Integrated into K0007 Show
NICE K0338 Knowledge of data mining techniques. Show
NICE K0339 Knowledge of how to use network analysis tools to identify vulnerabilities. Show
NICE K0340 WITHDRAWN: Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol (TCP), Internet Protocol (IP), Open System Interconnection Model (OSI)). Show
NICE K0341 Knowledge of foreign disclosure policies and import/export control regulations as related to cybersecurity. Show
NICE K0342 Knowledge of penetration testing principles, tools, and techniques. Show
NICE K0343 Knowledge of root cause analysis techniques. Show
NICE K0344 Knowledge of an organization’s threat environment. Show
NICE K0345 WITHDRAWN: Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored). Show
NICE K0346 Knowledge of principles and methods for integrating system components. Show
NICE K0347 Knowledge and understanding of operational design. Show
NICE K0348 WITHDRAWN: Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). Show
NICE K0349 Knowledge of website types, administration, functions, and content management system (CMS). Show
NICE K0350 Knowledge of accepted organization planning systems. Show
NICE K0351 Knowledge of applicable statutes, laws, regulations and policies governing cyber targeting and exploitation. Show
NICE K0352 Knowledge of forms of intelligence support needs, topics, and focus areas. Show
NICE K0353 Knowledge of possible circumstances that would result in changing collection management authorities. Show
NICE K0354 Knowledge of relevant reporting and dissemination procedures. Show
NICE K0355 Knowledge of all-source reporting and dissemination procedures. Show
NICE K0356 Knowledge of analytic tools and techniques for language, voice and/or graphic material. Show
NICE K0357 WITHDRAWN: Knowledge of analytical constructs and their use in assessing the operational environment. (See K0224) Show
NICE K0358 Knowledge of analytical standards and the purpose of intelligence confidence levels. Show
NICE K0359 Knowledge of approved intelligence dissemination processes. Show
NICE K0360 WITHDRAWN: Knowledge of assembly code. Show
NICE K0361 Knowledge of asset availability, capabilities and limitations. Show
NICE K0362 Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). Show
NICE K0363 Knowledge of auditing and logging procedures (including server-based logging). Show
NICE K0364 Knowledge of available databases and tools necessary to assess appropriate collection tasking. Show
NICE K0365 WITHDRAWN: Knowledge of basic back-up and recovery procedures including different types of backups (e.g., full, incremental). Show
NICE K0366 WITHDRAWN: Knowledge of basic computer components and architectures, including the functions of various peripherals. Show
NICE K0367 Knowledge of penetration testing. Show
NICE K0368 Knowledge of implants that enable cyber collection and/or preparation activities. Show
NICE K0369 WITHDRAWN: Knowledge of basic malicious activity concepts (e.g., footprinting, scanning and enumeration). Show
NICE K0370 WITHDRAWN: Knowledge of basic physical computer components and architecture, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). (See K0109) Show
NICE K0371 Knowledge of principles of the collection development processes (e.g., Dialed Number Recognition, Social Network Analysis). Show
NICE K0372 Knowledge of programming concepts (e.g., levels, structures, compiled vs. interpreted languages). Show
NICE K0373 Knowledge of basic software applications (e.g., data storage and backup, database applications) and the types of vulnerabilities that have been found in those applications. Show
NICE K0374 WITHDRAWN: Knowledge of basic structure, architecture, and design of modern digital and telephony networks. (See K0599) Show
NICE K0375 Knowledge of wireless applications vulnerabilities. Show
NICE K0376 Knowledge of internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc. Show
NICE K0377 Knowledge of classification and control markings standards, policies and procedures. Show
NICE K0378 WITHDRAWN: Knowledge of classification and control markings standards. (See K0377) Show
NICE K0379 Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc. Show
NICE K0380 Knowledge of collaborative tools and environments. Show
NICE K0381 Knowledge of collateral damage and estimating impact(s). Show
NICE K0382 Knowledge of collection capabilities and limitations. Show
NICE K0383 Knowledge of collection capabilities, accesses, performance specifications, and constraints utilized to satisfy collection plan. Show
NICE K0384 Knowledge of collection management functionality (e.g., positions, functions, responsibilities, products, reporting requirements). Show
NICE K0385 WITHDRAWN: Integrated into K0142 Show
NICE K0386 Knowledge of collection management tools. Show
NICE K0387 Knowledge of collection planning process and collection plan. Show
NICE K0388 Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies. Show
NICE K0389 Knowledge of collection sources including conventional and non-conventional sources. Show
NICE K0390 Knowledge of collection strategies. Show
NICE K0391 Knowledge of collection systems, capabilities, and processes. Show
NICE K0392 Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). Show
NICE K0393 Knowledge of common networking devices and their configurations. Show
NICE K0394 Knowledge of common reporting databases and tools. Show
NICE K0395 Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). Show
NICE K0396 Knowledge of computer programming concepts, including computer languages, programming, testing, debugging, and file types. Show
NICE K0397 Knowledge of security concepts in operating systems (e.g., Linux, Unix.) Show
NICE K0398 Knowledge of concepts related to websites (e.g., web servers/pages, hosting, DNS, registration, web languages such as HTML). Show
NICE K0399 Knowledge of crisis action planning and time sensitive planning procedures. Show
NICE K0400 Knowledge of crisis action planning for cyber operations. Show
NICE K0401 Knowledge of criteria for evaluating collection products. Show
NICE K0402 Knowledge of criticality and vulnerability factors (e.g., value, recuperation, cushion, countermeasures) for target selection and applicability to the cyber domain. Show
NICE K0403 Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations. Show
NICE K0404 Knowledge of current collection requirements. Show
NICE K0405 Knowledge of current computer-based intrusion sets. Show
NICE K0406 Knowledge of current software and methodologies for active defense and system hardening. Show
NICE K0407 Knowledge of customer information needs. Show
NICE K0408 Knowledge of cyber actions (i.e. cyber defense, information gathering, environment preparation, cyber-attack) principles, capabilities, limitations, and effects. Show
NICE K0409 Knowledge of cyber intelligence/information collection capabilities and repositories. Show
NICE K0410 Knowledge of cyber laws and their effect on Cyber planning. Show
NICE K0411 Knowledge of cyber laws and legal considerations and their effect on cyber planning. Show
NICE K0412 Knowledge of cyber lexicon/terminology Show
NICE K0413 Knowledge of cyber operation objectives, policies, and legalities. Show
NICE K0414 Knowledge of cyber operations support or enabling processes. Show
NICE K0415 Knowledge of cyber operations terminology/lexicon. Show
NICE K0416 Knowledge of cyber operations. Show
NICE K0417 Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). Show
NICE K0418 Knowledge of data flow process for terminal or environment collection. Show
NICE K0419 Knowledge of database administration and maintenance. Show
NICE K0420 Knowledge of database theory. Show
NICE K0421 Knowledge of databases, portals and associated dissemination vehicles. Show
NICE K0422 Knowledge of deconfliction processes and procedures. Show
NICE K0423 Knowledge of deconfliction reporting to include external organization interaction. Show
NICE K0424 Knowledge of denial and deception techniques. Show
NICE K0425 Knowledge of different organization objectives at all levels, including subordinate, lateral and higher. Show
NICE K0426 Knowledge of dynamic and deliberate targeting. Show
NICE K0427 Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). Show
NICE K0428 Knowledge of encryption algorithms and tools for wireless local area networks (WLANs). Show
NICE K0429 Knowledge of enterprise-wide information management. Show
NICE K0430 Knowledge of evasion strategies and techniques. Show
NICE K0431 Knowledge of evolving/emerging communications technologies. Show
NICE K0432 Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization. Show
NICE K0433 Knowledge of forensic implications of operating system structure and operations. Show
NICE K0434 WITHDRAWN: Knowledge of front-end collection systems, including traffic collection, filtering, and selection. Show
NICE K0435 Knowledge of fundamental cyber concepts, principles, limitations, and effects. Show
NICE K0436 Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects. Show
NICE K0437 Knowledge of general Supervisory control and data acquisition (SCADA) system components. Show
NICE K0438 Knowledge of mobile cellular communications architecture (e.g., LTE, CDMA, GSM/EDGE and UMTS/HSPA). Show
NICE K0439 Knowledge of governing authorities for targeting. Show
NICE K0440 Knowledge of host-based security products and how those products affect exploitation and reduce vulnerability. Show
NICE K0441 WITHDRAWN: Knowledge of how collection requirements and information needs are translated, tracked, and prioritized across the extended enterprise. Show
NICE K0442 Knowledge of how converged technologies impact cyber operations (e.g., digital, telephony, wireless). Show
NICE K0443 WITHDRAWN: Knowledge of how hubs, switches, routers work together in the design of a network. (See K0143) Show
NICE K0444 Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP). Show
NICE K0445 Knowledge of how modern digital and telephony networks impact cyber operations. Show
NICE K0446 Knowledge of how modern wireless communications systems impact cyber operations. Show
NICE K0447 Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http). Show
NICE K0448 Knowledge of how to establish priorities for resources. Show
NICE K0449 Knowledge of how to extract, analyze, and use metadata. Show
NICE K0450 WITHDRAWN: Integrated into K0036 Show
NICE K0451 Knowledge of identification and reporting processes. Show
NICE K0452 Knowledge of implementing Unix and Windows systems that provide radius authentication and logging, DNS, mail, web service, FTP server, DHCP, firewall, and SNMP. Show
NICE K0453 Knowledge of indications and warning. Show
NICE K0454 Knowledge of information needs. Show
NICE K0455 Knowledge of information security concepts, facilitating technologies and methods. Show
NICE K0456 Knowledge of intelligence capabilities and limitations. Show
NICE K0457 Knowledge of intelligence confidence levels. Show
NICE K0458 Knowledge of intelligence disciplines. Show
NICE K0459 Knowledge of intelligence employment requirements (i.e., logistical, communications support, maneuverability, legal restrictions, etc.). Show
NICE K0460 Knowledge of intelligence preparation of the environment and similar processes. Show
NICE K0461 Knowledge of intelligence production processes. Show
NICE K0462 Knowledge of intelligence reporting principles, policies, procedures, and vehicles, including report formats, reportability criteria (requirements and priorities), dissemination practices, and legal authorities and restrictions. Show
NICE K0463 Knowledge of intelligence requirements tasking systems. Show
NICE K0464 Knowledge of intelligence support to planning, execution, and assessment. Show
NICE K0465 Knowledge of internal and external partner cyber operations capabilities and tools. Show
NICE K0466 Knowledge of internal and external partner intelligence processes and the development of information requirements and essential information. Show
NICE K0467 Knowledge of internal and external partner organization capabilities and limitations (those with tasking, collection, processing, exploitation and dissemination responsibilities). Show
NICE K0468 Knowledge of internal and external partner reporting. Show
NICE K0469 Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions. Show
NICE K0470 Knowledge of Internet and routing protocols. Show
NICE K0471 Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). Show
NICE K0472 Knowledge of intrusion detection systems and signature development. Show
NICE K0473 Knowledge of intrusion sets. Show
NICE K0474 Knowledge of key cyber threat actors and their equities. Show
NICE K0475 Knowledge of key factors of the operational environment and threat. Show
NICE K0476 Knowledge of language processing tools and techniques. Show
NICE K0477 Knowledge of leadership's Intent and objectives. Show
NICE K0478 Knowledge of legal considerations in targeting. Show
NICE K0479 Knowledge of malware analysis and characteristics. Show
NICE K0480 Knowledge of malware. Show
NICE K0481 Knowledge of methods and techniques used to detect various exploitation activities. Show
NICE K0482 Knowledge of methods for ascertaining collection asset posture and availability. Show
NICE K0483 Knowledge of methods to integrate and summarize information from any potential sources. Show
NICE K0484 Knowledge of midpoint collection (process, objectives, organization, targets, etc.). Show
NICE K0485 Knowledge of network administration. Show
NICE K0486 Knowledge of network construction and topology. Show
NICE K0487 Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). Show
NICE K0488 Knowledge of network security implementations (e.g., host-based IDS, IPS, access control lists), including their function and placement in a network. Show
NICE K0489 Knowledge of network topology. Show
NICE K0490 WITHDRAWN: Integrated into K0058 Show
NICE K0491 Knowledge of networking and Internet communications fundamentals (i.e. devices, device configuration, hardware, software, applications, ports/protocols, addressing, network architecture and infrastructure, routing, operating systems, etc.). Show
NICE K0492 Knowledge of non-traditional collection methodologies. Show
NICE K0493 Knowledge of obfuscation techniques (e.g., TOR/Onion/anonymizers, VPN/VPS, encryption). Show
NICE K0494 Knowledge of objectives, situation, operational environment, and the status and disposition of internal and external partner collection capabilities available to support planning. Show
NICE K0495 Knowledge of ongoing and future operations. Show
NICE K0496 Knowledge of operational asset constraints. Show
NICE K0497 Knowledge of operational effectiveness assessment. Show
NICE K0498 Knowledge of operational planning processes. Show
NICE K0499 Knowledge of operations security. Show
NICE K0500 Knowledge of organization and/or partner collection systems, capabilities, and processes (e.g., collection and protocol processors). Show
NICE K0501 Knowledge of organization cyber operations programs, strategies, and resources. Show
NICE K0502 Knowledge of organization decision support tools and/or methods. Show
NICE K0503 Knowledge of organization formats of resource and asset readiness reporting, its operational relevance and intelligence collection impact. Show
NICE K0504 Knowledge of organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations. Show
NICE K0505 Knowledge of organization objectives and associated demand on collection management. Show
NICE K0506 Knowledge of organization objectives, leadership priorities, and decision-making risks. Show
NICE K0507 Knowledge of organization or partner exploitation of digital networks. Show
NICE K0508 Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations. Show
NICE K0509 Knowledge of organizational and partner authorities, responsibilities, and contributions to achieving objectives. Show
NICE K0510 Knowledge of organizational and partner policies, tools, capabilities, and procedures. Show
NICE K0511 Knowledge of organizational hierarchy and cyber decision-making processes. Show
NICE K0512 Knowledge of organizational planning concepts. Show
NICE K0513 Knowledge of organizational priorities, legal authorities and requirements submission processes. Show
NICE K0514 Knowledge of organizational structures and associated intelligence capabilities. Show
NICE K0515 WITHDRAWN: Knowledge of OSI model and underlying networking protocols (e.g., TCP/IP). Show
NICE K0516 Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. Show
NICE K0517 Knowledge of post implementation review (PIR) approval process. Show
NICE K0518 Knowledge of planning activity initiation. Show
NICE K0519 Knowledge of planning timelines adaptive, crisis action, and time-sensitive planning. Show
NICE K0520 Knowledge of principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure. Show
NICE K0521 Knowledge of priority information, how it is derived, where it is published, how to access, etc. Show
NICE K0522 Knowledge of production exploitation and dissemination needs and architectures. Show
NICE K0523 Knowledge of products and nomenclature of major vendors (e.g., security suites - Trend Micro, Symantec, McAfee, Outpost, and Panda) and how those products affect exploitation and reduce vulnerabilities. Show
NICE K0524 Knowledge of relevant laws, regulations, and policies. Show
NICE K0525 Knowledge of required intelligence planning products associated with cyber operational planning. Show
NICE K0526 Knowledge of research strategies and knowledge management. Show
NICE K0527 Knowledge of risk management and mitigation strategies. Show
NICE K0528 Knowledge of satellite-based communication systems. Show
NICE K0529 Knowledge of scripting Show
NICE K0530 Knowledge of security hardware and software options, including the network artifacts they induce and their effects on exploitation. Show
NICE K0531 Knowledge of security implications of software configurations. Show
NICE K0532 Knowledge of specialized target language (e.g., acronyms, jargon, technical terminology, code words). Show
NICE K0533 Knowledge of specific target identifiers, and their usage. Show
NICE K0534 Knowledge of staff management, assignment, and allocation processes. Show
NICE K0535 Knowledge of strategies and tools for target research. Show
NICE K0536 Knowledge of structure, approach, and strategy of exploitation tools (e.g., sniffers, keyloggers) and techniques (e.g., gaining backdoor access, collecting/exfiltrating data, conducting vulnerability analysis of other systems in the network). Show
NICE K0537 Knowledge of system administration concepts for the Unix/Linux and Windows operating systems (e.g., process management, directory structure, installed applications, Access Controls). Show
NICE K0538 Knowledge of target and threat organization structures, critical capabilities, and critical vulnerabilities Show
NICE K0539 Knowledge of target communication profiles and their key elements (e.g., target associations, activities, communication infrastructure). Show
NICE K0540 Knowledge of target communication tools and techniques. Show
NICE K0541 Knowledge of target cultural references, dialects, expressions, idioms, and abbreviations. Show
NICE K0542 Knowledge of target development (i.e., concepts, roles, responsibilities, products, etc.). Show
NICE K0543 Knowledge of target estimated repair and recuperation times. Show
NICE K0544 Knowledge of target intelligence gathering and operational preparation techniques and life cycles. Show
NICE K0545 Knowledge of target language(s). Show
NICE K0546 Knowledge of target list development (i.e. Restricted, Joint, Candidate, etc.). Show
NICE K0547 Knowledge of target methods and procedures. Show
NICE K0548 Knowledge of target or threat cyber actors and procedures. Show
NICE K0549 Knowledge of target vetting and validation procedures. Show
NICE K0550 Knowledge of target, including related current events, communication profile, actors, and history (language, culture) and/or frame of reference. Show
NICE K0551 Knowledge of targeting cycles. Show
NICE K0552 Knowledge of tasking mechanisms. Show
NICE K0553 Knowledge of tasking processes for organic and subordinate collection assets. Show
NICE K0554 Knowledge of tasking, collection, processing, exploitation and dissemination. Show
NICE K0555 Knowledge of TCP/IP networking protocols. Show
NICE K0556 Knowledge of telecommunications fundamentals. Show
NICE K0557 Knowledge of terminal or environmental collection (process, objectives, organization, targets, etc.). Show
NICE K0558 Knowledge of the available tools and applications associated with collection requirements and collection management. Show
NICE K0559 Knowledge of the basic structure, architecture, and design of converged applications. Show
NICE K0560 Knowledge of the basic structure, architecture, and design of modern communication networks. Show
NICE K0561 Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). Show
NICE K0562 Knowledge of the capabilities and limitations of new and emerging collection capabilities, accesses and/or processes. Show
NICE K0563 Knowledge of the capabilities, limitations and tasking methodologies of internal and external collections as they apply to planned cyber activities. Show
NICE K0564 Knowledge of the characteristics of targeted communication networks (e.g., capacity, functionality, paths, critical nodes). Show
NICE K0565 Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. Show
NICE K0566 Knowledge of the critical information requirements and how they're used in planning. Show
NICE K0567 Knowledge of the data flow from collection origin to repositories and tools. Show
NICE K0568 Knowledge of the definition of collection management and collection management authority. Show
NICE K0569 Knowledge of the existent tasking, collection, processing, exploitation and dissemination architecture. Show
NICE K0570 Knowledge of the factors of threat that could impact collection operations. Show
NICE K0571 Knowledge of the feedback cycle in collection processes. Show
NICE K0572 Knowledge of the functions and capabilities of internal teams that emulate threat activities to benefit the organization. Show
NICE K0573 Knowledge of the fundamentals of digital forensics to extract actionable intelligence. Show
NICE K0574 Knowledge of the impact of language analysis on on-net operator functions. Show
NICE K0575 Knowledge of the impacts of internal and external partner staffing estimates. Show
NICE K0576 Knowledge of the information environment. Show
NICE K0577 Knowledge of the intelligence frameworks, processes, and related systems. Show
NICE K0578 Knowledge of the intelligence requirements development and request for information processes. Show
NICE K0579 Knowledge of the organization, roles and responsibilities of higher, lower and adjacent sub-elements. Show
NICE K0580 Knowledge of the organization’s established format for collection plan. Show
NICE K0581 Knowledge of the organization’s planning, operations and targeting cycles. Show
NICE K0582 Knowledge of the organizational planning and staffing process. Show
NICE K0583 Knowledge of the organizational plans/directives/guidance that describe objectives. Show
NICE K0584 Knowledge of the organizational policies/procedures for temporary transfer of collection authority. Show
NICE K0585 Knowledge of the organizational structure as it pertains to full spectrum cyber operations, including the functions, responsibilities, and interrelationships among distinct internal elements. Show
NICE K0586 Knowledge of the outputs of course of action and exercise analysis. Show
NICE K0587 Knowledge of the POC’s, databases, tools and applications necessary to establish environment preparation and surveillance products. Show
NICE K0588 Knowledge of the priority information requirements from subordinate, lateral and higher levels of the organization. Show
NICE K0589 Knowledge of the process used to assess the performance and impact of operations. Show
NICE K0590 Knowledge of the processes to synchronize operational assessment procedures with the critical information requirement process. Show
NICE K0591 Knowledge of the production responsibilities and organic analysis and production capabilities. Show
NICE K0592 Knowledge of the purpose and contribution of target templates. Show
NICE K0593 Knowledge of the range of cyber operations and their underlying intelligence support needs, topics, and focus areas. Show
NICE K0594 Knowledge of the relationships between end states, objectives, effects, lines of operation, etc. Show
NICE K0595 Knowledge of the relationships of operational objectives, intelligence requirements, and intelligence production tasks. Show
NICE K0596 Knowledge of the request for information process. Show
NICE K0597 Knowledge of the role of network operations in supporting and facilitating other organization operations. Show
NICE K0598 Knowledge of the structure and intent of organization specific plans, guidance and authorizations. Show
NICE K0599 Knowledge of the structure, architecture, and design of modern digital and telephony networks. Show
NICE K0600 Knowledge of the structure, architecture, and design of modern wireless communications systems. Show
NICE K0601 Knowledge of the systems/architecture/communications used for coordination. Show
NICE K0602 Knowledge of collection disciplines and capabilities. Show
NICE K0603 Knowledge of the ways in which targets or threats use the Internet. Show
NICE K0604 Knowledge of threat and/or target systems. Show
NICE K0605 Knowledge of tipping, cueing, mixing, and redundancy. Show
NICE K0606 Knowledge of transcript development processes and techniques (e.g., verbatim, gist, summaries). Show
NICE K0607 Knowledge of translation processes and techniques. Show
NICE K0608 Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications). Show
NICE K0609 Knowledge of virtual machine technologies. Show
NICE K0610 Knowledge of virtualization products (VMware, Virtual PC). Show
NICE K0611 WITHDRAWN: Integrated into K0131 Show
NICE K0612 Knowledge of what constitutes a “threat” to a network. Show
NICE K0613 Knowledge of who the organization’s operational planners are, how and where they can be contacted, and what are their expectations. Show
NICE K0614 Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems. Show
NICE K0615 Knowledge of privacy disclosure statements based on current laws. Show
NICE K0616 Knowledge of continuous monitoring, its processes, and Continuous Diagnostics and Mitigation (CDM) program activities. Show
NICE K0617 Knowledge of Automated security control assessments Show
NICE K0618 Knowledge of hardware asset management and the value of tracking the location and configuration of networked devices and software across departments, locations, facilities and, potentially, supporting business functions. Show
NICE K0619 Knowledge of software asset management and the value of tracking the location and configuration of networked devices and software across departments, locations, facilities and, potentially, supporting business functions. Show
NICE K0620 Knowledge of continuous monitoring technologies and tools. Show
NICE K0621 Knowledge of risk scoring. Show
NICE K0622 Knowledge of controls related to the use, processing, storage, and transmission of data. Show
NICE K0623 Knowledge of risk assessment methodologies. Show
NICE K0624 Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list) Show
NICE K0625 Knowledge that patching and software updates are impractical for some networked devices. Show
NICE K0626 Knowledge of secure update mechanisms. Show
NICE K0627 Knowledge of the importance of ingress filtering to protect against automated threats that rely on spoofed network addresses. Show
NICE K0628 Knowledge of cyber competitions as a way of developing skills by providing hands-on experience in simulated, real-world situations. Show
NICE K0629 Knowledge of white/black listing Show
NICE K0630 Knowledge of the latest intrusion techniques, methods and documented intrusions external to the organization. Show