K0177
Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
K0453
Knowledge of indications and warning.
K0474
Knowledge of key cyber threat actors and their equities.
K0475
Knowledge of key factors of the operational environment and threat.
K0480
Knowledge of malware.
K0570
Knowledge of the factors of threat that could impact collection operations.
K0612
Knowledge of what constitutes a âthreat to a network.
K0362
Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).
K0469
Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions.
K0603
Knowledge of the ways in which targets or threats use the Internet.
K0604
Knowledge of threat and/or target systems.
K0107
Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations.
K0144
Knowledge of social dynamics of computer attackers in a global context.
K0244
Knowledge of physical and physiological behaviors that may indicate suspicious or abnormal activity.
K0161
Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
K0162
Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).
K0297
Knowledge of countermeasure design for identified security risks.
K0183
Knowledge of reverse engineering concepts.
K0188
Knowledge of malware analysis tools (e.g., Oily Debug, Ida Pro).
K0189
Knowledge of malware with virtual machine detection (e.g. virtual aware malware, debugger aware malware, and unpacked malware that looks for VM-related strings in your computer’s display device).
K0254
Knowledge of binary analysis.
K0259
Knowledge of malware analysis concepts and methodologies.
K0368
Knowledge of implants that enable cyber collection and/or preparation activities.
K0430
Knowledge of evasion strategies and techniques.
K0151
Knowledge of current and emerging threats/threat vectors.
K0536
Knowledge of structure, approach, and strategy of exploitation tools (e.g., sniffers, keyloggers) and techniques (e.g., gaining backdoor access, collecting/exfiltrating data, conducting vulnerability analysis of other systems in the network).
K0548
Knowledge of target or threat cyber actors and procedures.
K0607
Knowledge of translation processes and techniques.
S0044
Skill in mimicking threat behaviors.
S0229
Skill in identifying cyber threats which may jeopardize organization and/or partner interests.
S0088
Skill in using binary analysis tools (e.g., Hexedit, command code xxd, hexdump).
S0087
Skill in deep analysis of captured malicious code (e.g., malware forensics).
S0131
Skill in analyzing malware.
S0003
Skill of identifying, capturing, containing, and reporting malware.
S0052
Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.).
S0270
Skill in reverse engineering (e.g., hex editing, binary packaging utilities, debugging, and strings analysis) to identify function and ownership of remote tools.
S0357
Skill to anticipate new security threats.
S0022
Skill in designing countermeasures to identified security risks.
S0341
Skill to monitor threat effects to partner capabilities and maintain a running estimate.