K0179 |
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
K0160 |
Knowledge of the common attack vectors on the network layer. |
K0070 |
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
K0089 |
Knowledge of systems diagnostic tools and fault identification techniques. |
K0106 |
Knowledge of what constitutes a network attack and a network attack??s relationship to both threats and vulnerabilities. |
K0177 |
Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). |
K0206 |
Knowledge of ethical hacking principles and techniques. |
K0342 |
Knowledge of penetration testing principles, tools, and techniques. |
K0119 |
Knowledge of hacking methodologies. |
K0572 |
Knowledge of the functions and capabilities of internal teams that emulate threat activities to benefit the organization. |
K0310 |
Knowledge of hacking methodologies. |
K0604 |
Knowledge of threat and/or target systems. |
K0430 |
Knowledge of evasion strategies and techniques. |
K0268 |
Knowledge of forensic footprint identification. |
K0272 |
Knowledge of network analysis tools used to identify software communications vulnerabilities. |
K0009 |
Knowledge of application vulnerabilities. |