- T1019: Determine special needs of cyber-physical systems
- T1020: Determine the operational and safety impacts of cybersecurity lapses
- T1023: Identify critical technology procurement requirements
- T1041: Determine impact of software configurations
- T1079: Develop cybersecurity risk profiles
- T1084: Identify anomalous network activity
- T1118: Identify vulnerabilities
- T1119: Recommend vulnerability remediation strategies
- T1142: Validate data mining and data warehousing programs, processes, and requirements
- T1337: Identify system and network capabilities
- T1338: Develop cybersecurity capability strategies for custom hardware and software development
- T1378: Identify cybersecurity solutions tools and technologies
- T1379: Design cybersecurity tools and technologies
- T1380: Develop cybersecurity tools and technologies
- T1424: Evaluate network infrastructure vulnerabilities
- T1425: Recommend network infrastructure enhancements
- T1489: Correlate incident data
- T1491: Design data management systems
- T1493: Troubleshoot prototype design and process issues
- T1494: Recommend vulnerability exploitation functional and security-related features
- T1495: Recommend vulnerability mitigation functional- and security-related features
- T1496: Develop reverse engineering tools
- T1610: Determine if hardware and software complies with defined specifications and requirements
- K0176: Knowledge of Extensible Markup Language (XML) schemas
- K0674: Knowledge of computer networking protocols
- K0675: Knowledge of risk management processes
- K0676: Knowledge of cybersecurity laws and regulations
- K0677: Knowledge of cybersecurity policies and procedures
- K0678: Knowledge of privacy laws and regulations
- K0679: Knowledge of privacy policies and procedures
- K0680: Knowledge of cybersecurity principles and practices
- K0681: Knowledge of privacy principles and practices
- K0682: Knowledge of cybersecurity threats
- K0683: Knowledge of cybersecurity vulnerabilities
- K0684: Knowledge of cybersecurity threat characteristics
- K0688: Knowledge of common application vulnerabilities
- K0696: Knowledge of digital forensic data principles and practices
- K0698: Knowledge of cryptographic key management principles and practices
- K0710: Knowledge of enterprise cybersecurity architecture principles and practices
- K0718: Knowledge of network communications principles and practices
- K0721: Knowledge of risk management principles and practices
- K0731: Knowledge of systems security engineering (SSE) principles and practices
- K0736: Knowledge of information technology (IT) security principles and practices
- K0743: Knowledge of new and emerging technologies
- K0749: Knowledge of process engineering principles and practices
- K0751: Knowledge of system threats
- K0752: Knowledge of system vulnerabilities
- K0758: Knowledge of server administration principles and practices
- K0765: Knowledge of software engineering principles and practices
- K0771: Knowledge of system life cycle management principles and practices
- K0773: Knowledge of telecommunications principles and practices
- K0778: Knowledge of enterprise information technology (IT) architecture principles and practices
- K0779: Knowledge of systems engineering processes
- K0780: Knowledge of hardware maintenance policies and procedures
- K0791: Knowledge of defense-in-depth principles and practices
- K0792: Knowledge of network configurations
- K0797: Knowledge of ethical hacking tools and techniques
- K0803: Knowledge of supply chain risk management principles and practices
- K0809: Knowledge of digital forensics data characteristics
- K0812: Knowledge of digital communication systems and software
- K0820: Knowledge of supply chain risks
- K0828: Knowledge of supply chain risk management standards and best practices
- K0834: Knowledge of technology procurement principles and practices
- K0838: Knowledge of supply chain risk management policies and procedures
- K0839: Knowledge of critical infrastructure systems and software
- K0840: Knowledge of hardware reverse engineering tools and techniques
- K0841: Knowledge of middleware software capabilities and applications
- K0842: Knowledge of software reverse engineering tools and techniques
- K0851: Knowledge of reverse engineering principles and practices
- K0870: Knowledge of enterprise architecture (EA) reference models and frameworks
- K0871: Knowledge of enterprise architecture (EA) principles and practices
- K0877: Knowledge of application firewall principles and practices
- K0878: Knowledge of network firewall principles and practices
- K0882: Knowledge of ethical hacking principles and practices
- K0884: Knowledge of covert communication tools and techniques
- K0894: Knowledge of computer architecture principles and practices
- K0915: Knowledge of network architecture principles and practices
- K0923: Knowledge of operating system structures and internals
- K0924: Knowledge of network analysis tools and techniques
- K0925: Knowledge of wireless communication tools and techniques
- K0926: Knowledge of signal jamming tools and techniques
- K0928: Knowledge of systems engineering principles and practices
- K0936: Knowledge of network hardware threats and vulnerabilities
- K0942: Knowledge of cryptology principles and practices
- K0947: Knowledge of computer engineering principles and practices
- K0955: Knowledge of penetration testing principles and practices
- K0956: Knowledge of penetration testing tools and techniques
- K0983: Knowledge of computer networking principles and practices
- K1014: Knowledge of network security principles and practices
- K1019: Knowledge of operations security (OPSEC) principles and practices
- K1050: Knowledge of critical information requirements
- K1073: Knowledge of hardware asset management principles and practices
- K1088: Knowledge of knowledge management tools and techniques
- K1172: Knowledge of mission requirements
- K1207: Knowledge of reverse engineering tools and techniques
- K1217: Knowledge of software and systems engineering life cycle standards
- S0172: Skill in applying secure coding techniques
- S0385: Skill in communicating complex concepts
- S0391: Skill in creating technical documentation
- S0465: Skill in identifying critical infrastructure systems
- S0466: Skill in identifying systems designed without security considerations
- S0475: Skill in recognizing digital forensics data
- S0481: Skill in identifying forensic digital footprints
- S0482: Skill in performing forensic data analysis
- S0483: Skill in identifying software communications vulnerabilities
- S0532: Skill in analyzing software configurations
- S0543: Skill in scanning for vulnerabilities
- S0544: Skill in recognizing vulnerabilities
- S0551: Skill in applying information technologies into proposed solutions
- S0562: Skill in creating mathematical models
- S0563: Skill in creating statistical models
- S0660: Skill in performing systems engineering
- S0668: Skill in designing technology processes and solutions
- S0669: Skill in integrating technology processes and solutions
- S0675: Skill in optimizing system performance
- S0744: Skill in performing technical writing
- S0807: Skill in solving problems
- S0827: Skill in communicating with internal and external stakeholders
Source: Workforce Framework for Cybersecurity (NICE Framework) (NIST SP 800-181 Rev 1) (Version: 2.0.0)