Attention:  CISA Learning is now available!  If you are an EXTERNAL (non-CISA) user access the new system using this url: CISA Learning. The Federal Virtual Training Environment (FedVTE) has been permanently decommissioned and replaced by CISA Learning. Please reference the CISA Learning page for the latest information. Please note: CISA Users (staff and contractors) should access CISA Learning through the internal site. You should have received an email on December 4, 2024, titled “CISA Learning is LIVE!” with more information.

Knowledge ID: K0716

Knowledge of host access control (HAC) systems and software

Work roles with this Knowledge

  • Systems Security Management

    NICE Framework ID: OG-WRL-014

    Responsible for managing the cybersecurity of a program, organization, system, or enclave.

  • Secure Systems Development

    NICE Framework ID: DD-WRL-004

    Responsible for the secure design, development, and testing of systems and the evaluation of system security throughout the systems development life cycle.

  • Data Analysis

    NICE Framework ID: IO-WRL-001

    Responsible for analyzing data from multiple disparate sources to provide cybersecurity and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.

  • Database Administration

    NICE Framework ID: IO-WRL-002

    Responsible for administering databases and data management systems that allow for the secure storage, query, protection, and utilization of data.

  • Systems Administration

    NICE Framework ID: IO-WRL-005

    Responsible for setting up and maintaining a system or specific components of a system in adherence with organizational security policies and procedures. Includes hardware and software installation, configuration, and updates; user account management; backup and recovery management; and security control implementation.

  • Defensive Cybersecurity

    NICE Framework ID: PD-WRL-001

    Responsible for analyzing data collected from various cybersecurity defense tools to mitigate risks.

  • Incident Response

    NICE Framework ID: PD-WRL-003

    Responsible for investigating, analyzing, and responding to network cybersecurity incidents.

  • Infrastructure Support

    NICE Framework ID: PD-WRL-004

    Responsible for testing, implementing, deploying, maintaining, and administering infrastructure hardware and software for cybersecurity.

  • Vulnerability Analysis

    NICE Framework ID: PD-WRL-007

    Responsible for assessing systems and networks to identify deviations from acceptable configurations, enclave policy, or local policy. Measure effectiveness of defense-in-depth architecture against known vulnerabilities.

  • Cybercrime Investigation

    Category: Investigation
    NICE Framework ID: IN-WRL-001

    Responsible for investigating cyberspace intrusion incidents and crimes. Applies tactics, techniques, and procedures for a full range of investigative tools and processes and appropriately balances the benefits of prosecution versus intelligence gathering.

  • Exploitation Analysis

    NICE Framework ID: CE-WRL-003

    Responsible for identifying access and intelligence collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.

  • Target Analysis

    NICE Framework ID: CE-WRL-006

    Responsible for conducting target development at the system, component, and entity levels. Builds and maintains electronic target folders to include inputs from environment preparation and/or internal or external intelligence sources. Coordinates with partner target working groups and intelligence community members, and presents candidate targets for vetting and validation. Assesses and reports on damage resulting from the application of military force and coordinates federal support as required.

  • Target Network Analysis

    NICE Framework ID: CE-WRL-007

    Responsible for conducting advanced analysis of collection and open-source data to ensure target continuity; profiling targets and their activities; and developing techniques to gain target information. Determines how targets communicate, move, operate, and live based on knowledge of target technologies, digital networks, and applications.