Knowledge ID: K0923
Knowledge of operating system structures and internals
Work roles with this Knowledge
Cybersecurity Curriculum Development
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-004Responsible for developing, planning, coordinating, and evaluating cybersecurity awareness, training, or education content, methods, and techniques based on instructional needs and requirements.
Cybersecurity Instruction
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-005Responsible for developing and conducting cybersecurity awareness, training, or education.
Technology Research and Development
Category: Design and DevelopmentNICE Framework ID: DD-WRL-008Responsible for conducting software and systems engineering and software systems research to develop new capabilities with fully integrated cybersecurity. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.
Network Operations
Category: Implementation and OperationNICE Framework ID: IO-WRL-004Responsible for planning, implementing, and operating network services and systems, including hardware and virtual environments.
Digital Forensics
Category: Protection and DefenseNICE Framework ID: PD-WRL-002Responsible for analyzing digital evidence from computer security incidents to derive useful information in support of system and network vulnerability mitigation.
Cybercrime Investigation
Category: InvestigationNICE Framework ID: IN-WRL-001Responsible for investigating cyberspace intrusion incidents and crimes. Applies tactics, techniques, and procedures for a full range of investigative tools and processes and appropriately balances the benefits of prosecution versus intelligence gathering.
Digital Evidence Analysis
Category: InvestigationNICE Framework ID: IN-WRL-002Responsible for identifying, collecting, examining, and preserving digital evidence using controlled and documented analytical and investigative techniques.
Cyberspace Operations
Category: Cyberspace EffectsNICE Framework ID: CE-WRL-001Responsible for gathering evidence on criminal or foreign intelligence entities to mitigate and protect against possible or real-time threats. Conducts collection, processing, and geolocation of systems to exploit, locate, and track targets. Performs network navigation and tactical forensic analysis and executes on-net operations when directed.
Exploitation Analysis
Category: Cyberspace EffectsNICE Framework ID: CE-WRL-003Responsible for identifying access and intelligence collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.
Source: Workforce Framework for Cybersecurity (NICE Framework) (NIST SP 800-181 Rev 1) (Version: 1.0.0)