Knowledge ID: K0955

Knowledge of penetration testing principles and practices

Work roles with this Knowledge

  • Security Control Assessment

    NICE Framework ID: OG-WRL-012

    Responsible for conducting independent comprehensive assessments of management, operational, and technical security controls and control enhancements employed within or inherited by a system to determine their overall effectiveness.

  • Systems Authorization

    NICE Framework ID: OG-WRL-013

    Responsible for operating an information system at an acceptable level of risk to organizational operations, organizational assets, individuals, other organizations, and the nation.

  • Systems Security Management

    NICE Framework ID: OG-WRL-014

    Responsible for managing the cybersecurity of a program, organization, system, or enclave.

  • Secure Software Development

    NICE Framework ID: DD-WRL-003

    Responsible for developing, creating, modifying, and maintaining computer applications, software, or specialized utility programs.

  • Software Security Assessment

    NICE Framework ID: DD-WRL-005

    Responsible for analyzing the security of new or existing computer applications, software, or specialized utility programs and delivering actionable results.

  • Technology Research and Development

    NICE Framework ID: DD-WRL-008

    Responsible for conducting software and systems engineering and software systems research to develop new capabilities with fully integrated cybersecurity. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.

  • Defensive Cybersecurity

    NICE Framework ID: PD-WRL-001

    Responsible for analyzing data collected from various cybersecurity defense tools to mitigate risks.

  • Vulnerability Analysis

    NICE Framework ID: PD-WRL-007

    Responsible for assessing systems and networks to identify deviations from acceptable configurations, enclave policy, or local policy. Measure effectiveness of defense-in-depth architecture against known vulnerabilities.