Explore KSACs by Pathway
Explore Knowledge, Skills, Abilities, and Credentials (KSACs) by IT Pathway.
Cross-Cutting KSAs
KSAC Description | Bloom's Taxonomy Level | Cross-Cutting | |
---|---|---|---|
Identify and describe basic file types and demonstrate fundamental file management. | skill | 2 | Cybersecurity (1.g) Data Management (1.r) Networking (5.f) Software Development (1.k) |
Demonstrate an understanding of cloud architecture and the capabilities of services such as AWS, Azure, IBM, Oracle and Google. | knowledge | 2 | Cybersecurity (4.d) Data Management (1.p) Networking (1.a) Software Development (1.g) Machine Learning (1.i) |
Ability to install and configure software. | ability | 3 | Cybersecurity (1.d) Data Management (1.s) Networking (5.a) Software Development (1.h) |
Explain data security in terms of authentication, authorization, access and auditing. | knowledge | 3 | Networking (4.g) Software Development (1.l) |
Understand OSI model and how it applies to an example. | knowledge | 2 | Cybersecurity (6.a.5) Networking (3.b) |
Identify and apply Transmission Control Protocol and Internet Protocol (TCP/IP), Internet Protocol Version 4 (IPv4), Internet Protocol Version 6 (IPv6) applications and services (e.g., rlogin, Simple Mail Transfer Protocol [SMTP], Telecommunications Network [Telnet], File Transfer Protocol [FTP], Domain Name System [DNS], Network File System [NFS], Voice over Internet Protocol [VoIP], Internet Control Message Protocol [ICMP]). | knowledge | 2 | Software Development (1.n) |
Compare and contrast Internet connection types, network types and their features (e.g. T-Lines, fiber cables, microwaves, cellular, satellite) Layers 1 & 2 | knowledge | 2 | Cybersecurity (6.a.7) Networking (1.e) |
Apply secure network Protocols (e.g., IPSec, SNMP, SSH, DNS, TLS, SSL, TCP/IP, FTPS, HTTPS, SCP, ICMP). | ability | 2 | Cybersecurity (6.d) Networking (2.g) |
Apply SQL data manipulation language such as Select (From), Insert, Update, Delete, JOIN (inner, outer, full, left, right), Where, Group By, Order By, etc. | ability | 3 | Data Management (1.l) Software Development (1.d) |
Demonstrate fundamental programming skills including the use of variables, loops, conditional branching, and program logic. | skill | 3 | Data Management (1.m) Software Development (2.c) |
Ability to normalize a database through 3rd normal form. | ability | 3 | Data Management (2.j) Software Development (1.a) |
Differentiate common data typologies, including structured vs. unstructured, numeric vs. text, root vs. derived. | knowledge | 3 | Generalist (1.b) Data Analytics (1.d) |
Explain and demonstrate how differences in data and desired outcomes impact the appropriateness of data analysis techniques (e.g., descriptive vs. diagnostic vs. predictive vs. prescriptive). | knowledge | 2 | Generalist (1.e) Data Analytics (1.d) |
Demonstrate knowledge of probability and standard statistical distributions. | knowledge | 1 | Generalist (2.a) Data Analytics (5.a) |
Demonstrate and explain the role and importance of model validation and accuracy metrics in analytics projects, hypothesis testing, and information retrieval. | knowledge | 2 | Generalist (2.c) Data Analytics (5.d) |
Perform basic data manipulation and exploration using appropriate tools and software, including use of key Excel functions. | skill | 3 | Generalist (3.a) Machine Learning(4.f) Data Analytics (4.c) |
Create and edit simple data structures and storage, understanding how version control affects each. | skill | 2 | Generalist (3.b) Data Analytics (4.d) |
Explain the role of data visualization in discovery, communication, and decision-making. | knowledge | 3 | Generalist (4.a) Machine Learning(3.a) Data Analytics (6.a) |
Evaluate data visualization options for proper application in various situations. | ability | 4 | Generalist (4.b) Machine Learning(3.b) Data Analytics (6.c) |
Create effective static and interactive data visualizations or storytelling that employ analytics and visualization software and strategies for various audiences. | skill | 3 | Generalist (4.c) Machine Learning(3.c) Data Analytics (6.e) |
Visualize data using various types of displays including tables, dashboards, graphs, maps, and trees. | skill | 3 | Generalist (4.d) Machine Learning(3.d) Data Analytics (6.d) |
Distinguish between advanced visualizations and explain the advantages of each. | knowledge | 3 | Generalist (4.3) Machine Learning(3.e) |
Discuss techniques for creating advanced data visualizations. | knowledge | 3 | Generalist (4.f) Machine Learning(3.f) |
Apply the principles of color, composition, and hierarchy to design. | skill | 3 | Generalist (4.g) Machine Learning(3.g) |
Properly define a problem in context, use appropriate data, and deliver a compelling visualization to explain or answer a question. | ability | 3 | Generalist (4.h) Machine Learning(3.h) Data Analytics (6.f) |
Understanding of ADA/508 compliance for accessibility. | knowledge | 1 | Generalist (4.i) Machine Learning(3.i) |
Identify how global legal, policy and/or ethical constraints might impact data analyses. | knowledge | 2 | Generalist (5.a) Machine Learning(5.a) Data Analytics (8.a) |
Identify the established ethical and legal issues in data management facing organizations. | knowledge | 2 | Data Management (3.e) Generalist (5.b) Machine Learning(5.b) Data Analytics (8.b) |
Explain how ethical, compliance, and legal issues should/must be considered in data driven decision making. | knowledge | 1 | Generalist (5.c) Machine Learning(5.c) Data Analytics (8.c) |
Explain the importance of personal privacy issues related to the collection and usage of data. | knowledge | 2 | Data Management (3.f) Generalist (5.d) Machine Learning(5.g) Data Analytics (8.i) |
Explain the important issues around data governance. | knowledge | 2 | Generalist (5.e) Machine Learning(5.d) Data Analytics (1.b) |
Describe the fundamental cloud components (e.g., shared or dedicated processing, storage, memory, networking, hypervisor). | knowledge | 2 | Netowrking (1.b) Cybersecurity (4.a) |
Differentiate between public, private, and hybrid clouds. | knowledge | 2 | Netowrking (1.c) Cybersecurity (4.b) |
Identify common breaches and threats in the cloud environment. | knowledge | 1 | Netowrking (1.d) Cybersecurity (4.f) |
Instantiate a small computing environment in a cloud service. | ability | 3 | Netowrking (1.e) Cybersecurity (4.e) |
Explain the pros and cons of on-premises vs cloud-based analytics solutions. | knowledge | 2 | Netowrking (1.f) Data Analytics (2.c) |
Understand how to set security configurations in a cloud environment. | knowledge | 2 | Netowrking (1.h) Data Analytics (4.g) |
Understand the concept of opening/extending the network perimeter and the role of a cloud access security broker (CASB). | knowledge | 2 | Netowrking (1.i) Cybersecurity (8.u) |
Explain DNS traffic. | knowledge | 2 | Netowrking (3.a) Cybersecurity (2.k) |
Identify the layers of the OSI Model. | knowledge | 2 | Netowrking (3.c) Cybersecurity (2.c) |
Summarize the responsibilities of each layer of the OSI Model. | knowledge | 2 | Netowrking (3.d) Cybersecurity (2.d) |
Explain how the OSI Model is applied in networking. | knowledge | 3 | Netowrking (3.e) Cybersecurity (2.e) |
Configure IPv4 and IPv6 classful subnets. | skill | 1 | Netowrking (3.f) Cybersecurity (2.f) |
Compare public IP addresses and private IP addresses. | knowledge | 2 | Netowrking (3.g) Cybersecurity (2.g) |
Identify IPv4 address network ID (Class A, Class B, Class C). | knowledge | 2 | Netowrking (3.h) Cybersecurity (2.h) |
Interpret classless network ID (CIDR block notation). | knowledge | 2 | Netowrking (3.i) Cybersecurity (2.i) |
Explain domain naming conventions (UNC path, FQDN, host name). | knowledge | 3 | Netowrking (3.j) Cybersecurity (2.l) |
Compare Network Address Translation and Port Address Translation (NAT vs PAT). | knowledge | 2 | Netowrking (3.k) Cybersecurity (2.n) |
Draw a network diagram. | skill | 3 | Netowrking (3.i) Cybersecurity (2.o) |
Analyze the output from networking utilities (e.g. Netstat, Tracert, Traceroute, Ping IPConfig, IFConfig). | skill | 3 | Netowrking (3.m) Cybersecurity (2.p) |
Discuss network software integration (client software (e.g. Windows 10 or Ubuntu) and server software). | ability | 3 | Netowrking (3.n) Cybersecurity (2.q) |
Discuss network hardware integration (workstations, desktop, mobile devices). | knowledge | 2 | Netowrking (3.o) Cybersecurity (2.r) |
Communicate best practices for troubleshooting networking issues (layers 1-2 at HS level) (7-step model). | knowledge | 3 | Netowrking (3.p) Cybersecurity (2.s) |
Identify common coding errors that lead to insecure programs (e.g., buffer overflows, memory leaks, malicious code) and apply strategies for avoiding such errors. | skill | 3 | Software Development (10.a) Cybersecurity (11.d) |
Apply the principles of least privilege, defensive programming, and fail-safe defaults. | ability | 3 | Software Development (10.d) Cybersecurity (11.e) |
Write code with logging capabilities. | skill | 2 | Software Development (10.f) Cybersecurity (11.f) |
Understand basics of securing web apps - SQL Injection and other input validation. | knowledge | 2 | Software Development (10.h) Cybersecurity (11.i) |
Identify and differentiate structured vs unstructured data. | knowledge | 2 | Data Management (1.g) Software Development (1.o) |
Design, implement, test, and debug a program that uses each of the following fundamental programming constructs: basic computation, simple I/O, standard conditional and iterative structures. | skill | 3 | Software Development (2.d) Cybersecurity (3.b) |
Write a program that uses file I/O to provide persistence across multiple executions. | skill | 2 | Software Development (2.g) Cybersecurity (3.c) |
Write programs that use each of the following data structures: arrays, records/structs, strings, linked lists, stacks, queues, sets, and maps. | skill | 3 | Software Development (3.c) Cybersecurity (3.f) |
Choose the appropriate data structure for modeling a given problem. | skill | 3 | Software Development (3.f) Cybersecurity (11.a) |
Implement a divide-and-conquer algorithm for solving a problem. | skill | 3 | Software Development (5.g) Cybersecurity (11.b) |
Implement a coherent abstract data type, with loose coupling between components and behaviors. | skill | 3 | Software Development (5.i) Cybersecurity (11.c) |
Explain core statistical inference concepts (for example, deriving relevant hypotheses, evaluating the hypotheses, and prediction with uncertainty). | knowledge | 2 | Machine Learning (1.a) Data Analytics (5.b) |
Explain core probability concepts (e.g., random variables, key distributions, conditional probability, Bayes theorem). | knowledge | 2 | Machine Learning (1.c) Data Analytics (5.e) |
Identify and describe several SDLC models (e.g., waterfall, Agile). | knowledge | 2 | Machine Learning (1.f) Data Analytics (7.c) |
Provide rationale for selecting the appropriate sampling methodology. | skill | 3 | Machine Learning (4.g) Data Analytics (5.j) |
Present real world examples of data bias and the unintended consequences of using analytics, machine learning, and AI in making decisions. | knowledge | 2 | Machine Learning (5.e) Data Analytics (8.e) |
Discuss the importance of provenance, transparency, and explainability in data analysis and the ability to build trust. | knowledge | 2 | Machine Learning (5.f) Data Analytics (8.d) |
Explain the limitations and potential unintended effects of data analysis when such algorithms encounter new scenarios. | knowledge | 2 | Machine Learning (5.i) Data Analytics (8.j) |
Explain individual and data bias and the implications each has in data analysis. | knowledge | 3 | Data Management (3.j) Generalist(5.f) Machine Learning (5.k) |
Describe the implications of data architecture on data processing such as data fabric. | knowledge | 2 | Data Management (1.n) Data Analytics (2.d) |