Explore KSACs by Pathway
Explore Knowledge, Skills, Abilities, and Credentials (KSACs) by IT Pathway.
Cross-Cutting KSAs
| KSAC Description | Bloom's Taxonomy Level | Cross-Cutting | |
|---|---|---|---|
| Identify and describe basic file types and demonstrate fundamental file management. | skill | 2 | Cybersecurity (1.g) Data Management (1.r) Networking (5.f) Software Development (1.k) |
| Demonstrate an understanding of cloud architecture and the capabilities of services such as AWS, Azure, IBM, Oracle and Google. | knowledge | 2 | Cybersecurity (4.d) Data Management (1.p) Networking (1.a) Software Development (1.g) Machine Learning (1.i) |
| Ability to install and configure software. | ability | 3 | Cybersecurity (1.d) Data Management (1.s) Networking (5.a) Software Development (1.h) |
| Explain data security in terms of authentication, authorization, access and auditing. | knowledge | 3 | Networking (4.g) Software Development (1.l) |
| Understand OSI model and how it applies to an example. | knowledge | 2 | Cybersecurity (6.a.5) Networking (3.b) |
| Identify and apply Transmission Control Protocol and Internet Protocol (TCP/IP), Internet Protocol Version 4 (IPv4), Internet Protocol Version 6 (IPv6) applications and services (e.g., rlogin, Simple Mail Transfer Protocol [SMTP], Telecommunications Network [Telnet], File Transfer Protocol [FTP], Domain Name System [DNS], Network File System [NFS], Voice over Internet Protocol [VoIP], Internet Control Message Protocol [ICMP]). | knowledge | 2 | Software Development (1.n) |
| Compare and contrast Internet connection types, network types and their features (e.g. T-Lines, fiber cables, microwaves, cellular, satellite) Layers 1 & 2 | knowledge | 2 | Cybersecurity (6.a.7) Networking (1.e) |
| Apply secure network Protocols (e.g., IPSec, SNMP, SSH, DNS, TLS, SSL, TCP/IP, FTPS, HTTPS, SCP, ICMP). | ability | 2 | Cybersecurity (6.d) Networking (2.g) |
| Apply SQL data manipulation language such as Select (From), Insert, Update, Delete, JOIN (inner, outer, full, left, right), Where, Group By, Order By, etc. | ability | 3 | Data Management (1.l) Software Development (1.d) |
| Demonstrate fundamental programming skills including the use of variables, loops, conditional branching, and program logic. | skill | 3 | Data Management (1.m) Software Development (2.c) |
| Ability to normalize a database through 3rd normal form. | ability | 3 | Data Management (2.j) Software Development (1.a) |
| Differentiate common data typologies, including structured vs. unstructured, numeric vs. text, root vs. derived. | knowledge | 3 | Generalist (1.b) Data Analytics (1.d) |
| Explain and demonstrate how differences in data and desired outcomes impact the appropriateness of data analysis techniques (e.g., descriptive vs. diagnostic vs. predictive vs. prescriptive). | knowledge | 2 | Generalist (1.e) Data Analytics (1.d) |
| Demonstrate knowledge of probability and standard statistical distributions. | knowledge | 1 | Generalist (2.a) Data Analytics (5.a) |
| Demonstrate and explain the role and importance of model validation and accuracy metrics in analytics projects, hypothesis testing, and information retrieval. | knowledge | 2 | Generalist (2.c) Data Analytics (5.d) |
| Perform basic data manipulation and exploration using appropriate tools and software, including use of key Excel functions. | skill | 3 | Generalist (3.a) Machine Learning(4.f) Data Analytics (4.c) |
| Create and edit simple data structures and storage, understanding how version control affects each. | skill | 2 | Generalist (3.b) Data Analytics (4.d) |
| Explain the role of data visualization in discovery, communication, and decision-making. | knowledge | 3 | Generalist (4.a) Machine Learning(3.a) Data Analytics (6.a) |
| Evaluate data visualization options for proper application in various situations. | ability | 4 | Generalist (4.b) Machine Learning(3.b) Data Analytics (6.c) |
| Create effective static and interactive data visualizations or storytelling that employ analytics and visualization software and strategies for various audiences. | skill | 3 | Generalist (4.c) Machine Learning(3.c) Data Analytics (6.e) |
| Visualize data using various types of displays including tables, dashboards, graphs, maps, and trees. | skill | 3 | Generalist (4.d) Machine Learning(3.d) Data Analytics (6.d) |
| Distinguish between advanced visualizations and explain the advantages of each. | knowledge | 3 | Generalist (4.3) Machine Learning(3.e) |
| Discuss techniques for creating advanced data visualizations. | knowledge | 3 | Generalist (4.f) Machine Learning(3.f) |
| Apply the principles of color, composition, and hierarchy to design. | skill | 3 | Generalist (4.g) Machine Learning(3.g) |
| Properly define a problem in context, use appropriate data, and deliver a compelling visualization to explain or answer a question. | ability | 3 | Generalist (4.h) Machine Learning(3.h) Data Analytics (6.f) |
| Understanding of ADA/508 compliance for accessibility. | knowledge | 1 | Generalist (4.i) Machine Learning(3.i) |
| Identify how global legal, policy and/or ethical constraints might impact data analyses. | knowledge | 2 | Generalist (5.a) Machine Learning(5.a) Data Analytics (8.a) |
| Identify the established ethical and legal issues in data management facing organizations. | knowledge | 2 | Data Management (3.e) Generalist (5.b) Machine Learning(5.b) Data Analytics (8.b) |
| Explain how ethical, compliance, and legal issues should/must be considered in data driven decision making. | knowledge | 1 | Generalist (5.c) Machine Learning(5.c) Data Analytics (8.c) |
| Explain the importance of personal privacy issues related to the collection and usage of data. | knowledge | 2 | Data Management (3.f) Generalist (5.d) Machine Learning(5.g) Data Analytics (8.i) |
| Explain the important issues around data governance. | knowledge | 2 | Generalist (5.e) Machine Learning(5.d) Data Analytics (1.b) |
| Describe the fundamental cloud components (e.g., shared or dedicated processing, storage, memory, networking, hypervisor). | knowledge | 2 | Netowrking (1.b) Cybersecurity (4.a) |
| Differentiate between public, private, and hybrid clouds. | knowledge | 2 | Netowrking (1.c) Cybersecurity (4.b) |
| Identify common breaches and threats in the cloud environment. | knowledge | 1 | Netowrking (1.d) Cybersecurity (4.f) |
| Instantiate a small computing environment in a cloud service. | ability | 3 | Netowrking (1.e) Cybersecurity (4.e) |
| Explain the pros and cons of on-premises vs cloud-based analytics solutions. | knowledge | 2 | Netowrking (1.f) Data Analytics (2.c) |
| Understand how to set security configurations in a cloud environment. | knowledge | 2 | Netowrking (1.h) Data Analytics (4.g) |
| Understand the concept of opening/extending the network perimeter and the role of a cloud access security broker (CASB). | knowledge | 2 | Netowrking (1.i) Cybersecurity (8.u) |
| Explain DNS traffic. | knowledge | 2 | Netowrking (3.a) Cybersecurity (2.k) |
| Identify the layers of the OSI Model. | knowledge | 2 | Netowrking (3.c) Cybersecurity (2.c) |
| Summarize the responsibilities of each layer of the OSI Model. | knowledge | 2 | Netowrking (3.d) Cybersecurity (2.d) |
| Explain how the OSI Model is applied in networking. | knowledge | 3 | Netowrking (3.e) Cybersecurity (2.e) |
| Configure IPv4 and IPv6 classful subnets. | skill | 1 | Netowrking (3.f) Cybersecurity (2.f) |
| Compare public IP addresses and private IP addresses. | knowledge | 2 | Netowrking (3.g) Cybersecurity (2.g) |
| Identify IPv4 address network ID (Class A, Class B, Class C). | knowledge | 2 | Netowrking (3.h) Cybersecurity (2.h) |
| Interpret classless network ID (CIDR block notation). | knowledge | 2 | Netowrking (3.i) Cybersecurity (2.i) |
| Explain domain naming conventions (UNC path, FQDN, host name). | knowledge | 3 | Netowrking (3.j) Cybersecurity (2.l) |
| Compare Network Address Translation and Port Address Translation (NAT vs PAT). | knowledge | 2 | Netowrking (3.k) Cybersecurity (2.n) |
| Draw a network diagram. | skill | 3 | Netowrking (3.i) Cybersecurity (2.o) |
| Analyze the output from networking utilities (e.g. Netstat, Tracert, Traceroute, Ping IPConfig, IFConfig). | skill | 3 | Netowrking (3.m) Cybersecurity (2.p) |
| Discuss network software integration (client software (e.g. Windows 10 or Ubuntu) and server software). | ability | 3 | Netowrking (3.n) Cybersecurity (2.q) |
| Discuss network hardware integration (workstations, desktop, mobile devices). | knowledge | 2 | Netowrking (3.o) Cybersecurity (2.r) |
| Communicate best practices for troubleshooting networking issues (layers 1-2 at HS level) (7-step model). | knowledge | 3 | Netowrking (3.p) Cybersecurity (2.s) |
| Identify common coding errors that lead to insecure programs (e.g., buffer overflows, memory leaks, malicious code) and apply strategies for avoiding such errors. | skill | 3 | Software Development (10.a) Cybersecurity (11.d) |
| Apply the principles of least privilege, defensive programming, and fail-safe defaults. | ability | 3 | Software Development (10.d) Cybersecurity (11.e) |
| Write code with logging capabilities. | skill | 2 | Software Development (10.f) Cybersecurity (11.f) |
| Understand basics of securing web apps - SQL Injection and other input validation. | knowledge | 2 | Software Development (10.h) Cybersecurity (11.i) |
| Identify and differentiate structured vs unstructured data. | knowledge | 2 | Data Management (1.g) Software Development (1.o) |
| Design, implement, test, and debug a program that uses each of the following fundamental programming constructs: basic computation, simple I/O, standard conditional and iterative structures. | skill | 3 | Software Development (2.d) Cybersecurity (3.b) |
| Write a program that uses file I/O to provide persistence across multiple executions. | skill | 2 | Software Development (2.g) Cybersecurity (3.c) |
| Write programs that use each of the following data structures: arrays, records/structs, strings, linked lists, stacks, queues, sets, and maps. | skill | 3 | Software Development (3.c) Cybersecurity (3.f) |
| Choose the appropriate data structure for modeling a given problem. | skill | 3 | Software Development (3.f) Cybersecurity (11.a) |
| Implement a divide-and-conquer algorithm for solving a problem. | skill | 3 | Software Development (5.g) Cybersecurity (11.b) |
| Implement a coherent abstract data type, with loose coupling between components and behaviors. | skill | 3 | Software Development (5.i) Cybersecurity (11.c) |
| Explain core statistical inference concepts (for example, deriving relevant hypotheses, evaluating the hypotheses, and prediction with uncertainty). | knowledge | 2 | Machine Learning (1.a) Data Analytics (5.b) |
| Explain core probability concepts (e.g., random variables, key distributions, conditional probability, Bayes theorem). | knowledge | 2 | Machine Learning (1.c) Data Analytics (5.e) |
| Identify and describe several SDLC models (e.g., waterfall, Agile). | knowledge | 2 | Machine Learning (1.f) Data Analytics (7.c) |
| Provide rationale for selecting the appropriate sampling methodology. | skill | 3 | Machine Learning (4.g) Data Analytics (5.j) |
| Present real world examples of data bias and the unintended consequences of using analytics, machine learning, and AI in making decisions. | knowledge | 2 | Machine Learning (5.e) Data Analytics (8.e) |
| Discuss the importance of provenance, transparency, and explainability in data analysis and the ability to build trust. | knowledge | 2 | Machine Learning (5.f) Data Analytics (8.d) |
| Explain the limitations and potential unintended effects of data analysis when such algorithms encounter new scenarios. | knowledge | 2 | Machine Learning (5.i) Data Analytics (8.j) |
| Explain individual and data bias and the implications each has in data analysis. | knowledge | 3 | Data Management (3.j) Generalist(5.f) Machine Learning (5.k) |
| Describe the implications of data architecture on data processing such as data fabric. | knowledge | 2 | Data Management (1.n) Data Analytics (2.d) |
