Explore KSACs by Pathway
Explore Knowledge, Skills, Abilities, and Credentials (KSACs) by IT Pathway.
10. Data Security
Label | KSAC Description | Bloom's Taxonomy Level | Cross-Cutting | |
---|---|---|---|---|
a | Describe the following terms: cipher, cryptanalysis, cryptographic algorithm, and cryptology, and describe the two basic methods (ciphers) for transforming plaintext to ciphertext. | knowledge | 2 | |
b | Describe which cryptographic protocols, tools and techniques are appropriate for a given situation. | knowledge | 2 | |
c | Implement end-to-end data security including maintaining data security using data labeling, handling and disposal, as required by policy | skill | 3 | |
d | Describe what a digital investigation is, the sources of digital evidence, and the limitations of forensics. | knowledge | 2 | |
e | Compare and contrast a variety of forensics tools. | knowledge | 4 | |
f | Use the concepts of authentication, authorization, access control, and data integrity. | skill | 2 | |
g | Implement secure storage of passwords and PII. | skill | 3 | |
h | Describe the various techniques for data erasure. | knowledge | 2 |
Credentials
Entry
- Security+
- Network+
- Cloud+
- CEH
- GSEC
- CAP
Mid-level
- CCNA
- CYSA+
Advanced
- CASP
- CISSP
- CISA
- CISM
- CRISC
- CCSP