Explore KSACs by Pathway

In late 2025, the Partnership pulled together members of industry from across tech to share how the in-demand skillsets for entry-level roles in their fields have changed in the last two years. The Knowledge, Skills & Abilities and Credentials (KSACs) below reflect their feedback on entry-level expectations, especially in a tech workplace increasingly shaped by AI.

8. Network Security & Engineering

Label KSAC Description Bloom's Taxonomy Level
a Apply networking fundamentals to infrastructure in an organization including Defense in Depth skill 3
b Select network storage interfaces (e.g., fiber channel, Internet Small Computer System Interface [iSCSI], Fiber Channel over Ethernet [FCoE], Serial Attached SCSI [SAS], Network File Systems [NFS], Network Attached Storage/Server Message Blocks [NAS/SMB]). skill 3
c Setup and maintain secure roles and system management techniques (e.g., password, group, and user privilege policies and monitoring). skill 4
d Demonstrate an understanding of network security devices (IDS, IPS, FW, NGFW, WAF, CDN, etc.). kowledge 3
e Design a secure small office/home office (SOHO) network skill 3
f Apply network protocols (e.g., IPSec, SNMP, SSH, DNS, TLS, SSL, TCP/IP, FTPS, HTTPS, SCP, ICMP, etc.) and their impact on security skill 3
g Apply Ipv4 and IPv6 securely skill 2
h Apply wireless security configurations (e.g., Disable SSID broadcast, TKIP, CCMP, antenna placement, power level controls). skill 2
i Apply the principles of secure network design (e.g., DMZ, subnetting, NAT/PAT, remote access, telephony, virtualization, honeypots). skill 3
j Implement port security, including an undersanding of port scanning and network traffic monitoring skill 2
k Understand how to mitigate network threats (e.g., flood guards, loop protection, implicit deny, network separation, log analysis, Unified Threat Management, peripheral and removable media). knowledge 2
l Describe the characteristics and uses of networks, network devices, and components knowledge 2
m Design a basic network diagram given a specific need and set of hosts. skill 3
n Install and configure network security mechanisms (firewalls, switches, load balancers, proxies, security gateways, spam filters, IDS/IPS, VPN, etc.). skill 3
o Understand and use basic network assessment tools (e.g. Wireshark, NMAP, port scanner) knowledge 3
p Understand, setup, and maintain the key cybersecurity principles in network defense (defense in depth, minimizing exposure, etc.). skill 4
q Understand the process of vulnerability identification and assessment. knowledge 2
r Understand, setup and maintain user roles and system management techniques (e.g., password, groups, user privilege policies and monitoring). knowledge 2
s Monitor and manage a network using Unified Threat Management (UTM) skill 3
t Manage PKI and certificates (transport encryption, non-repudiation, hashing, digital signatures). skill 2
u Understand the concept of opening/extending the network perimeter and the role of a cloud access security broker (CASB). knowledge 2
v Identify threats using discovery tools and utilities (e.g., protocol analyzer, vulnerability scanner, honeypots, honeynets, port scanner). ability 3

Credentials

Entry

Mid-level