Explore KSACs by Pathway
Explore Knowledge, Skills, Abilities, and Credentials (KSACs) by IT Pathway.
9. Systems Security
Label | KSAC Description | Bloom's Taxonomy Level | Cross-Cutting | |
---|---|---|---|---|
a | Explain the objectives and functions of modern operating systems, identify potential threats to operating systems and list the security features designed to guard against them. | knowledge | 2 | |
b | Discuss networked, client-server, distributed operating systems and how they differ from single user operating systems. | knowledge | 2 | |
c | Understand the role and importance of physical security, including proximity securiity (proximity readers, access lists, biometrics, and protected distribution. | knowledge | 2 | |
d | Perform authentication control | skill | 3 | |
e | Imolement a life cycle methodology including continuous monitoring and end of life managemnt | skill | 3 | |
f | Use the kernel and user mode for executing progams in an operating system. | skill | 4 | |
g | Describe the need and the potential run-time problems arising from the concurrent operation of separate tasks. | knowledge | 2 | |
h | Summarize techniques for achieving synchronization in an operating system (e.g., describe how to implement a semaphore using OS primitives). | knowledge | 4 | |
i | Describe the difference between processes and threads. | knowledge | 2 | |
j | Summarize the principles of virtual memory as applied to caching and paging. | knowledge | 4 | |
k | Describe the role of identify and access management to manage who can access what in an neterprise | knowledge | ||
l | Implement authorization control (e.g., least privilege, separation of duties, mandatory access, rule-based access control, role-based access control), so managing priveleged access | skill | 3 | |
m | Understand authentication techniques (e.g., tokens, common access card, smart card, multifactor authentication (MFA), single sign-on (SSO), biometrics, personal identification verification card, username, federation, transitive trust/authentication). | knowledge | 2 | |
n | Understand security implications of third party connectivity and access. | knowledge | 2 | |
o | Discuss hypervisors and the need for them. | knowledge | 2 | |
p | Create, configure, and use virtual machines. | skill | 3 |
Credentials
Entry
- Security+
- Network+
- Cloud+
- CEH
- GSEC
- CAP
Mid-level
- CCNA
- CYSA+
Advanced
- CASP
- CISSP
- CISA
- CISM
- CRISC
- CCSP