Explore KSACs by Pathway

Explore Knowledge, Skills, Abilities, and Credentials (KSACs) by IT Pathway.

9. Systems Security

Label KSAC Description Bloom's Taxonomy Level Cross-Cutting
a Explain the objectives and functions of modern operating systems, identify potential threats to operating systems and list the security features designed to guard against them. knowledge 2
b Discuss networked, client-server, distributed operating systems and how they differ from single user operating systems. knowledge 2
c Understand the role and importance of physical security, including proximity securiity (proximity readers, access lists, biometrics, and protected distribution. knowledge 2
d Perform authentication control skill 3
e Imolement a life cycle methodology including continuous monitoring and end of life managemnt skill 3
f Use the kernel and user mode for executing progams in an operating system. skill 4
g Describe the need and the potential run-time problems arising from the concurrent operation of separate tasks. knowledge 2
h Summarize techniques for achieving synchronization in an operating system (e.g., describe how to implement a semaphore using OS primitives). knowledge 4
i Describe the difference between processes and threads. knowledge 2
j Summarize the principles of virtual memory as applied to caching and paging. knowledge 4
k Describe the role of identify and access management to manage who can access what in an neterprise knowledge
l Implement authorization control (e.g., least privilege, separation of duties, mandatory access, rule-based access control, role-based access control), so managing priveleged access skill 3
m Understand authentication techniques (e.g., tokens, common access card, smart card, multifactor authentication (MFA), single sign-on (SSO), biometrics, personal identification verification card, username, federation, transitive trust/authentication). knowledge 2
n Understand security implications of third party connectivity and access. knowledge 2
o Discuss hypervisors and the need for them. knowledge 2
p Create, configure, and use virtual machines. skill 3



  1. Security+
  2. Network+
  3. Cloud+
  4. CEH
  5. GSEC
  6. CAP


  1. CCNA
  2. CYSA+


  1. CASP
  2. CISSP
  3. CISA
  4. CISM
  5. CRISC
  6. CCSP