4388
Knowledge
Knowledge of access control models (Role Based Access Control, Attribute Based Access Control).
Core KSAT for the following Work Roles
No Work Roles with Core KSAT 4388 |
Additional KSAT for the following Work Roles
Cyberspace Operators use a wide range of software applications for network navigation, tactical forensic analysis, surveillance and reconnaissance, and executing on-net operations in support of offensive cyberspace operations when directed.