Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud).
Core KSAT for the following Work Roles
No Work Roles with Core KSAT 1136A
Additional KSAT for the following Work Roles
Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs.
Develops and conducts training or education of personnel within cyber domain.
Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.
Conducts evaluations of an IT program or its individual components, to determine compliance with published standards.
Responsible for the management and administration of processes and tools that enable the organization to identify, document, and access intellectual capital and information content.
Develops and oversees privacy compliance program and privacy program staff, supporting privacy compliance needs of privacy and security executives and their teams.
Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes.
Manages and identifies program high-level technical specifications, which may include application design, cloud computing strategy and adoption, and integration of software applications into a functioning system to meet requirements.