| 1.00 | Evaluate Information Security. | 20% | C5 Evaluate procedural |
| 1.01 | Evaluate and define information security needs. | 7% | - |
| 1.02 | Authenticate and authorize access to information. | 7% | - |
| 1.03 | Organize and protect information stored in a file system. | 6% | - |
| 2.00 | Apply Security Algorithms. | 15% | C3 Apply Procedural |
| 2.01 | Analyze and improve cryptography algorithms. | 7% | - |
| 2.02 | Apply various encryption measures to secure information. | 8% | - |
| 3.00 | Analyze Data Abstraction. | 20% | B4 Analyze Conceptual |
| 3.01 | Analyze network traffic at varying levels of abstraction. | 10% | - |
| 3.02 | Recognize patterns in traffic flow to identify cybersecurity events. | 5% | - |
| 3.03 | Recognize signatures and symptoms of malware to identify an attack. | 5% | - |
| 4.00 | Evaluate Computer Systems and Networks. | 20% | C5 Evaluate procedural |
| 4.01 | Manage operating system resources necessary for network configuration. | 7% | - |
| 4.02 | Select and implement protection measures to secure computers and devices on a network. | 6% | - |
| 4.03 | Monitor network activity and traffic flow. | 7% | - |
| 5.00 | Analyze Threat Investigation. | 25% | C4 Analyze Procedural |
| 5.01 | Analyze the evidence of a cybersecurity event. | 10% | - |
| 5.02 | Identify system vulnerabilities that permitted an attack and the user actions that can secure the system. | 10% | - |
| 5.03 | Understand and use investigative techniques of digital forensics. | 5% | - |