NCAE Mapping Hub
Cyber Effects (CE) DCWF 463

Host Analyst

A Host Analyst (HA) will have knowledge of various system configurations encountered. This work role also performs analysis using built-in tools and capabilities. A Host Analyst will have knowledge of system services and the security and configuration of them, as well as knowledge of file systems, permissions, and operation system configurations. The Host Analyst conducts analysis using built-in tools and capabilities.

Tasks

The concrete work activities defined for this role in the DCWF v5.1 spreadsheet. Core tasks are required for the role; additional tasks are associated but not mandatory.

Knowledge, Skills, and Abilities

KSA statements define what a person filling this role knows or can do. "Knowledge" is what they must know, "Skill" is what they can perform, and "Ability" is a durable capacity they bring to the work.

EWU courses that develop this role

Related lectures and labs

Lectures

Labs

Skill drills that practice this role

Exam questions from CSCD 240. Click any to work it.

Capture-the-Flag challenges that exercise this role

Where Am I?
00 Navigation & Files (10 points)
There's No Place Like...
00 Navigation & Files (10 points)
Now You See Me...
00 Navigation & Files (10 points)
Reveal the Invisible
00 Navigation & Files (10 points)
Empty Rooms Only
00 Navigation & Files (10 points)
Clone Wars
00 Navigation & Files (10 points)
Two Jobs, One Command
00 Navigation & Files (10 points)
It All Starts From Here
00 Navigation & Files (10 points)
Create From Nothing
00 Navigation & Files (10 points)
Moving Between Rooms
00 Navigation & Files (10 points)
Two Dots, Twice
00 Navigation & Files (10 points)
Read It Out Loud
00 Navigation & Files (10 points)
System Snapshot
00 Navigation & Files (10 points)
Build the Whole Path
00 Navigation & Files (15 points)
Read the Listing
00 Navigation & Files (15 points)
The Nuclear Option
00 Navigation & Files (15 points)
Up and Over
00 Navigation & Files (20 points)
The Root Ceiling
00 Navigation & Files (20 points)
Relative Hop
00 Navigation & Files (25 points)
Three Circles of Trust
02 Permissions (10 points)
Decode 644
02 Permissions (10 points)
Decode 700
02 Permissions (10 points)
Give Yourself Execute
02 Permissions (10 points)
Tighten the Screws
02 Permissions (10 points)
Apply to Everything
02 Permissions (10 points)
Inspect the Container
02 Permissions (15 points)
The Full Dossier
02 Permissions (15 points)
Octal Arithmetic
02 Permissions (20 points)
The Lazy Fix
02 Permissions (20 points)
Decode 755
02 Permissions (25 points)
Set It Exactly
02 Permissions (25 points)
It's Not About the File
02 Permissions (30 points)
Scalpel vs Sledgehammer
02 Permissions (50 points)
The Overwriter
03 I/O & Pipelines (10 points)
Don't Erase, Just Add
03 I/O & Pipelines (10 points)
Just the Lines, Please
03 I/O & Pipelines (10 points)
Stream Number 2
03 I/O & Pipelines (10 points)
The Error Stream
03 I/O & Pipelines (10 points)
The Input Stream
03 I/O & Pipelines (10 points)
The Output Stream
03 I/O & Pipelines (10 points)

NCAE CyberGames scoreboard errors for this role

Other roles in this element