Use this quick start guide to collect all the information about CompTIA CySA+ (CS0-002) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the CS0-002 CompTIA Cybersecurity Analyst exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual CompTIA CySA Plus certification exam.
The CompTIA CySA+ certification is mainly targeted to those candidates who want to build their career in Cybersecurity domain. The CompTIA Cybersecurity Analyst (CySA+) exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of CompTIA CySA Plus.
CompTIA CySA+ Exam Summary:
Exam Name | CompTIA Cybersecurity Analyst (CySA+) |
Exam Code | CS0-002 |
Exam Price | $392 (USD) |
Duration | 165 mins |
Number of Questions | 85 |
Passing Score | 750 / 900 |
Books / Training |
eLearning with CompTIA CertMaster Learn for CySA+ Interactive Labs with CompTIA CertMaster Labs for CySA+ |
Schedule Exam | Pearson VUE |
Sample Questions | CompTIA CySA+ Sample Questions |
Practice Exam | CompTIA CS0-002 Certification Practice Exam |
CompTIA CS0-002 Exam Syllabus Topics:
Topic | Details |
---|---|
Threat and Vulnerability Management - 22% |
|
Explain the importance of threat data and intelligence. |
1. Intelligence sources
2. Confidence levels
4. Threat classification
5. Threat actors
6. Intelligence cycle
7. Commodity malware
|
Given a scenario, utilize threat intelligence to support organizational security. |
1. Attack frameworks
2. Threat research
3. Threat modeling methodologies
3. Threat intelligence sharing with supported functions
|
Given a scenario, perform vulnerability management activities. |
1. Vulnerability identification
2. Validation
3. Remediation/mitigation
4. Scanning parameters and criteria
5. Inhibitors to remediation
|
Given a scenario, analyze the output from common vulnerability assessment tools. |
1. Web application scanner
2. Infrastructure vulnerability scanner
3. Software assessment tools and techniques
4. Enumeration
5. Wireless assessment tools
6. Cloud infrastructure assessment tools
|
Explain the threats and vulnerabilities associated with specialized technology. |
1. Mobile 2. Internet of Things (IoT) 3. Embedded 4. Real-time operating system (RTOS) 5. System-on-Chip (SoC) 6. Field programmable gate array (FPGA) 7. Physical access control 8. Building automation systems 9. Vehicles and drones
10. Workflow and process automation systems
|
Explain the threats and vulnerabilities associated with operating in the cloud. |
1. Cloud service models
2. Cloud deployment models
3. Function as a Service (FaaS)/serverless architecture
|
Given a scenario, implement controls to mitigate attacks and software vulnerabilities. |
1. Attack types
2. Vulnerabilities
|
Software and Systems Security - 18% |
|
Given a scenario, apply security solutions for infrastructure management. |
1. Cloud vs. on-premises 2. Asset management
3. Segmentation
4. Network architecture
5. Change management
7. Containerization
9. Cloud access security broker (CASB) |
Explain software assurance best practices. |
1. Platforms Mobile Web application Client/server Embedded System-on-chip (SoC) Firmware 2. Software development life cycle (SDLC) integration 3. DevSecOps 4. Software assessment methods User acceptance testing Stress test application Security regression testing Code review 5. Secure coding best practices Input validation Output encoding Session management Authentication Data protection Parameterized queries 6. Static analysis tools 7. Dynamic analysis tools 8. Formal methods for verification of critical software 9. Service-oriented architecture
|
Explain hardware assurance best practices. |
1. Hardware root of trust Trusted platform module (TPM) Hardware security module (HSM) 2. eFuse 3. Unified Extensible Firmware Interface (UEFI) 4. Trusted foundry 5. Secure processing
6. Anti-tamper |
Security Operations and Monitoring - 25% |
|
Given a scenario, analyze data as part of security monitoring activities. |
1. Heuristics 2. Trend analysis 3. Endpoint
4. Network
5. Log review
6. Impact analysis
7. Security information and event management (SIEM) review
8. Query writing
9. E-mail analysis
|
Given a scenario, implement configuration changes to existing controls to improve security. |
1. Permissions 2. Whitelisting 3. Blacklisting 4. Firewall 5. Intrusion prevention system (IPS) rules 6. Data loss prevention (DLP) 7. Endpoint detection and response (EDR) 8. Network access control (NAC) 9. Sinkholing 10. Malware signatures
11. Sandboxing |
Explain the importance of proactive threat hunting. |
1. Establishing a hypothesis 2. Profiling threat actors and activities 3. Threat hunting tactics
4. Reducing the attack surface area |
Compare and contrast automation concepts and technologies. |
1. Workflow orchestration
2. Scripting
9. Continuous integration |
Incident Response - 22% |
|
Explain the importance of the incident response process. |
1. Communication plan
2. Response coordination with relevant entities
3. Factors contributing to data criticality
|
Given a scenario, apply the appropriate incident response procedure. |
1. Preparation
2. Detection and analysis
3. Containment
4. Eradication and recovery
5. Post-incident activities
|
Given an incident, analyze potential indicators of compromise. |
1. Network-related
2. Host-related
3. Application-related
|
Given a scenario, utilize basic digital forensics techniques. |
1. Network
2. Endpoint
3. Mobile
9. Carving |
Compliance and Assessment - 13% |
|
Understand the importance of data privacy and protection. |
1. Privacy vs. security 2. Non-technical controls
3. Technical controls
|
Given a scenario, apply security concepts in support of organizational risk mitigation. |
1. Business impact analysis 2. Risk identification process 3. Risk calculation
4. Communication of risk factors
6. Systems assessment
9. Supply chain assessment
|
Explain the importance of frameworks, policies, procedures, and controls. |
1. Frameworks
2. Policies and procedures
3. Category
4. Control type
5. Audits and assessments
|
To ensure success in CompTIA CySA Plus certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for CompTIA Cybersecurity Analyst (CS0-002) exam.