The CySA+ knowledge domains

Introduction

Launched in 2017, The Cyber Security Analyst certification, or CySA+ is one of the latest cybersecurity certifications to join the pack of career-boosting certs. Hosted by CompTIA, this certification verifies that the certification holder is competent to identify threats, configure and use a variety of threat detection tools and to perform data analysis. This is all done with the goal of securing an organization’s systems and applications. 

This article will detail the four knowledge domains of the CySA+ certification exam and what material you can expect to be covered on the exam. We will close with some CySA+ tips to help you get started down the road to this cybersecurity certification.

CySA+ certification exam background

The CySA+ certification exam is divided into four general categories of knowledge domains — Threat Management, Vulnerability Management, Cyber Incident Response and Security Architecture and Tool Sets. These four general categories of knowledge domains can be further broken down into smaller domains, but these will be explored in subsequent articles.

1.0 Threat Management

One of the chief objectives of cybersecurity analysts is to protect information (and information systems) confidentiality, integrity and availability. Getting there takes a defense-in-depth approach to information security that requires the use of overlapping security controls — not to mention a thorough understanding of the organization’s particular threat environment so they can develop a set of controls that can effectively respond to said threats. 

Below is a summary of this knowledge domain’s content.

1.1 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes

  • Procedures and common tasks associated with environmental reconnaissance
  • Environmental reconnaissance variables
  • Environmental reconnaissance tools

1.2 Given a scenario, analyze the results of a network reconnaissance 

  • Point-in-time data analysis related to network reconnaissance
  • Network reconnaissance data correlation and analytics
  • Network reconnaissance (Read more…)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/hHtqVGJb9To/