CySA+: History and relevance

Introduction

Representing one of the newest in professional IT workforce certifications, CompTIA’s Cyber Security Analyst certification, or CySA+, is a child of necessity (the mother of invention). Covering a broad swath of cybersecurity skills and knowledge, CySA+ stands out for the fact that it covers the newer approaches to cyberattacks that have been wreaking havoc in the business IT world in recent years. 

This article will detail the history of this certification, including what CySA+ is, the domains of knowledge the certification exam covers and current exam details. This will provide an insightful view into how CySA+ is one of the most relevant certifications available to information security professionals today. If you are not currently unaware of how CySA+ came about and how it fits into today’s world, read on.

What is CySA+?

The CompTIA CySA+ certification is the first intermediate professional IT workforce certification that focuses on the latest in cyberattack approaches and technologies. This certification verifies that the certification holder can proficiently use security-based behavioral analytics, or security analytics, to detect, prevent and combat cyberattacks against organization networks and devices. This is a marked departure from pre-existing cybersecurity certifications that fell short in addressing the rise in the new approaches to cyberattacks. 

CySA+ history

CompTIA first released the CySA+ certification on February 15, 2017. The first version of this exam was CS0-001 and at the time of writing this article, this is the only version yet released. 

You may be asking yourself what happened to the CSA+ certification. Actually, what happened was that an undisclosed copyright issue arose with the naming acronym CSA+, so it was renamed to CySA+ to avoid further issues. Despite the name change, none of the material covered has changed at all.

CySA+ certification exam details

Before we delve into the (Read more…)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/xarAOk8TZSA/