← Back to Portfolio

CompTIA CySA+

Objectives Link - https://comptiacdn.azureedge.net/webcontent/docs/default-source/exam-objectives/comptia-cysa-cs0-003-exam-objectives-(4-0).pdf?sfvrsn=b399a5d1_2

Test Details

  • Required exam - CS0-003
  • Number of questions - Maximum of 85
  • Types of questions - Multiple-choice and performance-based
  • Length of test - 165 minutes
  • Recommended experience - 4 years of hands-on experience as an incident response analyst or security operations center (SOC) analyst.

Exam Objectives

DomainPercentage of Exam
1.0Security Operations33%
2.0Vulnerability Management30%
3.0Incident Response and Management20%
4.0Reporting and Communication17%
Total100%

Course Syllabus

1.0 Security Operations

1.1 Explain the importance of system and network architecture concepts in security operations.

  • Log ingestion
    • Time synchronization
    • Logging levels
  • Operating system (OS) concepts
    • Windows Registry
    • System hardening
    • File structure
      • Configuration file locations
    • System processes
    • Hardware architecture
  • Infrastructure concepts
    • Serverless
    • Virtualization
    • Containerization
  • Network architecture
    • On-premises
    • Cloud
    • Hybrid
    • Network segmentation
    • Zero trust
    • Secure access secure edge (SASE)
    • Software-defined networking (SDN)
  • Identity and access management
    • Multifactor authentication (MFA)
    • Single sign-on (SSO)
    • Federation
    • Privileged access management (PAM)
    • Passwordless
    • Cloud access security broker (CASB)
  • Encryption
    • Public key infrastructure (PKI)
    • Secure sockets layer (SSL) inspection
  • Sensitive data protection
    • Data loss prevention (DLP)
    • Personally identifiable information (PII)
    • Cardholder data (CHD)

1.2 Given a scenario, analyze indicators of potentially malicious activity.

  • Network-related
    • Bandwidth consumption
    • Beaconing
    • Irregular peer-to-peer communication
    • Rogue devices on the network
    • Scans/sweeps
    • Unusual traffic spikes
    • Activity on unexpected ports
  • Host-related
    • Processor consumption
    • Memory consumption
    • Drive capacity consumption
    • Unauthorized software
    • Malicious processes
    • Unauthorized changes
    • Unauthorized privileges
    • Data exfiltration
    • Abnormal OS process behavior
    • File system changes or anomalies
    • Registry changes or anomalies
    • Unauthorized scheduled tasks
  • Application-related
    • Anomalous activity
    • Introduction of new accounts
    • Unexpected output
    • Unexpected outbound communication
    • Service interruption
    • Application logs
  • Other
    • Social engineering attacks
    • Obfuscated links

1.3 Given a scenario, use appropriate tools or techniques to determine malicious activity.

  • Tools
    • Packet capture
      • Wireshark
      • tcpdump
    • Log analysis/correlation
      • Security information and event management (SIEM)
      • Security orchestration, automation, and response (SOAR)
    • Endpoint security
      • Endpoint detection and response (EDR)
    • Domain name service (DNS) and Internet Protocol (IP) reputation
      • WHOIS
      • AbuseIPDB
    • File analysis
      • Strings
      • VirusTotal
    • Sandboxing
      • Joe Sandbox
      • Cuckoo Sandbox
  • Common techniques
    • Pattern recognition
      • Command and control
    • Interpreting suspicious commands
    • Email analysis
      • Header
      • Impersonation
      • DomainKeys Identified Mail (DKIM)
      • Domain-based Message Authentication, Reporting, and Conformance (DMARC)
      • Sender Policy Framework (SPF)
      • Embedded links
    • File analysis
      • Hashing
    • User behavior analysis
      • Abnormal account activity
      • Impossible travel
  • Programming languages/scripting
    • JavaScript Object Notation (JSON)
    • Extensible Markup Language (XML)
    • Python
    • PowerShell
    • Shell script
    • Regular expressions

1.4 - Compare and contrast threat-intelligence and threat-hunting concepts.

  • Threat actors
    • Advanced persistent threat (APT)
    • Hacktivists
    • Organized crime
    • Nation-state
    • Script kiddie
    • Insider threat
      • Intentional
      • Unintentional
    • Supply chain
  • Tactics, techniques, and procedures (TTP)
  • Confidence levels
    • Timeliness
    • Relevancy
    • Accuracy
  • Collection methods and sources
    • Open source
      • Social media
      • Blogs/forums
      • Government bulletins
      • Computer emergency response team (CERT)
      • Cybersecurity incident response team (CSIRT)
      • Deep/dark web
    • Closed source
      • Paid feeds
      • Information sharing organizations
      • Internal sources
  • Threat intelligence sharing
    • Incident response
    • Vulnerability management
    • Risk management
    • Security engineering
    • Detection and monitoring
  • Threat hunting
    • Indicators of compromise (IoC)
      • Collection
      • Analysis
      • Application
    • Focus areas
      • Configurations/misconfigurations
      • Isolated networks
      • Business-critical assets and processes
    • Active defense
    • Honeypot

1.5 - Explain the importance of efficiency and process improvement in security operations.

  • Standardize processes
    • Identification of tasks suitable for automation
      • Repeatable/do not require human interaction
    • Team coordination to manage and facilitate automation
  • Streamline operations
    • Automation and orchestration
      • Security orchestration, automation, and response (SOAR)
    • Orchestrating threat intelligence data
      • Data enrichment
      • Threat feed combination
    • Minimize human engagement
  • Technology and tool integration
    • Application programming interface (API)
    • Webhooks
    • Plugins
  • Single pane of glass

2.0 Vulnerability Management

2.1 Given a scenario, implement vulnerability scanning methods and concepts.

  • Asset discovery
    • Map scans
    • Device fingerprinting
  • Special considerations
    • Scheduling
    • Operations
    • Performance
    • Sensitivity levels
    • Segmentation
    • Regulatory requirements
  • Internal vs. external scanning
  • Agent vs. agentless
  • Credentialed vs. non-credentialed
  • Passive vs. active
  • Static vs. dynamic
    • Reverse engineering
    • Fuzzing
  • Critical infrastructure
    • Operational technology (OT)
    • Industrial control systems (ICS)
    • Supervisory control and data acquisition (SCADA)
  • Security baseline scanning
  • Industry frameworks
    • Payment Card Industry Data Security Standard (PCI DSS)
    • Center for Internet Security (CIS) benchmarks
    • Open Web Application Security Project (OWASP)
    • International Organization for Standardization (ISO) 27000 series

2.2 Given a scenario, analyze output from vulnerability assessment tools.

  • Tools
    • Network scanning and mapping
      • Angry IP Scanner
      • Maltego
    • Web application scanners
      • Burp Suite
      • Zed Attack Proxy (ZAP)
      • Arachni
      • Nikto
    • Vulnerability scanners
      • Nessus
      • OpenVAS
    • Debuggers
      • Immunity debugger
      • GNU debugger (GDB)
    • Multipurpose
      • Nmap
      • Metasploit framework (MSF)
      • Recon-ng
    • Cloud infrastructure assessment tools
      • Scout Suite
      • Prowler
      • Pacu

2.3 Given a scenario, analyze data to prioritize vulnerabilities.

  • Common Vulnerability Scoring System (CVSS) interpretation
    • Attack vectors
    • Attack complexity
    • Privileges required
    • User interaction
    • Scope
    • Impact
      • Confidentiality
      • Integrity
      • Availability
  • Validation
    • True/false positives
    • True/false negatives
  • Context awareness
    • Internal
    • External
    • Isolated
  • Exploitability/weaponization
  • Asset value
  • Zero-day

2.4 Given a scenario, recommend controls to mitigate attacks and software vulnerabilities.

  • Cross-site scripting
    • Reflected
    • Persistent
  • Overflow vulnerabilities
    • Buffer
    • Integer
    • Heap
    • Stack
  • Data poisoning
  • Broken access control
  • Cryptographic failures
  • Injection flaws
  • Cross-site request forgery
  • Directory traversal
  • Insecure design
  • Security misconfiguration
  • End-of-life or outdated components
  • Identification and authentication failures
  • Server-side request forgery
  • Remote code execution
  • Privilege escalation
  • Local file inclusion (LFI)/remote file inclusion (RFI)

2.5 Explain concepts related to vulnerability response, handling, and management

  • Compensating control
  • Control types
    • Managerial
    • Operational
    • Technical
    • Preventative
    • Detective
    • Responsive
    • Corrective
  • Patching and configuration management
    • Testing
    • Implementation
    • Rollback
    • Validation
  • Maintenance windows
  • Exceptions
  • Risk management principles
    • Accept
    • Transfer
    • Avoid
    • Mitigate
  • Policies, governance, and service-level objectives (SLOs)
  • Prioritization and escalation
  • Attack surface management
    • Edge discovery
    • Passive discovery
    • Security controls testing
    • Penetration testing and adversary emulation
    • Bug bounty
    • Attack surface reduction
  • Secure coding best practices
    • Input validation
    • Output encoding
    • Session management
    • Authentication
    • Data protection
    • Parameterized queries
  • Secure software development life cycle (SDLC)
  • Threat modeling

3.0 Incident Response and Management

3.1 Explain concepts related to attack methodology frameworks.

  • Cyber kill chains
  • Diamond Model of Intrusion Analysis
  • MITRE ATT&CK
  • Open Source Security Testing Methodology Manual (OSS TMM)
  • OWASP Testing Guide

3.2 Given a scenario, perform incident response activities.

  • Detection and analysis
    • IoC
    • Evidence acquisitions
      • Chain of custody
      • Validating data integrity
      • Preservation
      • Legal hold
    • Data and log analysis
  • Containment, eradication, and recovery
    • Scope
    • Impact
    • Isolation
    • Remediation
    • Re-imaging
    • Compensating controls

3.3 Explain the preparation and post-incident activity phases of the incident management life cycle.

  • Preparation
    • Incident response plan
    • Tools
    • Playbooks
    • Tabletop
    • Training
    • Business continuity (BC)/disaster recovery (DR)
  • Post-incident activity
    • Forensic analysis
    • Root cause analysis
    • Lessons learned

4.0 Reporting and Communication

4.1 Explain the importance of vulnerability management reporting and communication.

  • Vulnerability management reporting
    • Vulnerabilities
    • Affected hosts
    • Risk score
    • Mitigation
    • Recurrence
    • Prioritization
  • Compliance reports
  • Action plans
    • Configuration management
    • Patching
    • Compensating controls
    • Awareness, education, and training
    • Changing business requirements
  • Inhibitors to remediation
    • Memorandum of understanding (MOU)
    • Service-level agreement (SLA)
    • Organizational governance
    • Business process interruption
    • Degrading functionality
    • Legacy systems
    • Proprietary systems
  • Metrics and key performance indicators (KPIs)
    • Trends
    • Top 10
    • Critical vulnerabilities and zero-days
    • SLOs
  • Stakeholder identification and communication

4.2 Explain the importance of incident response reporting and communication.

  • Stakeholder identification and communication
  • Incident declaration and escalation
  • Incident response reporting
    • Executive summary
    • Who, what, when, where, and why
    • Recommendations
    • Timeline
    • Impact
    • Scope
    • Evidence
  • Communications
    • Legal
    • Public relations
      • Customer communication
      • Media
    • Regulatory reporting
    • Law enforcement
  • Root cause analysis
  • Lessons learned
  • Metrics and KPIs
    • Mean time to detect
    • Mean time to respond
    • Mean time to remediate
    • Alert volume

Acronym List

  • ACL: Access Control List
  • API: Application Programming Interface
  • APT: Advanced Persistent Threat
  • ARP: Address Resolution Protocol
  • AV: Antivirus
  • BC: Business Continuity
  • BCP: Business Continuity Plan
  • BGP: Border Gateway Protocol
  • BIA: Business Impact Analysis
  • C2: Command and Control
  • CA: Certificate Authority
  • CASB: Cloud Access Security Broker
  • CDN: Content Delivery Network
  • CERT: Computer Emergency Response Team
  • CHD: Cardholder Data
  • CI/CD: Continuous Integration and Continuous Delivery
  • CIS: Center for Internet Security
  • CMS: Content Management System
  • COBIT: Control Objectives for Information and Related Technologies
  • CSIRT: Cybersecurity Incident Response Team
  • CSRF: Cross-site Request Forgery
  • CVE: Common Vulnerabilities and Exposures
  • CVSS: Common Vulnerability Scoring System
  • DDoS: Distributed Denial of Service
  • DHCP: Dynamic Host Configuration Protocol
  • DKIM: Domain Keys Identified Mail
  • DLP: Data Loss Prevention
  • DMARC: Domain-based Message Authentication, Reporting, and Conformance
  • DNS: Domain Name Service
  • DoH: DNS over HTTPS
  • DoS: Denial of Service
  • DR: Disaster Recovery
  • EDR: Endpoint Detection and Response
  • FIM: File Integrity Monitoring
  • FTP: File Transfer Protocol
  • GDB: GNU Debugger
  • GPO: Group Policy Objects
  • HIDS: Host-based Intrusion Detection System
  • HIPS: Host-based Intrusion Prevention System
  • HTTP: Hypertext Transfer Protocol
  • HTTPS: Hypertext Transfer Protocol Secure
  • IaaS: Infrastructure as a Service
  • ICMP: Internet Control Message Protocol
  • ICS: Industrial Control Systems
  • IDS: Intrusion Detection System
  • IoC: Indicators of Compromise
  • IP: Internet Protocol
  • IPS: Intrusion Prevention System
  • IR: Incident Response
  • ISO: International Organization for Standardization
  • ISP: Internet Service Provider
  • IT: Information Technology
  • ITIL: Information Technology Infrastructure Library
  • JSON: JavaScript Object Notation
  • KPI: Key Performance Indicator
  • LAN: Local Area Network
  • LDAPS: Lightweight Directory Access Protocol
  • LFI: Local File Inclusion
  • LOI: Letter of Intent
  • MAC: Media Access Control
  • MFA: Multifactor Authentication
  • MOU: Memorandum of Understanding
  • MSF: Metasploit Framework
  • MSP: Managed Service Provider
  • MSSP: Managed Security Service Provider
  • MTTD: Mean Time to Detect
  • NAC: Network Access Control
  • NDA: Non-disclosure Agreement
  • NGFW: Next-generation Firewall
  • NIDS: Network-based Intrusion Detection System
  • NIPS: Network-based Intrusion Prevention System
  • NIST: National Institute of Standards and Technology
  • NTP: Network Time Protocol
  • OpenVAS: Open Vulnerability Assessment Scanner
  • OS: Operating System
  • OSINT: Open-source Intelligence
  • OSSTMM: Open Source Security Testing Methodology Manual
  • OT: Operational Technology
  • OSVDB: Open-source Vulnerability Database
  • OWASP: Open Web Application Security Project
  • PAM: Privileged Access Management
  • PCI DSS: Payment Card Industry Data Security Standard
  • PHP: Hypertext Preprocessor
  • PID: Process Identifier
  • PII: Personally Identifiable Information
  • PKI: Public Key Infrastructure
  • PLC: Programmable Logic Controller
  • POC: Proof of Concept
  • RCE: Remote Code Execution
  • RDP: Remote Desktop Protocol
  • REST: Representational State Transfer
  • RFI: Remote File Inclusion
  • RPO: Recovery Point Objective
  • RSA: Rivest, Shamir, Adleman
  • RTO: Recovery Time Objective
  • RXSS: Reflected Cross-site Scripting
  • SaaS: Software as a Service
  • SAML: Security Assertion Markup Language
  • SASE: Secure Access Secure Edge
  • SCADA: Supervisory Control and Data Acquisition
  • SDLC: Software Development Life Cycle
  • SDN: Software-defined Networking
  • SFTP: Secure File Transfer Protocol
  • SIEM: Security Information and Event Management
  • SLA: Service-level Agreement
  • SLO: Service-level Objective
  • SMB: Server Message Block
  • SMS: Short Message Service
  • SMTP: Simple Mail Transfer Protocol
  • SNI: SMS Notification Indicator
  • SNMP: Simple Network Management Protocol
  • SOAR: Security Orchestration, Automation, and Response
  • SOC: Security Operations Center
  • SPF: Sender Policy Framework
  • SQL: Structured Query Language
  • SSL: Secure Sockets Layer
  • SSO: Single Sign-on
  • SSRF: Server-side Request Forgery
  • STIX: Structured Threat Information Expression
  • SWG: Secure Web Gateway
  • TCP: Transmission Control Protocol
  • TFTP: Trivial File Transfer Protocol
  • TLS: Transport Layer Security
  • TRACE: Trade Reporting and Compliance Engine
  • TTP: Tactics, Techniques, and Procedures
  • UDP: User Datagram Protocol
  • UEBA: User and Entity Behavior Analytics
  • URI: Uniform Resource Identifier
  • URL: Uniform Resource Locator
  • USB: Universal Serial Bus
  • UTC: Universal Time Coordinated
  • VLAN: Virtual LAN
  • VM: Virtual Machine
  • VPN: Virtual Private Network
  • WAF: Web Application Firewall
  • WAN: Wide Area Network
  • XDR: Extended Detection Response
  • XML: Extensible Markup Language
  • XSS: Cross-site Scripting
  • XXE: XML External Entity
  • ZAP: Zed Attack Proxy
  • ZTNA: Zero Trust Network Access

Resources and Cheatsheet