
CompTIA CySA+
Objectives Link - https://comptiacdn.azureedge.net/webcontent/docs/default-source/exam-objectives/comptia-cysa-cs0-003-exam-objectives-(4-0).pdf?sfvrsn=b399a5d1_2
Test Details
- Required exam - CS0-003
- Number of questions - Maximum of 85
- Types of questions - Multiple-choice and performance-based
- Length of test - 165 minutes
- Recommended experience - 4 years of hands-on experience as an incident response analyst or security operations center (SOC) analyst.
Exam Objectives
| Domain | Percentage of Exam | |
|---|---|---|
| 1.0 | Security Operations | 33% |
| 2.0 | Vulnerability Management | 30% |
| 3.0 | Incident Response and Management | 20% |
| 4.0 | Reporting and Communication | 17% |
| Total | 100% |
Course Syllabus
1.0 Security Operations
1.1 Explain the importance of system and network architecture concepts in security operations.
- Log ingestion
- Time synchronization
- Logging levels
- Operating system (OS) concepts
- Windows Registry
- System hardening
- File structure
- Configuration file locations
- System processes
- Hardware architecture
- Infrastructure concepts
- Serverless
- Virtualization
- Containerization
- Network architecture
- On-premises
- Cloud
- Hybrid
- Network segmentation
- Zero trust
- Secure access secure edge (SASE)
- Software-defined networking (SDN)
- Identity and access management
- Multifactor authentication (MFA)
- Single sign-on (SSO)
- Federation
- Privileged access management (PAM)
- Passwordless
- Cloud access security broker (CASB)
- Encryption
- Public key infrastructure (PKI)
- Secure sockets layer (SSL) inspection
- Sensitive data protection
- Data loss prevention (DLP)
- Personally identifiable information (PII)
- Cardholder data (CHD)
1.2 Given a scenario, analyze indicators of potentially malicious activity.
- Network-related
- Bandwidth consumption
- Beaconing
- Irregular peer-to-peer communication
- Rogue devices on the network
- Scans/sweeps
- Unusual traffic spikes
- Activity on unexpected ports
- Host-related
- Processor consumption
- Memory consumption
- Drive capacity consumption
- Unauthorized software
- Malicious processes
- Unauthorized changes
- Unauthorized privileges
- Data exfiltration
- Abnormal OS process behavior
- File system changes or anomalies
- Registry changes or anomalies
- Unauthorized scheduled tasks
- Application-related
- Anomalous activity
- Introduction of new accounts
- Unexpected output
- Unexpected outbound communication
- Service interruption
- Application logs
- Other
- Social engineering attacks
- Obfuscated links
1.3 Given a scenario, use appropriate tools or techniques to determine malicious activity.
- Tools
- Packet capture
- Wireshark
- tcpdump
- Log analysis/correlation
- Security information and event management (SIEM)
- Security orchestration, automation, and response (SOAR)
- Endpoint security
- Endpoint detection and response (EDR)
- Domain name service (DNS) and Internet Protocol (IP) reputation
- WHOIS
- AbuseIPDB
- File analysis
- Strings
- VirusTotal
- Sandboxing
- Joe Sandbox
- Cuckoo Sandbox
- Packet capture
- Common techniques
- Pattern recognition
- Command and control
- Interpreting suspicious commands
- Email analysis
- Header
- Impersonation
- DomainKeys Identified Mail (DKIM)
- Domain-based Message Authentication, Reporting, and Conformance (DMARC)
- Sender Policy Framework (SPF)
- Embedded links
- File analysis
- Hashing
- User behavior analysis
- Abnormal account activity
- Impossible travel
- Pattern recognition
- Programming languages/scripting
- JavaScript Object Notation (JSON)
- Extensible Markup Language (XML)
- Python
- PowerShell
- Shell script
- Regular expressions
1.4 - Compare and contrast threat-intelligence and threat-hunting concepts.
- Threat actors
- Advanced persistent threat (APT)
- Hacktivists
- Organized crime
- Nation-state
- Script kiddie
- Insider threat
- Intentional
- Unintentional
- Supply chain
- Tactics, techniques, and procedures (TTP)
- Confidence levels
- Timeliness
- Relevancy
- Accuracy
- Collection methods and sources
- Open source
- Social media
- Blogs/forums
- Government bulletins
- Computer emergency response team (CERT)
- Cybersecurity incident response team (CSIRT)
- Deep/dark web
- Closed source
- Paid feeds
- Information sharing organizations
- Internal sources
- Open source
- Threat intelligence sharing
- Incident response
- Vulnerability management
- Risk management
- Security engineering
- Detection and monitoring
- Threat hunting
- Indicators of compromise (IoC)
- Collection
- Analysis
- Application
- Focus areas
- Configurations/misconfigurations
- Isolated networks
- Business-critical assets and processes
- Active defense
- Honeypot
- Indicators of compromise (IoC)
1.5 - Explain the importance of efficiency and process improvement in security operations.
- Standardize processes
- Identification of tasks suitable for automation
- Repeatable/do not require human interaction
- Team coordination to manage and facilitate automation
- Identification of tasks suitable for automation
- Streamline operations
- Automation and orchestration
- Security orchestration, automation, and response (SOAR)
- Orchestrating threat intelligence data
- Data enrichment
- Threat feed combination
- Minimize human engagement
- Automation and orchestration
- Technology and tool integration
- Application programming interface (API)
- Webhooks
- Plugins
- Single pane of glass
2.0 Vulnerability Management
2.1 Given a scenario, implement vulnerability scanning methods and concepts.
- Asset discovery
- Map scans
- Device fingerprinting
- Special considerations
- Scheduling
- Operations
- Performance
- Sensitivity levels
- Segmentation
- Regulatory requirements
- Internal vs. external scanning
- Agent vs. agentless
- Credentialed vs. non-credentialed
- Passive vs. active
- Static vs. dynamic
- Reverse engineering
- Fuzzing
- Critical infrastructure
- Operational technology (OT)
- Industrial control systems (ICS)
- Supervisory control and data acquisition (SCADA)
- Security baseline scanning
- Industry frameworks
- Payment Card Industry Data Security Standard (PCI DSS)
- Center for Internet Security (CIS) benchmarks
- Open Web Application Security Project (OWASP)
- International Organization for Standardization (ISO) 27000 series
2.2 Given a scenario, analyze output from vulnerability assessment tools.
- Tools
- Network scanning and mapping
- Angry IP Scanner
- Maltego
- Web application scanners
- Burp Suite
- Zed Attack Proxy (ZAP)
- Arachni
- Nikto
- Vulnerability scanners
- Nessus
- OpenVAS
- Debuggers
- Immunity debugger
- GNU debugger (GDB)
- Multipurpose
- Nmap
- Metasploit framework (MSF)
- Recon-ng
- Cloud infrastructure assessment tools
- Scout Suite
- Prowler
- Pacu
- Network scanning and mapping
2.3 Given a scenario, analyze data to prioritize vulnerabilities.
- Common Vulnerability Scoring System (CVSS) interpretation
- Attack vectors
- Attack complexity
- Privileges required
- User interaction
- Scope
- Impact
- Confidentiality
- Integrity
- Availability
- Validation
- True/false positives
- True/false negatives
- Context awareness
- Internal
- External
- Isolated
- Exploitability/weaponization
- Asset value
- Zero-day
2.4 Given a scenario, recommend controls to mitigate attacks and software vulnerabilities.
- Cross-site scripting
- Reflected
- Persistent
- Overflow vulnerabilities
- Buffer
- Integer
- Heap
- Stack
- Data poisoning
- Broken access control
- Cryptographic failures
- Injection flaws
- Cross-site request forgery
- Directory traversal
- Insecure design
- Security misconfiguration
- End-of-life or outdated components
- Identification and authentication failures
- Server-side request forgery
- Remote code execution
- Privilege escalation
- Local file inclusion (LFI)/remote file inclusion (RFI)
2.5 Explain concepts related to vulnerability response, handling, and management
- Compensating control
- Control types
- Managerial
- Operational
- Technical
- Preventative
- Detective
- Responsive
- Corrective
- Patching and configuration management
- Testing
- Implementation
- Rollback
- Validation
- Maintenance windows
- Exceptions
- Risk management principles
- Accept
- Transfer
- Avoid
- Mitigate
- Policies, governance, and service-level objectives (SLOs)
- Prioritization and escalation
- Attack surface management
- Edge discovery
- Passive discovery
- Security controls testing
- Penetration testing and adversary emulation
- Bug bounty
- Attack surface reduction
- Secure coding best practices
- Input validation
- Output encoding
- Session management
- Authentication
- Data protection
- Parameterized queries
- Secure software development life cycle (SDLC)
- Threat modeling
3.0 Incident Response and Management
3.1 Explain concepts related to attack methodology frameworks.
- Cyber kill chains
- Diamond Model of Intrusion Analysis
- MITRE ATT&CK
- Open Source Security Testing Methodology Manual (OSS TMM)
- OWASP Testing Guide
3.2 Given a scenario, perform incident response activities.
- Detection and analysis
- IoC
- Evidence acquisitions
- Chain of custody
- Validating data integrity
- Preservation
- Legal hold
- Data and log analysis
- Containment, eradication, and recovery
- Scope
- Impact
- Isolation
- Remediation
- Re-imaging
- Compensating controls
3.3 Explain the preparation and post-incident activity phases of the incident management life cycle.
- Preparation
- Incident response plan
- Tools
- Playbooks
- Tabletop
- Training
- Business continuity (BC)/disaster recovery (DR)
- Post-incident activity
- Forensic analysis
- Root cause analysis
- Lessons learned
4.0 Reporting and Communication
4.1 Explain the importance of vulnerability management reporting and communication.
- Vulnerability management reporting
- Vulnerabilities
- Affected hosts
- Risk score
- Mitigation
- Recurrence
- Prioritization
- Compliance reports
- Action plans
- Configuration management
- Patching
- Compensating controls
- Awareness, education, and training
- Changing business requirements
- Inhibitors to remediation
- Memorandum of understanding (MOU)
- Service-level agreement (SLA)
- Organizational governance
- Business process interruption
- Degrading functionality
- Legacy systems
- Proprietary systems
- Metrics and key performance indicators (KPIs)
- Trends
- Top 10
- Critical vulnerabilities and zero-days
- SLOs
- Stakeholder identification and communication
4.2 Explain the importance of incident response reporting and communication.
- Stakeholder identification and communication
- Incident declaration and escalation
- Incident response reporting
- Executive summary
- Who, what, when, where, and why
- Recommendations
- Timeline
- Impact
- Scope
- Evidence
- Communications
- Legal
- Public relations
- Customer communication
- Media
- Regulatory reporting
- Law enforcement
- Root cause analysis
- Lessons learned
- Metrics and KPIs
- Mean time to detect
- Mean time to respond
- Mean time to remediate
- Alert volume
Acronym List
- ACL: Access Control List
- API: Application Programming Interface
- APT: Advanced Persistent Threat
- ARP: Address Resolution Protocol
- AV: Antivirus
- BC: Business Continuity
- BCP: Business Continuity Plan
- BGP: Border Gateway Protocol
- BIA: Business Impact Analysis
- C2: Command and Control
- CA: Certificate Authority
- CASB: Cloud Access Security Broker
- CDN: Content Delivery Network
- CERT: Computer Emergency Response Team
- CHD: Cardholder Data
- CI/CD: Continuous Integration and Continuous Delivery
- CIS: Center for Internet Security
- CMS: Content Management System
- COBIT: Control Objectives for Information and Related Technologies
- CSIRT: Cybersecurity Incident Response Team
- CSRF: Cross-site Request Forgery
- CVE: Common Vulnerabilities and Exposures
- CVSS: Common Vulnerability Scoring System
- DDoS: Distributed Denial of Service
- DHCP: Dynamic Host Configuration Protocol
- DKIM: Domain Keys Identified Mail
- DLP: Data Loss Prevention
- DMARC: Domain-based Message Authentication, Reporting, and Conformance
- DNS: Domain Name Service
- DoH: DNS over HTTPS
- DoS: Denial of Service
- DR: Disaster Recovery
- EDR: Endpoint Detection and Response
- FIM: File Integrity Monitoring
- FTP: File Transfer Protocol
- GDB: GNU Debugger
- GPO: Group Policy Objects
- HIDS: Host-based Intrusion Detection System
- HIPS: Host-based Intrusion Prevention System
- HTTP: Hypertext Transfer Protocol
- HTTPS: Hypertext Transfer Protocol Secure
- IaaS: Infrastructure as a Service
- ICMP: Internet Control Message Protocol
- ICS: Industrial Control Systems
- IDS: Intrusion Detection System
- IoC: Indicators of Compromise
- IP: Internet Protocol
- IPS: Intrusion Prevention System
- IR: Incident Response
- ISO: International Organization for Standardization
- ISP: Internet Service Provider
- IT: Information Technology
- ITIL: Information Technology Infrastructure Library
- JSON: JavaScript Object Notation
- KPI: Key Performance Indicator
- LAN: Local Area Network
- LDAPS: Lightweight Directory Access Protocol
- LFI: Local File Inclusion
- LOI: Letter of Intent
- MAC: Media Access Control
- MFA: Multifactor Authentication
- MOU: Memorandum of Understanding
- MSF: Metasploit Framework
- MSP: Managed Service Provider
- MSSP: Managed Security Service Provider
- MTTD: Mean Time to Detect
- NAC: Network Access Control
- NDA: Non-disclosure Agreement
- NGFW: Next-generation Firewall
- NIDS: Network-based Intrusion Detection System
- NIPS: Network-based Intrusion Prevention System
- NIST: National Institute of Standards and Technology
- NTP: Network Time Protocol
- OpenVAS: Open Vulnerability Assessment Scanner
- OS: Operating System
- OSINT: Open-source Intelligence
- OSSTMM: Open Source Security Testing Methodology Manual
- OT: Operational Technology
- OSVDB: Open-source Vulnerability Database
- OWASP: Open Web Application Security Project
- PAM: Privileged Access Management
- PCI DSS: Payment Card Industry Data Security Standard
- PHP: Hypertext Preprocessor
- PID: Process Identifier
- PII: Personally Identifiable Information
- PKI: Public Key Infrastructure
- PLC: Programmable Logic Controller
- POC: Proof of Concept
- RCE: Remote Code Execution
- RDP: Remote Desktop Protocol
- REST: Representational State Transfer
- RFI: Remote File Inclusion
- RPO: Recovery Point Objective
- RSA: Rivest, Shamir, Adleman
- RTO: Recovery Time Objective
- RXSS: Reflected Cross-site Scripting
- SaaS: Software as a Service
- SAML: Security Assertion Markup Language
- SASE: Secure Access Secure Edge
- SCADA: Supervisory Control and Data Acquisition
- SDLC: Software Development Life Cycle
- SDN: Software-defined Networking
- SFTP: Secure File Transfer Protocol
- SIEM: Security Information and Event Management
- SLA: Service-level Agreement
- SLO: Service-level Objective
- SMB: Server Message Block
- SMS: Short Message Service
- SMTP: Simple Mail Transfer Protocol
- SNI: SMS Notification Indicator
- SNMP: Simple Network Management Protocol
- SOAR: Security Orchestration, Automation, and Response
- SOC: Security Operations Center
- SPF: Sender Policy Framework
- SQL: Structured Query Language
- SSL: Secure Sockets Layer
- SSO: Single Sign-on
- SSRF: Server-side Request Forgery
- STIX: Structured Threat Information Expression
- SWG: Secure Web Gateway
- TCP: Transmission Control Protocol
- TFTP: Trivial File Transfer Protocol
- TLS: Transport Layer Security
- TRACE: Trade Reporting and Compliance Engine
- TTP: Tactics, Techniques, and Procedures
- UDP: User Datagram Protocol
- UEBA: User and Entity Behavior Analytics
- URI: Uniform Resource Identifier
- URL: Uniform Resource Locator
- USB: Universal Serial Bus
- UTC: Universal Time Coordinated
- VLAN: Virtual LAN
- VM: Virtual Machine
- VPN: Virtual Private Network
- WAF: Web Application Firewall
- WAN: Wide Area Network
- XDR: Extended Detection Response
- XML: Extensible Markup Language
- XSS: Cross-site Scripting
- XXE: XML External Entity
- ZAP: Zed Attack Proxy
- ZTNA: Zero Trust Network Access
Resources and Cheatsheet
- Practise Exam - https://www.itexams.com/exam/CS0-003?
- CertPreps Practise Exam - https://certpreps.com/cysa-2/
