Use this quick start guide to collect all the information about CompTIA CySA+ (CS0-001) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the CS0-001 CompTIA Cybersecurity Analyst exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual CompTIA CySA Plus certification exam.
The CompTIA CySA+ certification is mainly targeted to those candidates who want to build their career in Cybersecurity domain. The CompTIA Cybersecurity Analyst (CySA+) exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of CompTIA CySA Plus.
CompTIA CySA+ Exam Summary:
Exam Name | CompTIA Cybersecurity Analyst (CySA+) |
Exam Code | CS0-001 |
Exam Price | $359 (USD) |
Duration | 165 mins |
Number of Questions | 85 |
Passing Score | 750 / 900 |
Books / Training | eLearning |
Schedule Exam | CompTIA Marketplace |
Sample Questions | CompTIA CySA+ Sample Questions |
Practice Exam | CompTIA CS0-001 Certification Practice Exam |
CompTIA CS0-001 Exam Syllabus Topics:
Topic | Details |
---|---|
Threat Management 27% | |
Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes. |
1. Procedures/common tasks
2. Variables
3. Tools
|
Given a scenario, analyze the results of a network reconnaissance. |
1. Point-in-time data analysis
2. Data correlation and analytics
3. Data output
4. Tools
|
Given a network-based threat, implement or recommend the appropriate response and countermeasure. |
1. Network segmentation
2. Honeypot
6. Hardening
7. Network Access Control (NAC)
|
Explain the purpose of practices used to secure a corporate environment. |
1. Penetration testing
2. Reverse engineering
3. Training and exercises
4. Risk evaluation
|
Vulnerability Management 26% | |
Given a scenario, implement an information security vulnerability management process. |
1. Identification of requirements
2. Establish scanning frequency
3. Configure tools to perform scans according to specification
4. Execute scanning
5. Generate reports
6. Remediation
7. Ongoing scanning and continuous monitoring
|
Given a scenario, analyze the output resulting from a vulnerability scan. |
1. Analyze reports from a vulnerability scan
2. Validate results and correlate other data points
|
Compare and contrast common vulnerabilities found in the following targets within an organization. |
1. Servers 2. Endpoints 3. Network infrastructure 4. Network appliances 5. Virtual infrastructure
6. Mobile devices
7. Interconnected networks 8. Virtual Private Networks (VPNs) 9. Industrial Control Systems (ICSs) 10. SCADA devices |
Cyber Incident Response 23% | |
Given a scenario, distinguish threat data or behavior to determine the impact of an incident. |
1. Threat classification
2. Factors contributing to incident severity and prioritization
|
Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation. |
1. Forensics kit
2. Forensic investigation suite
|
Explain the importance of communication during the incident response process. |
1. Stakeholders
2. Purpose of communication processes
3. Role-based responsibilities
|
Given a scenario, analyze common symptoms to select the best course of action to support incident response. |
1. Common network-related symptoms
2. Common host-related symptoms
3. Common application-related symptoms
|
Summarize the incident recovery and post-incident response process. |
1. Containment techniques
2. Eradication techniques
3. Validation
4. Corrective actions
5. Incident summary report
|
Security Architecture and Tool Sets 24% | |
Explain the relationship between frameworks, common policies, controls, and procedures. |
1. Regulatory compliance 2. Frameworks
3. Policies
4. Controls
5. Procedures
6. Verifications and quality control
|
Given a scenario, use data to recommend remediation of security issues related to identity and access management. |
1. Security issues associated with context-based authentication
2. Security issues associated with identities
3. Security issues associated with identity repositories
4. Security issues associated with federation and single sign-on
5. Exploits
|
Given a scenario, review security architecture and make recommendations to implement compensating controls. |
1. Security data analytics
2. Manual review
3. Defense in depth
|
Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC). |
1. Best practices during software development
2. Secure coding best practices
|
Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies. |
1. Preventative
2. Collective
3. Analytical
4. Exploit
5. Forensics
|
To ensure success in CompTIA CySA Plus certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for CompTIA Cybersecurity Analyst (CS0-001) exam.