SlideShare a Scribd company logo
•	Threat Management: Perform network
reconnaissance, analyze results, pen test and
recommend appropriate countermeasures.
•	Vulnerability Management: Implement
a vulnerability scan, analyze output
and set up a management plan.
•	Cyber-Incident Response and
Forensics: Distinguish threat behavior,
communicate, use a forensics toolkit and
choose the best course of action.
•	Security and Architecture Tool Sets: Perform
security analyst skills using packet sniffers,
intrusion detection systems and security
information and event managers (SIEMs).
As attackers have learned to evade traditional signature-based solutions,
an analytics-based approach has become extremely important. CompTIA
CSA+ certification applies behavioral analytics to the IT security market to
improve the overall state of IT security. Analytics have been successfully
integrated into the business intelligence, retail and financial services
industries for decades. Now they are also applied to IT security.
Security analytics greatly improves threat visibility across a broad attack
surface by focusing on network behavior, including an organization’s
interior network. Threats are better detected using analytics.
CSA+ addresses the increased diversity of knowledge, skills and abilities (KSAs) required of today’s
security analysts and validates what is currently necessary to perform effectively on the job.
CSA+ certification reflects the KSAs needed to analyze the state of security within modern IT
environments, including:
Adding Analytics to Your
Cybersecurity Toolkit
with CompTIA Cybersecurity Analyst (CSA+)
In this
document:
• Adding Analytics to
Your Cybersecurity
Toolkit with CompTIA
CSA+
• Measuring CompTIA
CSA+ Difficulty
• Why Hybrid Testing
Approaches Work
Best
• Mapping the NICE
Cybersecurity Work-
force Framework
of the exam
objectives require
application
or analysis
of domain
knowledge
71%
Measuring CSA+ Difficulty
Using Bloom’s Taxonomy as an organizing principle to discuss the difficulty level of the exam illustrates the emphasis
on the application of KSAs, rather than the simple recall of information. Looking at the exam objectives, 71 percent
require candidates to demonstrate their knowledge at Bloom’s level 3 (apply) and level 4 (analyze).
The CSA+ exam is at a higher taxonomy level because we carefully track job roles and skills in the IT industry.
We strive to make sure that the exams directly reflect industry standards and best practices.
The following table summarizes the percentage of certification exam objectives that fall into each of Bloom’s level.
1
Bloom’s Level and Description
Level of
Complexity
Percentage of Objectives
(Objective Numbers)
Level 1: Remembering/Recalling Information
The candidate is able to recall, restate and remember learned information.
Basic 0%
Level 2: Understanding/Explaining Ideas or Concepts
The learner grasps the meaning of information by
interpreting and translating what has been learned.
Low 29%
Level 3: Applying Knowledge and Skills
The learner makes use of information in a new situation
from the one in which it was learned.
Moderate 41%
Level 4: Analyzing
The learner breaks learned information into parts to best understand
that information in an attempt to identify evidence for a conclusion.
High 30%
Level 5: Evaluating
The learner makes decisions based on in depth
reflection, criticism and assessment.
High 0%
Level 6: Creating
The learner creates new ideas and information
using what has been previously learned.
High 0%
CSA+ Executive Summary
Why Hybrid Testing Approaches Work Best
Over the past several years, cybersecurity practitioners and educators have debated as to which of the following is more
important to validate:
1. An individual’s conceptual knowledge, as validated by “linear” multiple choice items, or
2. Performance associated with a particular job or responsibility, as validated by performance-based items.
Advocates for each of these two aspects of validation often hold one of the approaches as superior over the other, with most
individuals favoring only performance-based items.
CompTIA regards this rift in opinion as a false dilemma. Both domain knowledge expertise and practical skills are absolutely vital
and should be a part of any serious competency training and validation process. Both knowledge- and performance-based
aspects are necessary for training, and nothing can substitute for hands-on learning. The same principle applies to assessment.
This is why CompTIA adopted performance-based items into its certification exams starting in 2011.
The following CompTIA exams contain roughly 10 percent performance-based items:
On average, it takes a test taker roughly one-third of the examination time to complete these performance-
based items. The performance-based items include simulations of technology solutions and story-based
items that require advanced cognitive thinking on the part of the successful test taker.
A+ | Network+ | Security+ | Cybersecurity Analyst (CSA+) | CompTIA Advanced Security Practitioner (CASP)
2
Work Role Description Matching CompTIA CSA+ Objectives (Samples)
Cyber Defense
Analyst PR-DA-001
Uses data collected from a variety of cyber-
defense tools (e.g., intrusion detection system (IDS)
alerts, firewalls, network traffic logs) to analyze
events that occur within their environments
for the purposes of mitigating threats.
1.1 — Given a scenario, apply environmental
reconnaissance techniques using
appropriate tools and processes
1.2 — Given a scenario, analyze the results
of a network reconnaissance
1.3 — Given a network-based threat,
implement or recommend the appropriate
response and countermeasure
Cyber Defense
Infrastructure
Support Specialist
PR-INF-001
Tests, implements, deploys, maintains and administers
the infrastructure hardware and software.
1.4 — Explain the purpose of practices used
to secure a corporate environment
2.3 — Compare and contrast common vulnerabilities
found in the following targets within an organization
4.3 — Given a scenario, review security
architecture and make recommendations
to implement compensating controls
Cyber Defense
Incident Responder
PR-IR-001
Investigates, analyzes and responds to cyber-incidents
within the network environment or enclave.
3.1 — Given a scenario, distinguish threat data or
behavior to determine the impact of an incident
3.2 — Given a scenario, prepare a toolkit and use
appropriate forensics tools during an investigation
3.3 — Explain the importance of communication
during the incident response process
3.4 — Given a scenario, analyze common
symptoms to select the best course of
action to support incident response
3.5 — Summarize the incident recovery
and post-incident response process
Vulnerability
Assessment
Analyst PR-VA-001
Performs assessments of systems and networks
within the network environment or enclave and
identifies where those systems/networks deviate
from acceptable configurations, enclave policy or
local policy. Measures effectiveness of defense-in-
depth architecture against known vulnerabilities.
2.1 — Given a scenario, implement an information
security vulnerability management process
2.2 — Given a scenario, analyze the output
resulting from a vulnerability scan
2.3 — Compare and contrast common vulnerabilities
found in the following targets within an organization
Mapping the NICE Cybersecurity Workforce Framework
CompTIA CSA+ certification aligns with the following eight work roles of the National Initiative for Cybersecurity
Education (NICE) Cybersecurity Workforce Framework (NCWF), draft NIST special publication 800-181:
This mapping is a sample of how CompTIA’s certification standards map to key elements of the NICE framework.
CSA+ Executive Summary
• Cyber Defense Analyst, PR-DA-001
• Cyber Defense Infrastructure Support Specialist, PR-INF-001
• Cyber Defense Incident Responder, PR-IR-001
• Vulnerability Assessment Analyst, PR-VA-001
• Warning Analyst, AN-TA-001
• Cyber Crime Investigator, IN-CI-001
• Forensics Analyst, IN-FO-001
• Cyber Defense Forensics Analyst, IN-FO-002
3
Work Role Description Matching CompTIA CSA+ Objectives (Samples)
Warning Analyst
AN-TA-001
Develops unique cyber-indicators to maintain constant
awareness of the status of the highly dynamic
operating environment. Collects, processes, analyzes
and disseminates cyber-warning assessments.
1.1 — Given a scenario, apply environmental
reconnaissance techniques using
appropriate tools and processes
1.2 — Given a scenario, analyze the results
of a network reconnaissance
3.3 — Explain the importance of communication
during the incident response process
Cyber Crime
Investigator
IN-CI-001
Identifies, collects, examines and preserves
evidence using controlled and documented
analytical and investigative techniques.
3.1 — Given a scenario, distinguish threat data or
behavior to determine the impact of an incident
3.2 — Given a scenario, prepare a toolkit and use
appropriate forensics tools during an investigation
3.5 — Summarize the incident recovery
and post-incident response process
4.1 — Explain the relationship between frameworks,
common policies, controls and procedures
4.5 — Compare and contrast the general
purpose and reasons for using various
cybersecurity tools and technologies
Forensics Analyst
IN-FO-001
Conducts deep-dive investigations on computer-
based crimes establishing documentary or
physical evidence, to include digital media and
logs associated with cyber-intrusion incidents.
1.1 — Given a scenario, apply environmental
reconnaissance techniques using
appropriate tools and processes
3.2 — Given a scenario, prepare a toolkit and use
appropriate forensics tools during an investigation
4.5 — Compare and contrast the general
purpose and reasons for using various
cybersecurity tools and technologies
Cyber Defense
Forensics Analyst
IN-FO-002
Analyzes digital evidence and investigates computer
security incidents to derive useful information in
support of system/network vulnerability mitigation.
2.2 — Given a scenario, analyze the output
resulting from a vulnerability scan
3.1 — Given a scenario, distinguish threat data or
behavior to determine the impact of an incident
3.2 — Given a scenario, prepare a toolkit and use
appropriate forensics tools during an investigation
3.4 — Given a scenario, analyze common
symptoms to select the best course of
action to support incident response
LEARN MORE
For government inquiries contact: GovernmentSales@CompTIA.org.
For corporate inquiries contact: Jennifer Herroon at jherroon@CompTIA.org
© 2017 CompTIA Properties, LLC, used under license by CompTIA Certifications, LLC. All rights reserved. All certification programs and
education related to such programs are operated exclusively by CompTIA Certifications, LLC. CompTIA is a registered trademark of
CompTIA Properties, LLC in the U.S. and internationally. Other brands and company names mentioned herein may be trademarks or
service marks of CompTIA Properties, LLC or of their respective owners. Reproduction or dissemination prohibited without written
consent of CompTIA Properties, LLC. Printed in the U.S. 03724-Apr2017
CSA+ Executive Summary
4

More Related Content

What's hot

SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...
SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...
SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...Andrea Montemaggio
 
Critical Infrastructure Protection (CIP) NERC Training
Critical Infrastructure Protection (CIP) NERC TrainingCritical Infrastructure Protection (CIP) NERC Training
Critical Infrastructure Protection (CIP) NERC TrainingTonex
 
Cmgt 582 Education Specialist -snaptutorial.com
Cmgt 582  Education Specialist -snaptutorial.comCmgt 582  Education Specialist -snaptutorial.com
Cmgt 582 Education Specialist -snaptutorial.comDavisMurphyC37
 
Chapter 07 risk_management_controlling_risk
Chapter 07 risk_management_controlling_riskChapter 07 risk_management_controlling_risk
Chapter 07 risk_management_controlling_riskhusseinalshomali
 
Providing a model for selecting information security control objectives using...
Providing a model for selecting information security control objectives using...Providing a model for selecting information security control objectives using...
Providing a model for selecting information security control objectives using...ijfcstjournal
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.comKeatonJennings98
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.comHarrisGeorg12
 
Risk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network SecurityRisk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network SecurityIJCSIS Research Publications
 
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...Editor IJCATR
 
Cyber Security Improvement Plan
Cyber Security Improvement PlanCyber Security Improvement Plan
Cyber Security Improvement PlanNicole Valerio
 
Chapter 04 information_security_policy
Chapter 04 information_security_policyChapter 04 information_security_policy
Chapter 04 information_security_policyhusseinalshomali
 
Effects Based Planning And Assessment
Effects Based Planning And AssessmentEffects Based Planning And Assessment
Effects Based Planning And Assessmentahmad bassiouny
 
Promise 2011: "An Iterative Semi-supervised Approach to Software Fault Predic...
Promise 2011: "An Iterative Semi-supervised Approach to Software Fault Predic...Promise 2011: "An Iterative Semi-supervised Approach to Software Fault Predic...
Promise 2011: "An Iterative Semi-supervised Approach to Software Fault Predic...CS, NcState
 
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...IEEEFINALYEARSTUDENTPROJECTS
 
AN OVERVIEW OF PENETRATION TESTING
AN OVERVIEW OF PENETRATION TESTINGAN OVERVIEW OF PENETRATION TESTING
AN OVERVIEW OF PENETRATION TESTINGIJNSA Journal
 
test bank MANAGEMENT of INFORMATION SECURITY, Fifth Edition
test bank MANAGEMENT of INFORMATION SECURITY, Fifth Editiontest bank MANAGEMENT of INFORMATION SECURITY, Fifth Edition
test bank MANAGEMENT of INFORMATION SECURITY, Fifth Editionhusseinalshomali
 

What's hot (20)

SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...
SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...
SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...
 
Critical Infrastructure Protection (CIP) NERC Training
Critical Infrastructure Protection (CIP) NERC TrainingCritical Infrastructure Protection (CIP) NERC Training
Critical Infrastructure Protection (CIP) NERC Training
 
Cmgt 582 Education Specialist -snaptutorial.com
Cmgt 582  Education Specialist -snaptutorial.comCmgt 582  Education Specialist -snaptutorial.com
Cmgt 582 Education Specialist -snaptutorial.com
 
NIST SP 800 30 Flow Chart
NIST SP 800 30 Flow ChartNIST SP 800 30 Flow Chart
NIST SP 800 30 Flow Chart
 
Chapter 07 risk_management_controlling_risk
Chapter 07 risk_management_controlling_riskChapter 07 risk_management_controlling_risk
Chapter 07 risk_management_controlling_risk
 
Providing a model for selecting information security control objectives using...
Providing a model for selecting information security control objectives using...Providing a model for selecting information security control objectives using...
Providing a model for selecting information security control objectives using...
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.com
 
Risk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network SecurityRisk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network Security
 
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
 
Cyber Security Improvement Plan
Cyber Security Improvement PlanCyber Security Improvement Plan
Cyber Security Improvement Plan
 
Chapter 04 information_security_policy
Chapter 04 information_security_policyChapter 04 information_security_policy
Chapter 04 information_security_policy
 
Effects Based Planning And Assessment
Effects Based Planning And AssessmentEffects Based Planning And Assessment
Effects Based Planning And Assessment
 
Promise 2011: "An Iterative Semi-supervised Approach to Software Fault Predic...
Promise 2011: "An Iterative Semi-supervised Approach to Software Fault Predic...Promise 2011: "An Iterative Semi-supervised Approach to Software Fault Predic...
Promise 2011: "An Iterative Semi-supervised Approach to Software Fault Predic...
 
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
 
Robustness in deep learning
Robustness in deep learningRobustness in deep learning
Robustness in deep learning
 
AN OVERVIEW OF PENETRATION TESTING
AN OVERVIEW OF PENETRATION TESTINGAN OVERVIEW OF PENETRATION TESTING
AN OVERVIEW OF PENETRATION TESTING
 
Eng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-LatestEng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-Latest
 
test bank MANAGEMENT of INFORMATION SECURITY, Fifth Edition
test bank MANAGEMENT of INFORMATION SECURITY, Fifth Editiontest bank MANAGEMENT of INFORMATION SECURITY, Fifth Edition
test bank MANAGEMENT of INFORMATION SECURITY, Fifth Edition
 

Similar to Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Analyst (CSA+)

Meeting the Cybersecurity Skills Challenge with CompTIA Security+
Meeting the Cybersecurity Skills Challenge with CompTIA Security+Meeting the Cybersecurity Skills Challenge with CompTIA Security+
Meeting the Cybersecurity Skills Challenge with CompTIA Security+CompTIA
 
Cyber security technologist occupational brief
Cyber security technologist occupational briefCyber security technologist occupational brief
Cyber security technologist occupational briefEnda Crossan
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxRSAArcher
 
Security-Monitoring-and-Improvement.pptx
Security-Monitoring-and-Improvement.pptxSecurity-Monitoring-and-Improvement.pptx
Security-Monitoring-and-Improvement.pptxMuhammadAbdullah311866
 
w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018Open Security Summit
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comphanleson
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec trainInfosecTrain
 
Practical Measures for Measuring Security
Practical Measures for Measuring SecurityPractical Measures for Measuring Security
Practical Measures for Measuring SecurityChris Mullins
 
Adapting IT Operations with CompTIA Cloud+
Adapting IT Operations with CompTIA Cloud+Adapting IT Operations with CompTIA Cloud+
Adapting IT Operations with CompTIA Cloud+CompTIA
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechsMordecai Kraushar
 
Managing an enterprise cyber security program
Managing an enterprise cyber security programManaging an enterprise cyber security program
Managing an enterprise cyber security programabdulkhalid murady
 
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptxInfosec
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...robbiesamuel
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf
 
Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionInfo-Tech Research Group
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniyaseraljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This chedavieec5f
 

Similar to Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Analyst (CSA+) (20)

Meeting the Cybersecurity Skills Challenge with CompTIA Security+
Meeting the Cybersecurity Skills Challenge with CompTIA Security+Meeting the Cybersecurity Skills Challenge with CompTIA Security+
Meeting the Cybersecurity Skills Challenge with CompTIA Security+
 
Cyber security technologist occupational brief
Cyber security technologist occupational briefCyber security technologist occupational brief
Cyber security technologist occupational brief
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
 
Security-Monitoring-and-Improvement.pptx
Security-Monitoring-and-Improvement.pptxSecurity-Monitoring-and-Improvement.pptx
Security-Monitoring-and-Improvement.pptx
 
w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
Practical Measures for Measuring Security
Practical Measures for Measuring SecurityPractical Measures for Measuring Security
Practical Measures for Measuring Security
 
Adapting IT Operations with CompTIA Cloud+
Adapting IT Operations with CompTIA Cloud+Adapting IT Operations with CompTIA Cloud+
Adapting IT Operations with CompTIA Cloud+
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechs
 
Auditing-Cybersecurity in the enterprise
Auditing-Cybersecurity in the enterpriseAuditing-Cybersecurity in the enterprise
Auditing-Cybersecurity in the enterprise
 
Managing an enterprise cyber security program
Managing an enterprise cyber security programManaging an enterprise cyber security program
Managing an enterprise cyber security program
 
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
 
Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
 

More from CompTIA

CompTIA IT Employment Tracker – December 2021
CompTIA IT Employment Tracker –  December 2021CompTIA IT Employment Tracker –  December 2021
CompTIA IT Employment Tracker – December 2021CompTIA
 
CompTIA IT Employment Tracker – November 2021
CompTIA IT Employment Tracker –  November 2021CompTIA IT Employment Tracker –  November 2021
CompTIA IT Employment Tracker – November 2021CompTIA
 
CompTIA IT Employment Tracker – October 2021
CompTIA IT Employment Tracker –  October 2021CompTIA IT Employment Tracker –  October 2021
CompTIA IT Employment Tracker – October 2021CompTIA
 
CompTIA IT Employment Tracker – September 2021
CompTIA IT Employment Tracker –  September 2021CompTIA IT Employment Tracker –  September 2021
CompTIA IT Employment Tracker – September 2021CompTIA
 
CompTIA IT Employment Tracker – July 2021
CompTIA IT Employment Tracker –  July 2021CompTIA IT Employment Tracker –  July 2021
CompTIA IT Employment Tracker – July 2021CompTIA
 
CompTIA IT Employment Tracker – June 2021
CompTIA IT Employment Tracker –  June 2021CompTIA IT Employment Tracker –  June 2021
CompTIA IT Employment Tracker – June 2021CompTIA
 
Trends in Automation 2021
Trends in Automation 2021Trends in Automation 2021
Trends in Automation 2021CompTIA
 
CompTIA IT Employment Tracker – May 2021
CompTIA IT Employment Tracker –  May 2021CompTIA IT Employment Tracker –  May 2021
CompTIA IT Employment Tracker – May 2021CompTIA
 
CompTIA IT Employment Tracker – April 2021
CompTIA IT Employment Tracker –  April 2021CompTIA IT Employment Tracker –  April 2021
CompTIA IT Employment Tracker – April 2021CompTIA
 
IT Operations and Emerging Technology
IT Operations and Emerging TechnologyIT Operations and Emerging Technology
IT Operations and Emerging TechnologyCompTIA
 
CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA
 
Help Desk Trends
Help Desk TrendsHelp Desk Trends
Help Desk TrendsCompTIA
 
CompTIA IT Employment Tracker – February 2021
CompTIA IT Employment Tracker –  February 2021CompTIA IT Employment Tracker –  February 2021
CompTIA IT Employment Tracker – February 2021CompTIA
 
CompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA
 
CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA
 
CompTIA IT Employment Tracker – November 2020
CompTIA IT Employment Tracker –  November 2020CompTIA IT Employment Tracker –  November 2020
CompTIA IT Employment Tracker – November 2020CompTIA
 
CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA
 
CompTIA IT Employment Tracker – September 2020
CompTIA IT Employment Tracker –  September 2020CompTIA IT Employment Tracker –  September 2020
CompTIA IT Employment Tracker – September 2020CompTIA
 
CompTIA IT Employment Tracker – August 2020
CompTIA IT Employment Tracker –  August 2020CompTIA IT Employment Tracker –  August 2020
CompTIA IT Employment Tracker – August 2020CompTIA
 
CompTIA IT Employment Tracker – July 2020
CompTIA IT Employment Tracker –  July 2020CompTIA IT Employment Tracker –  July 2020
CompTIA IT Employment Tracker – July 2020CompTIA
 

More from CompTIA (20)

CompTIA IT Employment Tracker – December 2021
CompTIA IT Employment Tracker –  December 2021CompTIA IT Employment Tracker –  December 2021
CompTIA IT Employment Tracker – December 2021
 
CompTIA IT Employment Tracker – November 2021
CompTIA IT Employment Tracker –  November 2021CompTIA IT Employment Tracker –  November 2021
CompTIA IT Employment Tracker – November 2021
 
CompTIA IT Employment Tracker – October 2021
CompTIA IT Employment Tracker –  October 2021CompTIA IT Employment Tracker –  October 2021
CompTIA IT Employment Tracker – October 2021
 
CompTIA IT Employment Tracker – September 2021
CompTIA IT Employment Tracker –  September 2021CompTIA IT Employment Tracker –  September 2021
CompTIA IT Employment Tracker – September 2021
 
CompTIA IT Employment Tracker – July 2021
CompTIA IT Employment Tracker –  July 2021CompTIA IT Employment Tracker –  July 2021
CompTIA IT Employment Tracker – July 2021
 
CompTIA IT Employment Tracker – June 2021
CompTIA IT Employment Tracker –  June 2021CompTIA IT Employment Tracker –  June 2021
CompTIA IT Employment Tracker – June 2021
 
Trends in Automation 2021
Trends in Automation 2021Trends in Automation 2021
Trends in Automation 2021
 
CompTIA IT Employment Tracker – May 2021
CompTIA IT Employment Tracker –  May 2021CompTIA IT Employment Tracker –  May 2021
CompTIA IT Employment Tracker – May 2021
 
CompTIA IT Employment Tracker – April 2021
CompTIA IT Employment Tracker –  April 2021CompTIA IT Employment Tracker –  April 2021
CompTIA IT Employment Tracker – April 2021
 
IT Operations and Emerging Technology
IT Operations and Emerging TechnologyIT Operations and Emerging Technology
IT Operations and Emerging Technology
 
CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021
 
Help Desk Trends
Help Desk TrendsHelp Desk Trends
Help Desk Trends
 
CompTIA IT Employment Tracker – February 2021
CompTIA IT Employment Tracker –  February 2021CompTIA IT Employment Tracker –  February 2021
CompTIA IT Employment Tracker – February 2021
 
CompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry Outlook
 
CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021
 
CompTIA IT Employment Tracker – November 2020
CompTIA IT Employment Tracker –  November 2020CompTIA IT Employment Tracker –  November 2020
CompTIA IT Employment Tracker – November 2020
 
CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020
 
CompTIA IT Employment Tracker – September 2020
CompTIA IT Employment Tracker –  September 2020CompTIA IT Employment Tracker –  September 2020
CompTIA IT Employment Tracker – September 2020
 
CompTIA IT Employment Tracker – August 2020
CompTIA IT Employment Tracker –  August 2020CompTIA IT Employment Tracker –  August 2020
CompTIA IT Employment Tracker – August 2020
 
CompTIA IT Employment Tracker – July 2020
CompTIA IT Employment Tracker –  July 2020CompTIA IT Employment Tracker –  July 2020
CompTIA IT Employment Tracker – July 2020
 

Recently uploaded

皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】larisashrestha558
 
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】foismail170
 
135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of EngineeringManu Mitra
 
133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in Research133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in ResearchManu Mitra
 
Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxSheldon Byron
 
131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP InternationalManu Mitra
 
Biography and career history of Chad Henson.pdf
Biography and career history of Chad Henson.pdfBiography and career history of Chad Henson.pdf
Biography and career history of Chad Henson.pdfChad Henson
 
How to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and BusinessHow to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and Businessideatoipo
 
0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdf
0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdf0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdf
0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdfThomas GIRARD BDes
 
0524.THOMASGIRARD_CURRICULUMVITAE-01.pdf
0524.THOMASGIRARD_CURRICULUMVITAE-01.pdf0524.THOMASGIRARD_CURRICULUMVITAE-01.pdf
0524.THOMASGIRARD_CURRICULUMVITAE-01.pdfThomas GIRARD BDes
 
D.El.Ed. College List -Session 2024-26.pdf
D.El.Ed. College List -Session 2024-26.pdfD.El.Ed. College List -Session 2024-26.pdf
D.El.Ed. College List -Session 2024-26.pdfbipedoy339
 
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】foismail170
 
Day care leadership document it helps to a person who needs caring children
Day care leadership document it helps to a person who needs caring childrenDay care leadership document it helps to a person who needs caring children
Day care leadership document it helps to a person who needs caring childrenMeleseWolde3
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorialvencislavkaaa
 
132. Acta Scientific Pharmaceutical Sciences
132. Acta Scientific Pharmaceutical Sciences132. Acta Scientific Pharmaceutical Sciences
132. Acta Scientific Pharmaceutical SciencesManu Mitra
 
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】foismail170
 
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...Dirk Spencer Corporate Recruiter LION
 
134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer ScienceManu Mitra
 
Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!LukeRoyak
 
129. Reviewer Certificate in BioNature [2024]
129. Reviewer Certificate in BioNature [2024]129. Reviewer Certificate in BioNature [2024]
129. Reviewer Certificate in BioNature [2024]Manu Mitra
 

Recently uploaded (20)

皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
 
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
 
135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering
 
133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in Research133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in Research
 
Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptx
 
131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International
 
Biography and career history of Chad Henson.pdf
Biography and career history of Chad Henson.pdfBiography and career history of Chad Henson.pdf
Biography and career history of Chad Henson.pdf
 
How to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and BusinessHow to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and Business
 
0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdf
0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdf0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdf
0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdf
 
0524.THOMASGIRARD_CURRICULUMVITAE-01.pdf
0524.THOMASGIRARD_CURRICULUMVITAE-01.pdf0524.THOMASGIRARD_CURRICULUMVITAE-01.pdf
0524.THOMASGIRARD_CURRICULUMVITAE-01.pdf
 
D.El.Ed. College List -Session 2024-26.pdf
D.El.Ed. College List -Session 2024-26.pdfD.El.Ed. College List -Session 2024-26.pdf
D.El.Ed. College List -Session 2024-26.pdf
 
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
 
Day care leadership document it helps to a person who needs caring children
Day care leadership document it helps to a person who needs caring childrenDay care leadership document it helps to a person who needs caring children
Day care leadership document it helps to a person who needs caring children
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
 
132. Acta Scientific Pharmaceutical Sciences
132. Acta Scientific Pharmaceutical Sciences132. Acta Scientific Pharmaceutical Sciences
132. Acta Scientific Pharmaceutical Sciences
 
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
 
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
 
134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science
 
Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!
 
129. Reviewer Certificate in BioNature [2024]
129. Reviewer Certificate in BioNature [2024]129. Reviewer Certificate in BioNature [2024]
129. Reviewer Certificate in BioNature [2024]
 

Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Analyst (CSA+)

  • 1. • Threat Management: Perform network reconnaissance, analyze results, pen test and recommend appropriate countermeasures. • Vulnerability Management: Implement a vulnerability scan, analyze output and set up a management plan. • Cyber-Incident Response and Forensics: Distinguish threat behavior, communicate, use a forensics toolkit and choose the best course of action. • Security and Architecture Tool Sets: Perform security analyst skills using packet sniffers, intrusion detection systems and security information and event managers (SIEMs). As attackers have learned to evade traditional signature-based solutions, an analytics-based approach has become extremely important. CompTIA CSA+ certification applies behavioral analytics to the IT security market to improve the overall state of IT security. Analytics have been successfully integrated into the business intelligence, retail and financial services industries for decades. Now they are also applied to IT security. Security analytics greatly improves threat visibility across a broad attack surface by focusing on network behavior, including an organization’s interior network. Threats are better detected using analytics. CSA+ addresses the increased diversity of knowledge, skills and abilities (KSAs) required of today’s security analysts and validates what is currently necessary to perform effectively on the job. CSA+ certification reflects the KSAs needed to analyze the state of security within modern IT environments, including: Adding Analytics to Your Cybersecurity Toolkit with CompTIA Cybersecurity Analyst (CSA+) In this document: • Adding Analytics to Your Cybersecurity Toolkit with CompTIA CSA+ • Measuring CompTIA CSA+ Difficulty • Why Hybrid Testing Approaches Work Best • Mapping the NICE Cybersecurity Work- force Framework of the exam objectives require application or analysis of domain knowledge 71% Measuring CSA+ Difficulty Using Bloom’s Taxonomy as an organizing principle to discuss the difficulty level of the exam illustrates the emphasis on the application of KSAs, rather than the simple recall of information. Looking at the exam objectives, 71 percent require candidates to demonstrate their knowledge at Bloom’s level 3 (apply) and level 4 (analyze). The CSA+ exam is at a higher taxonomy level because we carefully track job roles and skills in the IT industry. We strive to make sure that the exams directly reflect industry standards and best practices. The following table summarizes the percentage of certification exam objectives that fall into each of Bloom’s level. 1
  • 2. Bloom’s Level and Description Level of Complexity Percentage of Objectives (Objective Numbers) Level 1: Remembering/Recalling Information The candidate is able to recall, restate and remember learned information. Basic 0% Level 2: Understanding/Explaining Ideas or Concepts The learner grasps the meaning of information by interpreting and translating what has been learned. Low 29% Level 3: Applying Knowledge and Skills The learner makes use of information in a new situation from the one in which it was learned. Moderate 41% Level 4: Analyzing The learner breaks learned information into parts to best understand that information in an attempt to identify evidence for a conclusion. High 30% Level 5: Evaluating The learner makes decisions based on in depth reflection, criticism and assessment. High 0% Level 6: Creating The learner creates new ideas and information using what has been previously learned. High 0% CSA+ Executive Summary Why Hybrid Testing Approaches Work Best Over the past several years, cybersecurity practitioners and educators have debated as to which of the following is more important to validate: 1. An individual’s conceptual knowledge, as validated by “linear” multiple choice items, or 2. Performance associated with a particular job or responsibility, as validated by performance-based items. Advocates for each of these two aspects of validation often hold one of the approaches as superior over the other, with most individuals favoring only performance-based items. CompTIA regards this rift in opinion as a false dilemma. Both domain knowledge expertise and practical skills are absolutely vital and should be a part of any serious competency training and validation process. Both knowledge- and performance-based aspects are necessary for training, and nothing can substitute for hands-on learning. The same principle applies to assessment. This is why CompTIA adopted performance-based items into its certification exams starting in 2011. The following CompTIA exams contain roughly 10 percent performance-based items: On average, it takes a test taker roughly one-third of the examination time to complete these performance- based items. The performance-based items include simulations of technology solutions and story-based items that require advanced cognitive thinking on the part of the successful test taker. A+ | Network+ | Security+ | Cybersecurity Analyst (CSA+) | CompTIA Advanced Security Practitioner (CASP) 2
  • 3. Work Role Description Matching CompTIA CSA+ Objectives (Samples) Cyber Defense Analyst PR-DA-001 Uses data collected from a variety of cyber- defense tools (e.g., intrusion detection system (IDS) alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats. 1.1 — Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes 1.2 — Given a scenario, analyze the results of a network reconnaissance 1.3 — Given a network-based threat, implement or recommend the appropriate response and countermeasure Cyber Defense Infrastructure Support Specialist PR-INF-001 Tests, implements, deploys, maintains and administers the infrastructure hardware and software. 1.4 — Explain the purpose of practices used to secure a corporate environment 2.3 — Compare and contrast common vulnerabilities found in the following targets within an organization 4.3 — Given a scenario, review security architecture and make recommendations to implement compensating controls Cyber Defense Incident Responder PR-IR-001 Investigates, analyzes and responds to cyber-incidents within the network environment or enclave. 3.1 — Given a scenario, distinguish threat data or behavior to determine the impact of an incident 3.2 — Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation 3.3 — Explain the importance of communication during the incident response process 3.4 — Given a scenario, analyze common symptoms to select the best course of action to support incident response 3.5 — Summarize the incident recovery and post-incident response process Vulnerability Assessment Analyst PR-VA-001 Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy or local policy. Measures effectiveness of defense-in- depth architecture against known vulnerabilities. 2.1 — Given a scenario, implement an information security vulnerability management process 2.2 — Given a scenario, analyze the output resulting from a vulnerability scan 2.3 — Compare and contrast common vulnerabilities found in the following targets within an organization Mapping the NICE Cybersecurity Workforce Framework CompTIA CSA+ certification aligns with the following eight work roles of the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NCWF), draft NIST special publication 800-181: This mapping is a sample of how CompTIA’s certification standards map to key elements of the NICE framework. CSA+ Executive Summary • Cyber Defense Analyst, PR-DA-001 • Cyber Defense Infrastructure Support Specialist, PR-INF-001 • Cyber Defense Incident Responder, PR-IR-001 • Vulnerability Assessment Analyst, PR-VA-001 • Warning Analyst, AN-TA-001 • Cyber Crime Investigator, IN-CI-001 • Forensics Analyst, IN-FO-001 • Cyber Defense Forensics Analyst, IN-FO-002 3
  • 4. Work Role Description Matching CompTIA CSA+ Objectives (Samples) Warning Analyst AN-TA-001 Develops unique cyber-indicators to maintain constant awareness of the status of the highly dynamic operating environment. Collects, processes, analyzes and disseminates cyber-warning assessments. 1.1 — Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes 1.2 — Given a scenario, analyze the results of a network reconnaissance 3.3 — Explain the importance of communication during the incident response process Cyber Crime Investigator IN-CI-001 Identifies, collects, examines and preserves evidence using controlled and documented analytical and investigative techniques. 3.1 — Given a scenario, distinguish threat data or behavior to determine the impact of an incident 3.2 — Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation 3.5 — Summarize the incident recovery and post-incident response process 4.1 — Explain the relationship between frameworks, common policies, controls and procedures 4.5 — Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies Forensics Analyst IN-FO-001 Conducts deep-dive investigations on computer- based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber-intrusion incidents. 1.1 — Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes 3.2 — Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation 4.5 — Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies Cyber Defense Forensics Analyst IN-FO-002 Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation. 2.2 — Given a scenario, analyze the output resulting from a vulnerability scan 3.1 — Given a scenario, distinguish threat data or behavior to determine the impact of an incident 3.2 — Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation 3.4 — Given a scenario, analyze common symptoms to select the best course of action to support incident response LEARN MORE For government inquiries contact: GovernmentSales@CompTIA.org. For corporate inquiries contact: Jennifer Herroon at jherroon@CompTIA.org © 2017 CompTIA Properties, LLC, used under license by CompTIA Certifications, LLC. All rights reserved. All certification programs and education related to such programs are operated exclusively by CompTIA Certifications, LLC. CompTIA is a registered trademark of CompTIA Properties, LLC in the U.S. and internationally. Other brands and company names mentioned herein may be trademarks or service marks of CompTIA Properties, LLC or of their respective owners. Reproduction or dissemination prohibited without written consent of CompTIA Properties, LLC. Printed in the U.S. 03724-Apr2017 CSA+ Executive Summary 4