SlideShare a Scribd company logo
Meet your
speakers
Patrick Lane
Guest speaker
Director, Certification Product Management
CompTIA
Announcement
https://www.comptia.org
https://home.pearsonvue.com/comptia/onvue
Agenda
● Why did CompTIA create CySA+?
○ Analyst approach needed
○ Job demand
● Cybersecurity career pathway
● CySA+ CS0-002 updates
● CySA+ CS0-002 certification details
● Q&A
Why did CompTIA create
CySA+?
Lessons learned after 2013-2014 attacks
We must apply behavioral analytics to cybersecurity to improve
the overall state of cybersecurity
● We must focus on network behavior in an organization’s interior
network
● We must identify network anomalies that indicate bad behavior
We must train IT security professionals security analyst skills,
which include:
● Leverage intelligence and threat detection techniques
● Analyze and interpret data
● Identify and address vulnerabilities
● Suggest preventative measures
● Effectively respond to and recover from incidents
COVID-19 security risks
Cybersecurity-related headlines in the last 2 weeks!
● Phishing emails sent to sign into your account to get a free bottle
of hand sanitizer, open an attachment from your employer on tips
to prevent infection or schemes against taxpayers
● Cybercriminals impersonating IT help desks
● Malware used to wipe everything off a computer or corrupt master
boot record of Windows machines so the hard drive is unusable –
with no financial gain
● Targeting of vulnerabilities in VPN devices and gateway appliances
to breach a network
● Attackers will increasingly leverage lures tailored to the new
stimulus bill and related recovery efforts, as well as targeting
home delivery food apps
● Hackers are disrupting routers’ Domain Name System (DNS)
settings as telework surges around the world
CompTIA Cybersecurity Analyst (CySA+)
Created to address the industry need for IT security analysts.
As attackers have learned to evade traditional
signature-based solutions, an analytics-based
approach has become extremely important. CySA+
applies behavioral analytics to IT security to improve
the overall state of cybersecurity through continuous
security monitoring.
Job growth indicators
Information security analyst jobs will grow
much faster than average, with 28% growth
between 2016 and 2026.
8 in 10 hiring managers indicate that IT security
certifications are valuable for validating
cybersecurity-related knowledge/skills or
evaluating job candidates.*
The U.S. Bureau of Labor Statistics (BLS)
classifies CySA+ under Information Security
Analysts, which includes:
• 2018 median pay: $98,350 annual per year
• Number of jobs available: 100,000*
* Latest pay info from U.S. Bureau of Labor Statistics; Job openings and hiring manager info derived from CompTIA international research reports.
CySA+ CS0-002 updates
Reason for the update: Industry changes
Security analyst core job functions remain the same, but additional
functions are needed. The job role is a moving target as newer
technologies and regulations affect it.
● Core function remains the same: continuous security monitoring
● More focus on software security
● Growing trend of “going on the offense with defense”
● Emphasis on incident response
● Increased IT regulatory environment
How industry changes affected job roles
New CS0-002 Previous CS0-002
Security analyst
- Tier II SOC analyst
- Security monitoring
Security analyst
Security operations center (SOC) analyst
Security engineer Security engineer
Threat intelligence analyst Threat intelligence analyst
Threat hunter* --
Application security analyst* --
Incident response or handler* --
Compliance analyst* --
-- Cybersecurity specialist
-- Vulnerability analyst (now in PenTest+)
Primary job titles remain similar, while secondary job titles are changing along with the industry
*Secondary job titles indicate job roles that require security analyst skills but aren’t full-time security analysts
How industry changes affected job roles
Primary job roles remain the same:
● Continuous security monitoring (security analyst, security engineer
and threat intelligence analyst)
Secondary job roles are changing along with the industry:
● More focus on software security (application security analyst)
● Growing trend of “Going on the offense with defense” (threat
hunter)
● Emphasis on incident response (incident response or handler)
● Increased IT regulatory environments (compliance analyst)
How changes affected exam domains
CS0-002 domains % of exam Equivalent CS0-001 domains % of exam
1.0 Threat and vulnerability
management
22%
1.0 Threat management
2.0 Vulnerability management
27%
26%
2.0 Software and vulnerability
management
18% -- --
3.0 Security operations and monitoring 25% 4.0 Security architecture and tool sets 24%
4.0 Incident response 22% 3.0 Cyber incident response 23%
5.0 Compliance and assessment 13% -- --
There are six main changes between the previous CySA+ CS0-001 exam domains and the new
CS0-002 exam domains.
Six changes to exam domains
1. The Threat Management and Vulnerability Management exam
domains have combined into one because many of these skills are now
covered in Security+, which is earlier in the CompTIA cybersecurity
career pathway.
2. Software security grew into an exam domain. As networks become
more secure across the globe, software risks have grown. The
application security analyst job role is now a covered job role in CySA+.
3. The Security Architecture and Tool Sets domain was distributed
throughout the new domains, as they are applicable to most topics.
Tools are now distributed by topic, instead of all tools listed in one
domain. It is an instructional design improvement.
Six changes to exam domains
4. The Security Operations and Monitoring domain covers how to go
on the offense with defense. Growing job roles such as threat hunter
bring new techniques for finding incidents outside of the security
operations center (SOC).
5. The Incident Response domain has been updated to include more
cloud security environments, embedded/IoT devices and automation.
Job roles such as incident response or handler are included in the
growing list of job roles covered by CySA+.
6. The Compliance and Assessment domain was added because
security analysts must understand how to help their employers comply
to and maintain regulatory compliance to avoid fines. Growing job
roles such as compliance analyst demonstrates the important of
regulatory compliance.
CySA+ CS0-002
CompTIA Cybersecurity Analyst (CySA+)
Domain % of exam
1.0 Threat and vulnerability management 22%
2.0 Software and vulnerability management 18%
3.0 Security operations and monitoring 25%
4.0 Incident response 22%
5.0 Compliance and assessment 13%
The CompTIA Cybersecurity Analyst (CySA+) CS0-002 vendor-neutral certification exam will determine an IT pro’s
ability to proactively defend and continuously improve the security of an organization. It will verify the successful
candidate has the knowledge and skills required to:
● Leverage intelligence and threat detection techniques
● Analyze and interpret data
● Identify and address vulnerabilities
● Suggest preventive measures
● Effectively respond to and recover from incidents
Job titles:
● Security analyst
○ Tier II SOC analyst
○ Security monitoring
● Threat intelligence analyst
● Security engineer
● Application security analyst
● Incident response or handler
● Compliance analyst
● Threat hunter
Organizations that assisted in CySA+ development
● RxSense
● Netflix
● Spohn Consulting, Inc.
● East Tennessee State University
● GEHA
● Johns Hopkins University Applied Physics Laboratory
● University of Maryland University College
● Kirkpatrick Price
● Paylocity
● Stonewatch Security
● Brotherhood Mutual
● Gemalto Canada Inc
● Cyber Strike Solutions, LLC
● DST Systems
● Target
● U.S. Department of Defense
● U.S. Department of Veterans Affairs
● U.S. Navy
● U.S. Treasury Department
● Northrop Grumman
● RICOH USA
● Japan Business Systems (JBS)
● Federal Reserve Bank of Chicago
● Washington State Patrol
● KirkpatrickPrice
● Integra
● Dell SecureWorks
● Linux Professional Institute
● Boulder Community Health
● Western Governors University
● Summit Credit Union
Nearly 2,200 security analysts and/or IT pros assisted with the development of CySA+. Some of the
biggest contributors are listed below.
Performance-based assessment
Recommended free open source
software for training purposes*
Description URL
Wireshark Network protocol analyzer / packet
capture tool
https://www.wireshark.org
Zeek (formerly Bro) and/or Snort Network intrusion detection
systems (NIDS)
https://www.zeek.org
https://www.snort.org
AlienVault Open Source SIEM
(OSSIM) with Open Threat Exchange
(OTX)
Security Information and Event
Management (SIEM) software
https://cybersecurity.att.com/produ
cts/ossim
The CySA+ exam will include hands-on, performance-based simulations.
● To prepare for these performance-based assessments, trainers, educators and publishers
should emphasize open-source analytics tools and teamwork.
CySA+ CS0-002 exam details
Item Description
Exam code CS0-002
Launch Date April 21, 2020
Availability Worldwide
Pricing $359 USD
Testing Provider Pearson VUE Testing Centers
Question Types Performance based and multiple choice
No. of Questions Maximum of 85 questions
Length of Test 165 minutes
Passing Score 750 (on a scale of 100-900)
Languages English
Recommended Experience
Network+, Security+ or equivalent knowledge.
4 years of hands-on information security or related experience.
Exam retirement CS0-001 to retire in October 2020
CySA+ CS0-002 exam objectives
Domain 1.0: Threat and vulnerability management
Exam objectives
1.1 Explain the importance of threat data and intelligence
1.2 Given a scenario, utilize threat intelligence to support organizational security
1.3 Given a scenario, perform vulnerability management activities
1.4 Given a scenario, analyze the output from common vulnerability assessment tools
1.5 Explain the threats and vulnerabilities associated with specialized technology
1.6 Explain the threats and vulnerabilities associated with operating in the cloud
1.7 Given a scenario, implement controls to mitigate attacks and software vulnerabilities
Domain 2.0: Software and systems security
Exam objectives
2.1 Given a scenario, apply security solutions for infrastructure management
2.2 Explain software assurance best practices
2.3 Explain hardware assurance best practices
Domain 3.0: Security operations and monitoring
Exam objectives
3.1 Given a scenario, analyze data as part of security monitoring activities
3.2 Given a scenario, implement configuration changes to existing controls to improve security
3.3 Explain the importance of proactive threat hunting
3.4 Compare and contrast automation concepts and technologies
Domain 4.0: Incident response
Exam objectives
4.1 Explain the importance of the incident response process
4.2 Given a scenario, apply the appropriate incident response procedure
4.3 Given an incident, analyze potential indicators of compromise
4.4 Given a scenario, utilize basic digital forensics techniques
Domain 5.0: Compliance and assessment
Exam objectives
5.1 Understand the importance of data privacy and protection
5.2 Given a scenario, apply security concepts in support of organizational risk mitigation
5.3 Explain the importance of frameworks, policies, procedures and controls
CompTIA Cybersecurity Analyst (CySA+)
Created to address the industry need for IT security analysts.
As attackers have learned to evade traditional
signature-based solutions, an analytics-based
approach has become extremely important. CySA+
applies behavioral analytics to IT security to improve
the overall state of cybersecurity through continuous
security monitoring.
Questions?
Free year of Infosec Skills
($299)
And the winner is ...
Everyone gets a free week
of Infosec Skills.
Then it’s just $34/month
infosecinstitute.com/skills
About us
At Infosec, we believe knowledge is the most
powerful tool in the fight against cybercrime. We
provide the best certification and skills
development training for IT and security
professionals, as well as employee security
awareness training and phishing simulations.
infosecinstitute.com
708.689.0131
33

More Related Content

What's hot

ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
ISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdfISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
ISO 27001
ISO 27001ISO 27001
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
PECB
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
Ralf Braga
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
SandeepK707540
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Edureka!
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
PECB
 
HITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to knowHITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to know
➲ Stella Bridges
 
How to fulfil requirements of ISO 20000:2018 Documents?
How to fulfil requirements of ISO 20000:2018 Documents?How to fulfil requirements of ISO 20000:2018 Documents?
How to fulfil requirements of ISO 20000:2018 Documents?
Global Manager Group
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Edureka!
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
Imran Ahmed
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
technakama
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
Business Beam
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash
 
PwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity ManagementPwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity Management
CA Technologies
 
ISO 20000-1:2018 Awareness and Auditor Training PPT Presentation kit for ITSM
ISO 20000-1:2018 Awareness and Auditor Training PPT Presentation kit for ITSMISO 20000-1:2018 Awareness and Auditor Training PPT Presentation kit for ITSM
ISO 20000-1:2018 Awareness and Auditor Training PPT Presentation kit for ITSM
Global Manager Group
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
Midhun Nirmal
 

What's hot (20)

ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
ISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdfISO 27001 How to accelerate the implementation.pdf
ISO 27001 How to accelerate the implementation.pdf
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
HITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to knowHITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to know
 
Infosec Audit Lecture_4
Infosec Audit Lecture_4Infosec Audit Lecture_4
Infosec Audit Lecture_4
 
How to fulfil requirements of ISO 20000:2018 Documents?
How to fulfil requirements of ISO 20000:2018 Documents?How to fulfil requirements of ISO 20000:2018 Documents?
How to fulfil requirements of ISO 20000:2018 Documents?
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
PwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity ManagementPwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity Management
 
ISO 20000-1:2018 Awareness and Auditor Training PPT Presentation kit for ITSM
ISO 20000-1:2018 Awareness and Auditor Training PPT Presentation kit for ITSMISO 20000-1:2018 Awareness and Auditor Training PPT Presentation kit for ITSM
ISO 20000-1:2018 Awareness and Auditor Training PPT Presentation kit for ITSM
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 

Similar to CompTIA cysa+ certification changes: Everything you need to know

CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
Infosec
 
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
Infosec
 
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
 Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape... Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
NetCom Learning
 
What’s New in CYSA+ Exam (CSO-002).pdf
What’s New in CYSA+ Exam (CSO-002).pdfWhat’s New in CYSA+ Exam (CSO-002).pdf
What’s New in CYSA+ Exam (CSO-002).pdf
infosec train
 
CompTIA CySA+ domains and their Weightage.pptx
CompTIA CySA+ domains and their Weightage.pptxCompTIA CySA+ domains and their Weightage.pptx
CompTIA CySA+ domains and their Weightage.pptx
Infosectrain3
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
IT Governance Ltd
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan MMohan M
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Ignyte Assurance Platform
 
CMMC Breakdown
CMMC BreakdownCMMC Breakdown
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalWilliam McBorrough
 
Professional Designations in IT Governance
Professional Designations in IT GovernanceProfessional Designations in IT Governance
Professional Designations in IT Governance
jkllee
 
Professional designations in it governance
Professional designations in it governanceProfessional designations in it governance
Professional designations in it governance
jkllee
 
CompTIA CySA Domain 3 Security Operations and Monitoring.pptx
CompTIA CySA  Domain 3 Security Operations and Monitoring.pptxCompTIA CySA  Domain 3 Security Operations and Monitoring.pptx
CompTIA CySA Domain 3 Security Operations and Monitoring.pptx
Infosectrain3
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016
Ulf Mattsson
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
Tuan Phan
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Cohesive Networks
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
Brian Matteson, CISSP CISA
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
OSIsoft, LLC
 
CompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateCompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 update
Infosec
 

Similar to CompTIA cysa+ certification changes: Everything you need to know (20)

CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
 
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
 
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
 Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape... Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
 
What’s New in CYSA+ Exam (CSO-002).pdf
What’s New in CYSA+ Exam (CSO-002).pdfWhat’s New in CYSA+ Exam (CSO-002).pdf
What’s New in CYSA+ Exam (CSO-002).pdf
 
CompTIA CySA+ domains and their Weightage.pptx
CompTIA CySA+ domains and their Weightage.pptxCompTIA CySA+ domains and their Weightage.pptx
CompTIA CySA+ domains and their Weightage.pptx
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
CMMC Breakdown
CMMC BreakdownCMMC Breakdown
CMMC Breakdown
 
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_Final
 
Professional Designations in IT Governance
Professional Designations in IT GovernanceProfessional Designations in IT Governance
Professional Designations in IT Governance
 
Professional designations in it governance
Professional designations in it governanceProfessional designations in it governance
Professional designations in it governance
 
CompTIA CySA Domain 3 Security Operations and Monitoring.pptx
CompTIA CySA  Domain 3 Security Operations and Monitoring.pptxCompTIA CySA  Domain 3 Security Operations and Monitoring.pptx
CompTIA CySA Domain 3 Security Operations and Monitoring.pptx
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
CompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateCompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 update
 

More from Infosec

AWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certifiedAWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certified
Infosec
 
AWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certifiedAWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certified
Infosec
 
AWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedAWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certified
Infosec
 
AWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptxAWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptx
Infosec
 
Infosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptxInfosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec
 
How AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxHow AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptx
Infosec
 
NCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxNCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptx
Infosec
 
Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...
Infosec
 
Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...
Infosec
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter most
Infosec
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptx
Infosec
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptx
Infosec
 
How to do application security right
How to do application security rightHow to do application security right
How to do application security right
Infosec
 
A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...
Infosec
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident response
Infosec
 
Get started in cybersecurity in 2022
Get started in cybersecurity in 2022Get started in cybersecurity in 2022
Get started in cybersecurity in 2022
Infosec
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
Infosec
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
Infosec
 
CompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examCompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new exam
Infosec
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industry
Infosec
 

More from Infosec (20)

AWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certifiedAWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certified
 
AWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certifiedAWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certified
 
AWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedAWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certified
 
AWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptxAWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptx
 
Infosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptxInfosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptx
 
How AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxHow AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptx
 
NCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxNCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptx
 
Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...
 
Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter most
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptx
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptx
 
How to do application security right
How to do application security rightHow to do application security right
How to do application security right
 
A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident response
 
Get started in cybersecurity in 2022
Get started in cybersecurity in 2022Get started in cybersecurity in 2022
Get started in cybersecurity in 2022
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
 
CompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examCompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new exam
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industry
 

Recently uploaded

Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 

Recently uploaded (20)

Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 

CompTIA cysa+ certification changes: Everything you need to know

  • 1.
  • 2. Meet your speakers Patrick Lane Guest speaker Director, Certification Product Management CompTIA
  • 4. Agenda ● Why did CompTIA create CySA+? ○ Analyst approach needed ○ Job demand ● Cybersecurity career pathway ● CySA+ CS0-002 updates ● CySA+ CS0-002 certification details ● Q&A
  • 5. Why did CompTIA create CySA+?
  • 6. Lessons learned after 2013-2014 attacks We must apply behavioral analytics to cybersecurity to improve the overall state of cybersecurity ● We must focus on network behavior in an organization’s interior network ● We must identify network anomalies that indicate bad behavior We must train IT security professionals security analyst skills, which include: ● Leverage intelligence and threat detection techniques ● Analyze and interpret data ● Identify and address vulnerabilities ● Suggest preventative measures ● Effectively respond to and recover from incidents
  • 7. COVID-19 security risks Cybersecurity-related headlines in the last 2 weeks! ● Phishing emails sent to sign into your account to get a free bottle of hand sanitizer, open an attachment from your employer on tips to prevent infection or schemes against taxpayers ● Cybercriminals impersonating IT help desks ● Malware used to wipe everything off a computer or corrupt master boot record of Windows machines so the hard drive is unusable – with no financial gain ● Targeting of vulnerabilities in VPN devices and gateway appliances to breach a network ● Attackers will increasingly leverage lures tailored to the new stimulus bill and related recovery efforts, as well as targeting home delivery food apps ● Hackers are disrupting routers’ Domain Name System (DNS) settings as telework surges around the world
  • 8. CompTIA Cybersecurity Analyst (CySA+) Created to address the industry need for IT security analysts. As attackers have learned to evade traditional signature-based solutions, an analytics-based approach has become extremely important. CySA+ applies behavioral analytics to IT security to improve the overall state of cybersecurity through continuous security monitoring.
  • 9.
  • 10. Job growth indicators Information security analyst jobs will grow much faster than average, with 28% growth between 2016 and 2026. 8 in 10 hiring managers indicate that IT security certifications are valuable for validating cybersecurity-related knowledge/skills or evaluating job candidates.* The U.S. Bureau of Labor Statistics (BLS) classifies CySA+ under Information Security Analysts, which includes: • 2018 median pay: $98,350 annual per year • Number of jobs available: 100,000* * Latest pay info from U.S. Bureau of Labor Statistics; Job openings and hiring manager info derived from CompTIA international research reports.
  • 12. Reason for the update: Industry changes Security analyst core job functions remain the same, but additional functions are needed. The job role is a moving target as newer technologies and regulations affect it. ● Core function remains the same: continuous security monitoring ● More focus on software security ● Growing trend of “going on the offense with defense” ● Emphasis on incident response ● Increased IT regulatory environment
  • 13. How industry changes affected job roles New CS0-002 Previous CS0-002 Security analyst - Tier II SOC analyst - Security monitoring Security analyst Security operations center (SOC) analyst Security engineer Security engineer Threat intelligence analyst Threat intelligence analyst Threat hunter* -- Application security analyst* -- Incident response or handler* -- Compliance analyst* -- -- Cybersecurity specialist -- Vulnerability analyst (now in PenTest+) Primary job titles remain similar, while secondary job titles are changing along with the industry *Secondary job titles indicate job roles that require security analyst skills but aren’t full-time security analysts
  • 14. How industry changes affected job roles Primary job roles remain the same: ● Continuous security monitoring (security analyst, security engineer and threat intelligence analyst) Secondary job roles are changing along with the industry: ● More focus on software security (application security analyst) ● Growing trend of “Going on the offense with defense” (threat hunter) ● Emphasis on incident response (incident response or handler) ● Increased IT regulatory environments (compliance analyst)
  • 15. How changes affected exam domains CS0-002 domains % of exam Equivalent CS0-001 domains % of exam 1.0 Threat and vulnerability management 22% 1.0 Threat management 2.0 Vulnerability management 27% 26% 2.0 Software and vulnerability management 18% -- -- 3.0 Security operations and monitoring 25% 4.0 Security architecture and tool sets 24% 4.0 Incident response 22% 3.0 Cyber incident response 23% 5.0 Compliance and assessment 13% -- -- There are six main changes between the previous CySA+ CS0-001 exam domains and the new CS0-002 exam domains.
  • 16. Six changes to exam domains 1. The Threat Management and Vulnerability Management exam domains have combined into one because many of these skills are now covered in Security+, which is earlier in the CompTIA cybersecurity career pathway. 2. Software security grew into an exam domain. As networks become more secure across the globe, software risks have grown. The application security analyst job role is now a covered job role in CySA+. 3. The Security Architecture and Tool Sets domain was distributed throughout the new domains, as they are applicable to most topics. Tools are now distributed by topic, instead of all tools listed in one domain. It is an instructional design improvement.
  • 17. Six changes to exam domains 4. The Security Operations and Monitoring domain covers how to go on the offense with defense. Growing job roles such as threat hunter bring new techniques for finding incidents outside of the security operations center (SOC). 5. The Incident Response domain has been updated to include more cloud security environments, embedded/IoT devices and automation. Job roles such as incident response or handler are included in the growing list of job roles covered by CySA+. 6. The Compliance and Assessment domain was added because security analysts must understand how to help their employers comply to and maintain regulatory compliance to avoid fines. Growing job roles such as compliance analyst demonstrates the important of regulatory compliance.
  • 19. CompTIA Cybersecurity Analyst (CySA+) Domain % of exam 1.0 Threat and vulnerability management 22% 2.0 Software and vulnerability management 18% 3.0 Security operations and monitoring 25% 4.0 Incident response 22% 5.0 Compliance and assessment 13% The CompTIA Cybersecurity Analyst (CySA+) CS0-002 vendor-neutral certification exam will determine an IT pro’s ability to proactively defend and continuously improve the security of an organization. It will verify the successful candidate has the knowledge and skills required to: ● Leverage intelligence and threat detection techniques ● Analyze and interpret data ● Identify and address vulnerabilities ● Suggest preventive measures ● Effectively respond to and recover from incidents Job titles: ● Security analyst ○ Tier II SOC analyst ○ Security monitoring ● Threat intelligence analyst ● Security engineer ● Application security analyst ● Incident response or handler ● Compliance analyst ● Threat hunter
  • 20. Organizations that assisted in CySA+ development ● RxSense ● Netflix ● Spohn Consulting, Inc. ● East Tennessee State University ● GEHA ● Johns Hopkins University Applied Physics Laboratory ● University of Maryland University College ● Kirkpatrick Price ● Paylocity ● Stonewatch Security ● Brotherhood Mutual ● Gemalto Canada Inc ● Cyber Strike Solutions, LLC ● DST Systems ● Target ● U.S. Department of Defense ● U.S. Department of Veterans Affairs ● U.S. Navy ● U.S. Treasury Department ● Northrop Grumman ● RICOH USA ● Japan Business Systems (JBS) ● Federal Reserve Bank of Chicago ● Washington State Patrol ● KirkpatrickPrice ● Integra ● Dell SecureWorks ● Linux Professional Institute ● Boulder Community Health ● Western Governors University ● Summit Credit Union Nearly 2,200 security analysts and/or IT pros assisted with the development of CySA+. Some of the biggest contributors are listed below.
  • 21. Performance-based assessment Recommended free open source software for training purposes* Description URL Wireshark Network protocol analyzer / packet capture tool https://www.wireshark.org Zeek (formerly Bro) and/or Snort Network intrusion detection systems (NIDS) https://www.zeek.org https://www.snort.org AlienVault Open Source SIEM (OSSIM) with Open Threat Exchange (OTX) Security Information and Event Management (SIEM) software https://cybersecurity.att.com/produ cts/ossim The CySA+ exam will include hands-on, performance-based simulations. ● To prepare for these performance-based assessments, trainers, educators and publishers should emphasize open-source analytics tools and teamwork.
  • 22. CySA+ CS0-002 exam details Item Description Exam code CS0-002 Launch Date April 21, 2020 Availability Worldwide Pricing $359 USD Testing Provider Pearson VUE Testing Centers Question Types Performance based and multiple choice No. of Questions Maximum of 85 questions Length of Test 165 minutes Passing Score 750 (on a scale of 100-900) Languages English Recommended Experience Network+, Security+ or equivalent knowledge. 4 years of hands-on information security or related experience. Exam retirement CS0-001 to retire in October 2020
  • 23. CySA+ CS0-002 exam objectives
  • 24. Domain 1.0: Threat and vulnerability management Exam objectives 1.1 Explain the importance of threat data and intelligence 1.2 Given a scenario, utilize threat intelligence to support organizational security 1.3 Given a scenario, perform vulnerability management activities 1.4 Given a scenario, analyze the output from common vulnerability assessment tools 1.5 Explain the threats and vulnerabilities associated with specialized technology 1.6 Explain the threats and vulnerabilities associated with operating in the cloud 1.7 Given a scenario, implement controls to mitigate attacks and software vulnerabilities
  • 25. Domain 2.0: Software and systems security Exam objectives 2.1 Given a scenario, apply security solutions for infrastructure management 2.2 Explain software assurance best practices 2.3 Explain hardware assurance best practices
  • 26. Domain 3.0: Security operations and monitoring Exam objectives 3.1 Given a scenario, analyze data as part of security monitoring activities 3.2 Given a scenario, implement configuration changes to existing controls to improve security 3.3 Explain the importance of proactive threat hunting 3.4 Compare and contrast automation concepts and technologies
  • 27. Domain 4.0: Incident response Exam objectives 4.1 Explain the importance of the incident response process 4.2 Given a scenario, apply the appropriate incident response procedure 4.3 Given an incident, analyze potential indicators of compromise 4.4 Given a scenario, utilize basic digital forensics techniques
  • 28. Domain 5.0: Compliance and assessment Exam objectives 5.1 Understand the importance of data privacy and protection 5.2 Given a scenario, apply security concepts in support of organizational risk mitigation 5.3 Explain the importance of frameworks, policies, procedures and controls
  • 29. CompTIA Cybersecurity Analyst (CySA+) Created to address the industry need for IT security analysts. As attackers have learned to evade traditional signature-based solutions, an analytics-based approach has become extremely important. CySA+ applies behavioral analytics to IT security to improve the overall state of cybersecurity through continuous security monitoring.
  • 31. Free year of Infosec Skills ($299) And the winner is ...
  • 32. Everyone gets a free week of Infosec Skills. Then it’s just $34/month infosecinstitute.com/skills
  • 33. About us At Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We provide the best certification and skills development training for IT and security professionals, as well as employee security awareness training and phishing simulations. infosecinstitute.com 708.689.0131 33