If you are currently are or plan to be a cybersecurity analyst and do not yet have a certification for this career path, there is now a certification that may give your career the boost you are looking for. This vendor-neutral certification is considered intermediate to mid-career and will prove to organizations that you have the knowledge and skills needed to spearhead cybersecurity operations, either as a standalone information security professional or as part of a security team.
The article you are about to read will explore the CySA+ certification. We’ll look at the different domains of knowledge the certification exam will cover, who is looking for professionals with this certification and what you can expect from the certification renewal process.
What is the CySA+ certification?
The Cyber Security Analyst certification, hosted by CompTIA, is one of the latest cybersecurity certifications available. With the first version of the test being released in 2017, this certification validates that the certification holder’s competency with the following:
- Performing data analysis with the ability to identify vulnerabilities, risks and threats
- Configuring, managing and using threat-detection tools
- Securing and protecting organization systems and applications
The CySA+ certification exam is comprised of 85 maximum questions and candidates have a maximum of 165 minutes to complete the exam. Candidates must earn at least a score of 750 out of 900 to pass the exam. Candidates will be expected to have earned at least Security+, Network+ or equivalent and to have at least three to four years’ professional experience in information security. When you earn this certification, it will last for three years.
CySA+ domains of knowledge
The CySA+ certification exam covers four domains of knowledge. These domains are:
- 1.0 Threat management
- 2.0 Vulnerability management
- 3.0 Cyber incident response
- 4.0 Security (Read more...)
*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/grbzU6Y38SM/