CySA+: History

Introduction

Sometimes the best way to understand something is to use the lens of history. By looking back, it’s possible to get a better idea of what why something was done or the environment in which something emerged. 

Surprisingly, this also applies to certification exams. CySA+ is literally a product of its time — addressing a need that has been paramount to the business world in recent years. 

This article will detail the CySA+ exam’s history: where it came from, where it has been and where it is today. This is a relatively new information security certification, and understanding its history will point us to where it’s going in the future.

What is CySA+?

The Cyber Security Analyst, or CySA+ certification, is hosted by CompTIA and is considered an intermediate professional IT workforce certification. CySA+ is a vendor-neutral certification and falls somewhere between Security+ and CASP. This certification verifies a professional level of proficiency in detecting, preventing and combating cyberattacks against an organization’s network and devices. 

Examples on a more micro level of what CySA+ certifies include performing data analysis to identify vulnerabilities, threats and risks, configuring and using threat detection tools, and securing organization systems and applications.

When CySA+ was born

This relatively recent certification first appeared on the scene in early 2017. To fully understand why CySA+ was created, it will help to look at how the way things were leading up to 2017. Frankly, the world was in worse shape in terms of cybersecurity than ever before. Between the Dyn DDoS attack, ransomware and what was called the “largest data breach in history” to strike Yahoo, things were looking bleak on the information security front.

Thus, in the midst of the worst information security landscape in history, CompTIA premiered its CySA+ certification in February (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/Wd7LwqKCxLU/