From the course: CompTIA Cybersecurity Analyst (CySA+) (CS0-003) Cert Prep
The CySA+ exam
From the course: CompTIA Cybersecurity Analyst (CySA+) (CS0-003) Cert Prep
The CySA+ exam
- [Instructor] The CySA+ exam is a computer-based test that you'll take in a CompTIA approved testing center or in your home or office via online proctoring. The current version of the exam, CS0-003, was launched in 2023 and will likely remain available through 2026. The exam lasts for 165 minutes, and it contains a variable number of questions, but you won't see more than 85 questions on your exam. The questions on the exam cover four domains of cybersecurity analyst knowledge. These include security operations, vulnerability management, incident response and management, and reporting and communication. The questions on the exam come in two formats. The vast majority of the questions will be multiple choice questions, providing you with a question followed by four possible answer choices, one of which is correct. Your exam might also include performance-based questions that require you to manipulate objects on the screen. I'll cover those more later in this course. To pass the exam, you'll need to achieve a score of at least 750 on a scale ranging from 100 to 900. You can register for the exam online using a two step process. First, you'll need to go to the CompTIA website and purchase an exam voucher. You'll need to pay the exam registration fee at the time of your voucher purchase. At the time we're recording this course, the fee is $392 in the United States or an equivalent amount in other local currencies. This fee is subject to change however. As a CompTIA delivery partner, we're able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please see the instructions in the text below this video. Once CompTIA processes your payment, you'll receive an email message including your voucher number. Keep this number private because it's your key to register for the exam. After you receive your voucher, you can register for your exam on the Pearson Vue website. You'll be able to choose a testing facility and a time that's convenient for your schedule. It's really important to note that exam vouchers expire 12 months after purchase. You must actually complete the exam prior to your voucher expiration date. Failure to meet this deadline will require that you purchase a new exam voucher, so it's a good idea to only purchase your voucher when you're actually ready to schedule your exam. You are allowed to reschedule your exam if something comes up, but you must do so at least 24 hours prior to the time of your exam. If you don't cancel on time and you fail to show up for your appointment, Pearson will mark your voucher as used and you'll be out almost 400 bucks.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Identification, authentication, authorization, and accounting3m 34s
-
(Locked)
Usernames and access cards3m 23s
-
(Locked)
Biometrics2m 42s
-
(Locked)
Authentication factors4m 25s
-
(Locked)
Multifactor authentication2m 35s
-
(Locked)
Something you have4m 24s
-
(Locked)
Password authentication protocols3m 10s
-
(Locked)
Single sign-on and federation3m 9s
-
(Locked)
Passwordless authentication1m 48s
-
(Locked)
Privileged access management2m 31s
-
(Locked)
Cloud access security brokers5m 15s
-
(Locked)
-
-
(Locked)
OWASP Top 105m 36s
-
(Locked)
Prevent SQL injection4m 25s
-
(Locked)
Understand cross-site scripting4m 46s
-
(Locked)
Request forgery4m 8s
-
(Locked)
Privilege escalation1m 56s
-
(Locked)
Directory traversal3m 6s
-
(Locked)
File inclusion1m 46s
-
(Locked)
Overflow attacks3m 21s
-
(Locked)
Cookies and attachments4m 6s
-
(Locked)
Session hijacking4m 8s
-
(Locked)
Race conditions2m 13s
-
(Locked)
Memory vulnerabilities3m 34s
-
(Locked)
Code execution attacks2m 43s
-
(Locked)
Data poisoning55s
-
(Locked)
Third-party code3m 38s
-
(Locked)
Interception proxies5m 22s
-
(Locked)
-
-
(Locked)
Input validation2m 41s
-
(Locked)
Parameterized queries3m
-
(Locked)
Authentication and session management issues1m 49s
-
(Locked)
Output encoding3m 13s
-
(Locked)
Error and exception handling3m
-
(Locked)
Code signing2m 8s
-
(Locked)
Database security3m 53s
-
(Locked)
Data de-identification2m 44s
-
(Locked)
Data obfuscation2m 12s
-
(Locked)
-
-
(Locked)
Build an incident response program4m 13s
-
(Locked)
Creating an incident response team2m 15s
-
(Locked)
Incident communications plan2m 44s
-
(Locked)
Incident identification4m 26s
-
(Locked)
Escalation and notification2m 29s
-
(Locked)
Mitigation2m 20s
-
(Locked)
Containment techniques3m
-
(Locked)
Incident eradication and recovery5m 39s
-
(Locked)
Validation2m 24s
-
(Locked)
Post-incident activities4m 17s
-
(Locked)
Incident response exercises1m 37s
-
(Locked)
-
-
(Locked)
Conducting investigations3m 50s
-
(Locked)
Evidence types3m 28s
-
(Locked)
Introduction to forensics3m 21s
-
(Locked)
System and file forensics4m 26s
-
(Locked)
File carving3m 46s
-
(Locked)
Creating forensic images5m 30s
-
(Locked)
Digital forensics toolkit2m 25s
-
(Locked)
Operating system analysis6m 9s
-
(Locked)
Password forensics7m 16s
-
(Locked)
Network forensics4m 1s
-
(Locked)
Software forensics4m 25s
-
(Locked)
Mobile device forensics1m 10s
-
(Locked)
Embedded device forensics2m 30s
-
(Locked)
Chain of custody1m 50s
-
(Locked)
Ediscovery and evidence production3m 3s
-
(Locked)