Search Pass4Sure

CompTIA CySA+: The Certification for SOC and Threat Intelligence Roles

What CompTIA CySA+ CS0-003 tests beyond Security+, the operational focus of the Security Operations and Vulnerability Management domains, CVSS scoring, and how to prepare with hands-on SIEM practice.

CompTIA CySA+: The Certification for SOC and Threat Intelligence Roles

Security+ is the entry point. CySA+ is where you go when Security+ isn't enough depth for the role you're in — or targeting. The CS0-003 exam tests operational security analytics: reading SIEM dashboards, correlating indicators, responding to incidents, and communicating findings to stakeholders. It's designed for candidates who are doing SOC analyst or threat intelligence work, not preparing for it theoretically.

That specific operational focus is what distinguishes CySA+ from Security+ and makes it valuable rather than redundant.


What CySA+ Tests That Security+ Doesn't

Security+ covers the breadth of security concepts at an introductory level. CySA+ covers a narrower subset at significantly greater depth.

CySA+ Domain Weight
Security Operations 33%
Vulnerability Management 30%
Incident Response Management 20%
Reporting and Communication 17%

Security Operations at 33% and Vulnerability Management at 30% together account for 63% of the exam. A candidate who masters these two domains has the foundation to pass.

The operational depth difference:

Security+ asks: "What is a SIEM?" (definition and purpose) CySA+ asks: "Given this SIEM alert showing 15 failed logins from the same IP followed by successful login and access to HR files, what is the most likely threat scenario and what should the analyst do first?" (applied judgment)

This is the distinction between knowing what tools are and knowing how to use them.


Domain 1: Security Operations (33%)

Threat Intelligence Integration

Threat intelligence on CySA+ is a working tool, not a concept to define.

STIX/TAXII: structured threat intelligence standards.

  • STIX (Structured Threat Information eXpression): format for describing threat intelligence

  • TAXII (Trusted Automated eXchange of Intelligence Information): transport protocol for sharing threat intelligence

  • Together: machine-readable threat intelligence sharing between organizations and platforms

Threat intelligence types:

  • Strategic: high-level, for executives — "ransomware targeting our industry is increasing"

  • Operational: campaign-specific — "threat actor X is using this malware family in this region"

  • Tactical: IOCs — specific file hashes, IP addresses, domains

  • Technical: vulnerability details, exploit code

MITRE ATT&CK for detection engineering: CySA+ tests ATT&CK at a depth beyond what Security+ covers. Candidates need to map observed behaviors to ATT&CK techniques (not just know the framework exists) and understand how detection rules are built from ATT&CK technique knowledge.

Log Analysis and SIEM

Log sources and what they reveal:

  • Windows Security Event Logs: authentication events (4624, 4625, 4648), privilege escalation (4672, 4673), object access (4663)

  • Syslog (network devices): configuration changes, authentication, interface events

  • Web server logs: HTTP methods, status codes, user agents, referrers

  • DNS logs: query patterns, NXDOMAIN responses, large TXT queries

  • NetFlow: communication patterns, volume anomalies, unusual port usage

SIEM query skills: CySA+ doesn't test a specific SIEM syntax (Splunk SPL, KQL) but tests the conceptual ability to construct queries — filtering by time, correlating multiple event types, identifying anomalies in baseline behavior.

"CySA+ is the first CompTIA exam that requires you to think operationally. Reading log samples on the exam isn't about knowing what format they're in — it's about recognizing that the sequence of events in those logs represents a specific attack pattern. That pattern recognition takes hands-on exposure to develop." — Pete Herzog, security training developer, ISECOM


Domain 2: Vulnerability Management (30%)

Vulnerability Scanning vs Penetration Testing

A common confusion the exam tests:

Vulnerability scanning: automated, non-exploitative identification of vulnerabilities. Tools (Nessus, OpenVAS) query systems for known CVEs, misconfigurations, and missing patches. Output: list of vulnerabilities with severity ratings.

Penetration testing: manual, exploitative attempt to compromise systems within authorized scope. Confirms whether vulnerabilities are exploitable and what an attacker could actually access.

When each is used: vulnerability scanning is ongoing (weekly/monthly). Penetration testing is periodic (annual) or triggered by major changes. They answer different questions: scanning asks "what vulnerabilities exist?" and pen testing asks "can they actually be exploited?"

CVSS Scoring

CVSS (Common Vulnerability Scoring System): standardized severity scoring for vulnerabilities. The exam tests CVSS v3.1:

Score range Severity
0.0 None
0.1-3.9 Low
4.0-6.9 Medium
7.0-8.9 High
9.0-10.0 Critical

Base score components:

  • Attack Vector: Network (remote), Adjacent, Local, Physical

  • Attack Complexity: Low (no special conditions) or High

  • Privileges Required: None, Low, or High

  • User Interaction: None or Required

  • Scope: Unchanged or Changed (does the vulnerability affect components beyond the vulnerable one?)

  • Confidentiality, Integrity, Availability Impact: None, Low, or High each

The exam presents scenarios and asks whether a vulnerability should be prioritized. Critical CVSS score alone doesn't always mean "fix immediately" — context matters (is the system internet-exposed? is compensating control in place?).

Remediation Prioritization

CySA+ tests vulnerability prioritization beyond CVSS scores:

Factors that increase urgency:

  • Vulnerability is being actively exploited in the wild (known exploitation — CISA KEV catalog)

  • System is internet-facing

  • Vulnerability enables lateral movement or privilege escalation

  • Business-critical system

Factors that reduce urgency:

  • Compensating control in place (firewall blocks the attack vector)

  • Low-value system (test environment, non-critical workload)

  • Exploit requires local access and system has no local users

CISA KEV (Known Exploited Vulnerabilities): the US Cybersecurity and Infrastructure Security Agency maintains a catalog of CVEs with confirmed exploitation in the wild. Federal agencies are required to patch KEV catalog items by specified deadlines. CySA+ tests this as a prioritization tool.


Domain 3: Incident Response Management (20%)

The Incident Response Process

CySA+ goes deeper than Security+ on incident response by testing the judgment calls within each phase, not just the phases themselves.

Triage and prioritization: when multiple alerts fire simultaneously, analysts must triage by potential impact and confidence level. High-confidence indicators of active intrusion take priority over low-confidence anomalies.

Containment decisions: the tradeoff between isolating a compromised system (limits damage, disrupts attacker) and maintaining observation (allows collection of attacker TTPs, preserves forensic evidence). CySA+ tests when to contain vs observe.

Evidence collection sequence: order matters for evidence volatility.

  • CPU cache and registers (most volatile)

  • Network connections and processes

  • Memory (RAM)

  • Temporary files and swap

  • Disk (least volatile but still can change)

  • Remote logs

Collecting evidence in the wrong order can destroy more volatile evidence before it's captured.

Forensic Concepts

CySA+ tests digital forensics at a conceptual level relevant to incident response:

Write blockers: hardware or software that prevents writes to evidence media during acquisition. Essential for maintaining forensic integrity.

Disk imaging: byte-for-byte copy of a storage device. Hash the source and verify the image hash matches — confirms no modification during acquisition.

Memory forensics: capturing RAM contents for analysis. Reveals running processes, network connections, encryption keys, and artifacts not present on disk (fileless malware lives exclusively in memory).


Domain 4: Reporting and Communication (17%)

This domain surprises candidates who expect a purely technical exam. CySA+ tests whether you can communicate security findings to different audiences.

Executive reports: translate technical findings into business impact. A CVSS 9.8 vulnerability means nothing to an executive — "this flaw allows an attacker to access all customer records without authentication" is what matters.

Technical reports: full detail including affected systems, CVE references, reproduction steps, remediation guidance.

Metrics and KPIs: Mean Time to Detect (MTTD), Mean Time to Respond (MTTR), patching SLA compliance rates. CySA+ tests what these metrics measure and what they indicate about security program effectiveness.


Preparing for CySA+

Prerequisite: Security+ knowledge is the practical prerequisite even if not formally required. CySA+ assumes you know the foundational security concepts — it won't re-teach CIA triad, authentication factors, or what a firewall does.

Hands-on preparation is more important than for Security+: unlike Security+, which can be passed with strong video + practice exam preparation, CySA+ benefits significantly from actual SIEM experience. Free options:

  • Splunk Free: 500 MB/day data ingestion, sufficient for lab scenarios

  • Elastic SIEM (OpenSearch): open-source, can run locally

  • TryHackMe / BlueTeamLabs.online: curated SOC analyst scenarios with real logs

Jason Dion's CySA+ course and Mike Chapple's CompTIA CySA+ Study Guide are the two most consistently recommended resources.

Target practice score: 80%+ on Dion practice exams before booking. CySA+ passes at 750/900.


CS0-003 Domain Breakdown: What Changed in the 2023 Update

CySA+ updated from CS0-002 to CS0-003 in June 2023. The domain structure changed significantly. Candidates using CS0-002 study materials for the current exam will have coverage gaps.

CS0-002 vs CS0-003 Domain Comparison

CS0-002 Domain Weight CS0-003 Domain Weight
Threat and Vulnerability Management 22% Security Operations 33%
Software and Systems Security 18% Vulnerability Management 30%
Security Operations and Monitoring 25% Incident Response Management 20%
Incident Response 22% Reporting and Communication 17%
Compliance and Assessment 13%

What CS0-003 added or expanded:

  • Cloud security operations content (cloud SIEM, container security monitoring)

  • Threat hunting methodology as an active SOC function (not just reactive monitoring)

  • Updated MITRE ATT&CK coverage reflecting ATT&CK v13+

  • Expanded reporting and communication as a standalone domain (was embedded in other domains)

  • Identity and access management anomaly detection

What CS0-003 reduced:

  • Compliance and assessment content (moved to a lighter treatment within Security Operations)

  • Software security development concepts (now lighter, CASP+ covers this depth)


Specific Tools Tested on CySA+

The CS0-003 exam references tools by category and function rather than vendor-specific syntax. Knowing what these tools do and when analysts use them is sufficient for the exam.

Splunk for Log Analysis

Splunk is the most widely referenced SIEM platform in CySA+ exam questions. The exam doesn't test SPL (Splunk Processing Language) syntax specifically, but tests the conceptual approach:

  • Search and investigation workflow: submit a search, filter by time, add field filters, extract patterns

  • Dashboard interpretation: recognizing what a spike in failed authentication events over time means

  • Alert configuration: threshold-based (more than 10 failed logins in 5 minutes) and correlation-based alerts

Free practice environment: Splunk's free tier (splunk.com/free) allows 500 MB/day ingestion. Combined with the Boss of the SOC (BOTS) dataset — synthetic enterprise attack scenarios available for free on Splunk's website — you can practice real incident investigation using Splunk queries.

BOTS dataset scenarios include:

  • APT-style attack chain investigation

  • Ransomware deployment tracking

  • Data exfiltration via DNS detection

  • Credential stuffing attack investigation

These are exactly the scenario types that appear in CySA+ Security Operations questions.

Wireshark for Traffic Analysis

Wireshark appears in CySA+ questions about network intrusion analysis and forensic investigation.

CySA+ relevant Wireshark skills:

  • Reading TCP stream to reconstruct communication (Follow TCP Stream)

  • Filtering by protocol, IP address, or port: tcp.port == 443, ip.addr == 10.0.0.1

  • Identifying scan patterns in packet captures (many SYN packets to sequential ports)

  • Recognizing protocol anomalies (HTTP traffic on port 443, DNS responses unusually large)

Free PCAP sources for practice:

  • Wireshark sample captures (wiki.wireshark.org/SampleCaptures)

  • Malware Traffic Analysis (malware-traffic-analysis.net) — real malware PCAPs with analysis guides

  • PCAP exercises on TryHackMe and BlueTeamLabs.online


Threat Intelligence Domain: What It Tests vs What Candidates Expect

Many candidates study threat intelligence as a conceptual topic — types of intelligence, sharing frameworks, IOC definitions — and then fail questions that require applied intelligence work.

What candidates think the domain tests:

  • Definitions of STIX, TAXII, MISP

  • Types of threat intelligence (strategic, operational, tactical, technical)

  • Names of threat intelligence sharing platforms

What the domain actually tests:

  • Given a set of IOCs, determine which ones are high-confidence indicators of a specific threat actor

  • Given an ATT&CK technique (T1059.001 — PowerShell), what detection method would identify it in logs?

  • Given threat intelligence reporting that an APT group uses a specific C2 infrastructure, what immediate defensive action is warranted?

  • Determining whether intelligence is actionable given your environment's visibility and tooling

"The threat intelligence section of CySA+ separates candidates who read about threat intelligence from candidates who use it. If you've built detection rules from ATT&CK techniques, correlated IOCs against your logs, or written threat intelligence reports, the exam questions feel straightforward. If you've only read definitions, the applied questions catch you." — Josh Lemon, SANS certified instructor, cybersecurity threat intelligence specialist

NIST Incident Response Phases Mapped to CySA+ Questions

CySA+ maps heavily to the NIST SP 800-61 incident response framework. Understanding how exam questions map to NIST phases eliminates confusion.

NIST Phase CySA+ Focus Typical Question Type
Preparation IR plan components, playbooks, tool deployment "Which activity belongs in the preparation phase?"
Detection and Analysis SIEM alert triage, IOC identification, severity determination "A SOC analyst receives this alert. What is the next action?"
Containment Isolation strategies, evidence preservation tradeoffs "Should the analyst isolate the system or maintain observation?"
Eradication Root cause analysis, malware removal, patch application "Which action removes the root cause vs addresses symptoms?"
Recovery System restoration, monitoring post-recovery "After restoring from backup, what is the priority action?"
Post-Incident Activity Lessons learned, reporting, metric updates "Which document captures lessons learned?"

The most commonly tested phase boundary: the tradeoff between Detection and Analysis (continue observing to gather evidence) and Containment (isolate to limit damage). CySA+ questions present this as a judgment call based on the specific scenario, not a fixed rule.


CySA+ as a Bridge: From Security+ to CASP+

CySA+ occupies the operational middle ground in the CompTIA security stack. Understanding where it sits helps candidates plan the full path.

CompTIA Security Certification Stack:

Certification Level Focus Primary Audience
Security+ Associate Broad security concepts Entry-level security roles
CySA+ Intermediate Security analytics, SOC operations SOC analyst, threat hunter
PenTest+ Intermediate Penetration testing methodology Pentesters, red team
CASP+ Expert Security architecture, risk management Senior security architects

CySA+ bridges Security+ and CASP+ specifically in the operations direction. A candidate who passes Security+ → CySA+ → CASP+ builds progressively from conceptual security knowledge (Security+) through operational analytics (CySA+) to enterprise architecture and risk management (CASP+).

DoD 8570/8140 compliance value:

  • CySA+ satisfies CSSP Analyst (DCWF Work Role 511) under DoD 8140

  • This is the primary driver for government and DoD contractor candidates choosing CySA+ over alternative intermediate certifications

  • CASP+ satisfies CSSP Infrastructure Support, IASAE Level I and II


Lab Resources: TryHackMe and Splunk BOTS

For candidates who need to build the hands-on exposure that makes CySA+ operational questions answerable:

TryHackMe SOC Analyst Level 1 Path (tryhackme.com):

  • 10+ hours of structured exercises covering log analysis, SIEM use, network analysis, and threat intelligence

  • Practical scenarios using realistic log data and simulated SIEM interfaces

  • Free tier provides access to the core learning path; premium ($14/month) unlocks machines for practice

Splunk BOTS (Boss of the SOC) dataset:

  • Create a free Splunk account at splunk.com

  • Download the BOTS v1, v2, or v3 dataset

  • Load into Splunk Free

  • Work through the challenge questions — these replicate the analytical complexity of CySA+ Security Operations questions

BlueTeamLabs.online (free and premium):

  • Investigation labs with PCAP analysis, log analysis, and memory forensics scenarios

  • Difficulty ratings from easy (Security+ level) to hard (CASP+ level)

  • CySA+ candidates should target the medium-difficulty investigations

Candidates who complete the TryHackMe SOC Level 1 path and work through 3-4 BOTS scenarios before the exam consistently report that the Security Operations questions feel manageable, while the Reporting and Communication domain remains the unexpected difficulty point.


See also: CompTIA Security+: the most important cert in IT security, CompTIA CASP+: the expert-level cert most people overlook]

References

Frequently Asked Questions

What is the difference between Security+ and CySA+?

Security+ covers a broad range of security concepts at introductory depth. CySA+ covers security operations, vulnerability management, and incident response at applied operational depth. Security+ asks 'what is a SIEM?' — CySA+ gives you SIEM output and asks you to identify the threat scenario and appropriate response.

Do I need Security+ before CySA+?

CompTIA recommends Security+ before CySA+ but doesn't enforce it. Security+ knowledge is a practical prerequisite — CySA+ assumes foundational security concepts are understood and builds operational depth on top of them. Attempting CySA+ without Security+ knowledge significantly increases difficulty.

Is CySA+ good for SOC analyst roles?

Yes. CySA+ is the CompTIA certification most directly aligned with Tier 1-2 SOC analyst work: log analysis, SIEM triage, vulnerability prioritization, incident response procedures. It validates operational skills that hiring managers in security operations specifically look for.

What is CVSS scoring and how is it tested on CySA+?

CVSS (Common Vulnerability Scoring System) rates vulnerability severity 0-10. CySA+ tests the base score components (attack vector, complexity, privileges, scope, CIA impact) and how to use CVSS alongside contextual factors (active exploitation, compensating controls, system criticality) for prioritization decisions.

How important is hands-on experience for CySA+?

More important than for Security+. CySA+ scenarios require pattern recognition from log analysis that's difficult to develop purely from reading. Free hands-on practice via Splunk Free, TryHackMe's SOC analyst path, or BlueTeamLabs.online significantly improves performance on the applied log analysis questions.