The document outlines the domains, objectives, and weightages for a cybersecurity exam blueprint. It includes 6 domains: 1) security operations and management, 2) understanding cyber threats, IoCs, and attack methodology, 3) incidents, events, and logging, 4) incident detection with security information and event management, 5) enhanced incident detection with threat intelligence, and 6) incident response. The weightage assigned to each domain ranges from 5% to 29% of the total exam.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
70 views3 pages
CSA Blueprint
The document outlines the domains, objectives, and weightages for a cybersecurity exam blueprint. It includes 6 domains: 1) security operations and management, 2) understanding cyber threats, IoCs, and attack methodology, 3) incidents, events, and logging, 4) incident detection with security information and event management, 5) enhanced incident detection with threat intelligence, and 6) incident response. The weightage assigned to each domain ranges from 5% to 29% of the total exam.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3
Domain Objectives Weightage
1. Security Operations and Understand the SOC Fundamentals 5%
Management Discuss the Components of SOC: People, Processes and Technology Understand the Implementation of SOC 2. Understanding Cyber Threats, Describe the term Cyber Threats and Attacks 11% IoCs, and Attack Methodology Understand the Network Level Attacks Understand the Host Level Attacks Understand the Application Level Attacks Understand the Indicators of Compromise (IoCs) Discuss the Attacker’s Hacking Methodology 3. Incidents, Events, and Logging Understand the Fundamentals of Incidents, Events, 21% and Logging Explain the Concepts of Local Logging
Explain the Concepts of Centralized Logging
4. Incident Detection with Understand the Basic Concepts of Security 26%
Security Information and Event Information and Event Management (SIEM) Management (SIEM) Discuss the Different SIEM Solutions
Understand the SIEM Deployment
Learn Different Use Case Examples for Application
Level Incident Detection Learn Different Use Case Examples for Insider Incident Detection Learn Different Use Case Examples for Network Level Incident Detection Learn Different Use Case Examples for Host Level Incident Detection Learn Different Use Case Examples for Compliance
Understand the Concept of Handling Alert Triaging
and Analysis
CSA Exam Blueprint v1 02
5. Enhanced Incident Detection Learn Fundamental Concepts on Threat Intelligence 8% with Threat Intelligence Learn Different Types of Threat Intelligence
Understand How Threat Intelligence Strategy is
Developed Learn Different Threat Intelligence Sources from which Intelligence can be Obtained Learn Different Threat Intelligence Platform (TIP)
Understand the Need of Threat Intelligence-driven
SOC 6. Incident Response Understand the Fundamental Concepts of Incident 29% Response Learn Various Phases in Incident Response Process Learn How to Respond to Network Security Incidents Learn How to Respond to Application Security Incidents Learn How to Respond to Email Security Incidents Learn How to Respond to Insider Incidents Learn How to Respond to Malware Incidents