Career upgrade: Learn practical AI skills for better jobs and higher pay.
Level up
Cheat sheet

CompTIA CySA+ Cheat Sheet

Security Operations

33%of exam

Vulnerability Management

30%of exam

Incident Response Management

20%of exam

IR FlowFrameworksForensicsContainmentEvidence

Reporting and Communication

17%of exam

AudienceMetricsComplianceReportsEscalation

Quick Facts

Exam
CS0-003
Version
CySA+ V3
Questions
Max 85
Time
165 min
Pass
750/900
Format
MCQ + PBQ
Level
Intermediate
Launch
Jun 6 2023

SOC Loop

Collect, correlate, triage, enrich, escalate, tune.

CollectCorrelateTriageEnrichEscalateTune

IOC vs TTP

IOC

  • Hash
  • IP/domain
  • Artifact

TTP

  • Behavior
  • Technique
  • Reusable pattern

Clue vs method

Alert Picker

  1. Many failed logonsPassword attack(Check 4625)
  2. Single odd successAccount takeover(Check 4624)
  3. Random DNS namesDGA hunt(Entropy)
  4. Regular callbacksBeaconing hunt(C2)
  5. LSASS touchedCredential theft(EDR)
  6. Recent domainIntel enrichment(Reputation)
  7. Same alert floodsRule tuning(Noise)
  8. Multiple tools agreeEscalate incident(Correlated)

SOC Flow

Ingest
Collect telemetry
Normalize
Common fields
Correlate
Link events
Triage
Rank alerts
Enrich
Add context
Escalate
Hand off incident
Tune
Reduce noise
Automate
Repeat playbooks

SIEM vs SOAR

SIEM

  • Collect logs
  • Correlate alerts
  • Search events

SOAR

  • Run playbooks
  • Automate tasks
  • Orchestrate tools

See vs act

Telemetry

Syslog
Network device logs
Windows 4624
Successful logon
Windows 4625
Failed logon
DNS logs
Domain lookups
Proxy logs
Web requests
NetFlow
Traffic metadata
EDR
Endpoint behavior
Cloud audit
API activity

Threat Intel

Strategic
Executive trends
Operational
Campaign details
Tactical
TTP mapping
Technical
IOCs
STIX
Intel format
TAXII
Intel transport
Confidence
Source reliability
Relevance
Environment fit

Malware Cues

DGA
Random domains
Beaconing
Regular callbacks
PowerShell
Script abuse
LSASS access
Credential theft
Masquerade
Fake legitimate name
Injection
Code in process
Persistence
Survive reboot
Exfil
Data leaves

Risk Stack

Severity plus exposure plus exploitability plus value.

CVSSExposureExploitAsset

Credentialed vs Uncredentialed

Credentialed

  • Authenticated
  • Patch detail
  • Config depth

Uncredentialed

  • Attacker view
  • Surface only
  • Fewer details

Inside vs outside

Vuln Picker

  1. Internet-facing criticalPatch first(High exposure)
  2. Known exploitedEmergency change(KEV)
  3. Patch blockedCompensating control(Document)
  4. Scanner doubtfulValidate finding(False positive)
  5. Legacy systemSegment monitor(Plan replace)
  6. Web exploit riskWAF rule(Virtual patch)
  7. Cloud exposureFix IAM(Least privilege)
  8. Production riskMaintenance window(Change control)

Scan Types

Credentialed
Authenticated depth
Uncredentialed
External view
Agent
Host resident
Agentless
Network reach
Active
Probe targets
Passive
Observe traffic
Static
Code review
Dynamic
Runtime testing

Risk Factors

CVSS
Base severity
EPSS
Exploit likelihood
KEV
Known exploited
Exposure
Reachable target
Criticality
Business value
Exploit code
Attack available
Compensating
Alternate control
Exception
Approved delay

Mitigation

Patch
Fix software
Harden
Secure config
Segment
Limit reach
WAF
Virtual patch
IPS rule
Block exploit
MFA
Reduce account risk
Allowlist
Constrain execution
Replace
Retire legacy

Cloud Findings

Public bucket
Data exposure
Open SG
Wide ingress
No MFA
Weak admin
Excess IAM
Overprivilege
No logging
Blind activity
Stale keys
Credential risk
CSPM
Posture checks
Kubernetes
Cluster surface

IR Order

Prepare, detect, contain, eradicate, recover, learn.

PrepareDetectContainEradicateRecoverLearn

Contain vs Eradicate

Contain

  • Stop spread
  • Isolate host
  • Preserve evidence

Eradicate

  • Remove malware
  • Close vector
  • Fix root cause

Limit vs remove

Incident Picker

  1. Incident unclearAnalyze scope(Identify)
  2. Host activeCapture RAM(Volatile)
  3. Spread ongoingContain first(Isolate)
  4. Root cause knownEradicate(Remove)
  5. Clean rebuild readyRecover(Restore)
  6. Evidence neededForensic image(Hash)
  7. Process gap foundLessons learned(Improve)
  8. Legal triggerEscalate counsel(Notice)

IR Flow

Prepare
Plans ready
Detect
Find incident
Analyze
Scope impact
Contain
Limit spread
Eradicate
Remove cause
Recover
Restore service
Lessons
Improve process
RCA
Root cause

Frameworks

ATT&CK
Tactics techniques
Kill Chain
Attack stages
Diamond
Actor relation
D3FEND
Defensive techniques
OSSTMM
Testing methodology
OWASP
Web testing
Playbook
Repeat procedure
Tabletop
Exercise response

Forensics

Volatile
Capture first
RAM
Live evidence
Hash
Integrity proof
Image
Bit copy
Chain
Custody trail
Static
No execution
Dynamic
Sandbox behavior
Timeline
Event sequence

Report Fit

Audience decides detail, tone, metrics, timing.

AudienceDetailToneMetricTiming

MTTD vs MTTR

MTTD

  • Detection lag
  • Monitoring quality
  • Before triage

MTTR

  • Response duration
  • Recovery quality
  • After detection

Find vs fix

Audience

Executive
Risk impact
Technical
IOCs steps
Legal
Obligations
PR
Public message
Regulator
Required notice
Customer
Impact guidance
Owner
Remediation action
Board
Strategic risk

Executive vs Technical

Executive

  • Risk impact
  • Cost priority
  • Business action

Technical

  • IOCs
  • Commands
  • Remediation steps

Why vs how

Metrics

MTTD
Detect speed
MTTR
Respond speed
MTTC
Contain speed
SLA
Service promise
SLO
Target objective
False positive
Benign alert
Backlog
Open work
Trend
Direction change

Compliance

PCI DSS
Cardholder data
HIPAA
Health data
GDPR
EU privacy
SOX
Financial controls
NIST CSF
Risk framework
NICE
Work roles
Audit log
Accountability record
Data class
Handling level

Common Traps

CVSS Is Not Priority

Score only Risk context

IOC Is Not Attribution

Artifact clue Actor proof

Contain Is Not Clean

Spread limited Cause remains

Logs Are Not Evidence

Operational record Preserved artifact

SOAR Is Not SIEM

Automation workflow Event correlation

Executive Needs Impact

Business risk Packet detail

Last Minute

  1. 1.Security Operations is 33%
  2. 2.Vulnerability Management is 30%
  3. 3.Incident Response is 20%
  4. 4.Reporting Communication is 17%
  5. 5.SIEM correlates; SOAR automates
  6. 6.IOC clue; TTP behavior
  7. 7.Risk equals severity plus context
  8. 8.Contain before eradication
  9. 9.Capture volatile evidence first
  10. 10.Reports match stakeholder audience
Same family resources

Explore More CompTIA Certifications

Continue into nearby exams from the same family. Each card keeps practice questions, study guides, flashcards, videos, and articles in one place.