CompTIA Cybersecurity Analyst CySA+ Study Notes
CompTIA Cybersecurity Analyst CySA+ Study Notes
o File structure – A file structure is the way files and folders are
organized on a computer or storage system. It helps keep data
organized in a hierarchy, where folders (or directories) contain files
and may also contain subfolders, creating a structured path to each
2
Infrastructure concepts
Network architecture
3
Host-related
o Processor consumption – Processor consumption refers to the
amount of CPU power being used by applications and processes on
a system. High processor consumption can slow down system
performance and may indicate intensive tasks or potential issues
like malware. Monitoring CPU usage helps maintain optimal system
performance and detect unusual activity.
Application-related
o Anomalous activity – Application-related anomalous activity
refers to unusual or unexpected behavior in software applications,
such as sudden spikes in resource usage, unexpected network
connections, or abnormal user actions. This behavior may indicate
potential security issues, like malware or misuse, and monitoring it
helps identify and respond to threats early.
Tools
o Packet capture – Packet capture is the process of intercepting
and recording data packets traveling over a network. This
technique allows network administrators and security analysts to
analyze network traffic for troubleshooting, performance
monitoring, or identifying potential security threats. Packet capture
helps provide insights into network behavior and detect unusual or
malicious activity.
Common techniques –
o Pattern recognition – Pattern recognition is the process of
identifying recurring structures, sequences, or behaviors within
data. In cybersecurity, it helps detect anomalies, such as unusual
network activity or suspicious file behaviors, by recognizing known
threat patterns. Pattern recognition is key to detecting potential
security threats early and improving response times.
Programming languages/scripting –
o JavaScript Object Notation (JSON) – JavaScript Object Notation
(JSON) is a lightweight data format used to store and transmit data
between a server and a web application. It is easy to read and write
for both humans and machines, using a structure of key-value pairs
and arrays to organize data. JSON is widely used for its
simplicity and efficiency in web development and APIs.
Threat actors –
o Advanced persistent threat (APT) – An Advanced Persistent
Threat (APT) is a prolonged and targeted cyberattack in which
attackers infiltrate a network to steal data or disrupt operations
over an extended period. APTs are often highly sophisticated, using
stealthy techniques to remain undetected and maintain long-term
access. They typically target sensitive organizations like
government agencies or corporations, posing serious security risks.
o Insider threat
16
o Closed source
Paid feeds
Information sharing organizations
Internal sources
Threat hunting –
o Indicators of compromise (IoC)
Collection
Analysis
Application –
o Focus areas
Configurations/ misconfigurations
Isolated networks
Business-critical assets and processes –
o Active defense –
o Honeypot
Standardize processes –
o Identification of tasks suitable for automation
Repeatable/do not require human interaction –
o Team coordination to manage and facilitate automation
Streamline operations –
o Automation and orchestration
Security orchestration, automation, and response (SOAR) –
o Orchestrating threat intelligence data
Data enrichment
Threat feed combination –
o Minimize human engagement
Technology and tool integration –
o Application programming interface (API) –
o Webhooks –
o Plugins
Tools –
o Network scanning and mapping o
Angry IP Scanner o
Maltego –
o Web application scanners o
Burp Suite o
Zed Attack Proxy (ZAP) o
Arachni o
Nikto –
o Vulnerability scanners o
Nessus o
OpenVAS,
o Debuggers o
Immunity debugger o
GNU debugger (GDB) –
o Multipurpose o
Nmap o
Metasploit framework (MSF) o
Recon-ng –
o Cloud infrastructure assessment tools o
Scout Suite o
Prowler o
Pacu
Cross-site scripting –
o Reflected –
o Persistent •
Overflow vulnerabilities –
o Buffer –
o Integer –
o Heap –
o Stack
Data poisoning
Broken access control
Cryptographic failures
Injection flaws
Cross-site request forgery
Directory traversal
Insecure design
Security misconfiguration
End-of-life or outdated components
Identification and authentication failures
Server-side request forgery
Remote code execution
Privilege escalation
Local file inclusion (LFI)/remote file inclusion (RFI)
Compensating control
Control types –
o Managerial –
o Operational –
o Technical –
o Preventative –
o Detective –
o Responsive –
o Corrective
Patching and configuration management –
o Testing –
o Implementation –
o Rollback –
o Validation
Maintenance windows
Exceptions
Risk management principles –
o Accept –
o Transfer –
o Avoid –
o Mitigate •
Policies, governance, and servicelevel objectives (SLOs) •
21
3.3 Explain the preparation and post-incident activity phases of the incident
management life cycle.
Preparation –
o Incident response plan –
o Tools –
o Playbooks,
o Tabletop –
22