Section B.1 Prepare for TestOut CyberDefense Pro Certification
It is important to prepare for an exam by studying the course material, practicing skills, and committing new concepts to memory. You can use the instruction and tests in this course to help you prepare more efficiently.
We recommend that you take the following steps as you prepare for the TestOut CyberDefense Pro Certification exam:
Step | Description |
---|---|
Study the course material | The course materials include text lessons, demonstrations, video lessons, and hands-on labs. As you work through the course, follow these hints for effective study:
|
Review the certification exam domains and objectives | Review the domains and objectives for the TestOut CyberDefense Pro Certification provided in this section. |
Take the domain practice exams | The domain practice exams group the performance-based labs by domain and helps assess your understanding of a particular TestOut CyberDefense Pro Certification domain and the corresponding objectives. |
Take the certification practice exam | After you are confident with your ability to complete the labs, take the certification practice exam to assess your preparedness to take the certification exam.
|
Schedule and take the certification exam | The TestOut CyberDefense Pro Certification is scheduled through LabSim. If you are taking this course through an instructor, contact your instructor to schedule your exam. |
B.1.1 Pro Exam Objectives
The CyberDefense Pro course and certification exam cover the following TestOut CyberDefense Pro objectives:
# | Domain | Module.Section |
---|---|---|
1.0 | Monitoring and Log Analysis | |
1.1 | Monitor networks
| 3.3, 3.4 4.2 5.1, 5.2 6.1, 6.2, 6.5, 6.9 8.1, 8.3 |
1.2 | Monitor software and systems
| 3.3 4.1 5.1, 5.4 6.3, 6.4, 6.6, 6.8 7.1, 7.2, 7.3, 7.5 |
1.3 | Implement Logging
| 3.3 4.5 6.1 8.1 |
2.0 | Threat Analysis and Detection | |
2.1 | Perform threat analysis
| 3.3 5.2, 5.3, 5.4, 5.6 6.1, 6.4, 6.6 7.3 |
2.2 | Detect threats using analytics and intelligence
| 3.2, 3.3 5.2 6.1, 6.2 7.1, 7.2, 7.3 8.3 9.2, 9.3 |
3.0 | Risk Analysis and Mitigation | |
3.1 | Implement security controls to mitigate risk
| 2.4, 2.5 3.4 4.2, 4.3 5.2, 5.6 6.7 7.2, 7.3 8.3 |
3.2 | Implement system hardening
| 2.4, 2.5 3.4 4.1 5.1, 5.2 6.1 7.1 |
3.3 | Perform penetration tests
| 3.3 5.1, 5.2, 5.3, 5.4 |
3.4 | Implement defensive deception methods
| 2.4 3.4 |
4.0 | Incident Response | |
4.1 | Manage security incidents
| 3.1, 3.3, 3.4 5.1 6.9 7.3, 7.5 9.1, 9.2 |
4.2 | Manage devices
| 2.4 4.4 5.1, 5.2 7.1, 7.3 9.2, 9.3 |
4.3 | Analyze Indicators of compromise
| 3.3, 3.4 4.1 5.1, 5.2, 5.4, 5.6 6.2, 6.5, 6.6 7.6, 7.7 8.3 9.2 |
5.0 | Audit and Compliance | |
5.1 | Implement Identity and Access Management (IAM)
| 1.1, 2.5 4.3 6.6 7.2 |
5.2 | Implement physical security controls
| 2.3 7.1 |
B.1.2 Pro Exam Objectives by Course Section
The CyberDefense Pro course covers the following TestOut CyberDefense Pro exam objectives:
Section | Title | Objectives |
---|---|---|
1.0 | Introduction | |
1.1 | Introduction to TestOut CyberDefense Pro | |
2.0 | Vulnerability Response, Handling, and Management | |
2.1 | Regulations and Standards | |
2.2 | Risk Management | |
2.3 | Security Controls | 5.2 Implement physical security controls |
2.4 | Attack Surfaces | 3.1 Implement security controls to mitigate risk 3.2 Implement system hardening 3.4 Implement defensive deception methods 4.2 Manage devices |
2.5 | Patch Management | 3.1 Implement security controls to mitigate risk 3.2 Implement system hardening 5.1 Implement Identity and Access Management (IAM) |
2.6 | Security Testing | |
3.0 | Threat Intelligence and Threat Hunting | |
3.1 | Threat Actors | 4.1 Manage security incidents |
3.2 | Threat Intelligence | 2.2 Detect threats using analytics and intelligence |
3.3 | Threat Hunting | 1.1 Monitor networks 1.2 Monitor software and systems 1.3 Implement Logging 2.1 Perform threat analysis 2.2 Detect threats using analytics and intelligence 4.1 Manage security incidents 4.3 Analyze Indicators of compromise |
3.4 | Honeypots | 1.1 Monitor networks 3.1 Implement security controls to mitigate risk 3.2 Implement system hardening 3.4 Implement defensive deception methods 4.1 Manage security incidents 4.3 Analyze Indicators of compromise |
4.0 | System and Network Architecture | |
4.1 | Operating System Concepts | 1.2 Monitor software and systems 3.2 Implement system hardening 4.3 Analyze Indicators of compromise |
4.2 | Network Architecture | 1.1 Monitor networks 3.1 Implement security controls to mitigate risk |
4.3 | Identity and Access Management (IAM) | 3.1 Implement security controls to mitigate risk 5.1 Implement Identity and Access Management (IAM) |
4.4 | Data Protection | 4.2 Manage devices |
4.5 | Logging | 1.3 Implement Logging |
5.0 | Vulnerability Assessments | |
5.1 | Reconnaissance | 1.1 Monitor networks 1.2 Monitor software and systems 3.2 Implement system hardening 3.3 Perform penetration tests 4.1 Manage security incidents 4.2 Manage devices 4.3 Analyze Indicators of compromise |
5.2 | Scanning | 1.1 Monitor networks 2.1 Perform threat analysis 2.2 Detect threats using analytics and intelligence 3.1 Implement security controls to mitigate risk 3.2 Implement system hardening 3.3 Perform penetration tests 4.2 Manage devices 4.3 Analyze Indicators of compromise |
5.3 | Enumeration | 2.1 Perform threat analysis 3.3 Perform penetration tests |
5.4 | Vulnerability Assessments | 1.2 Monitor software and systems 2.1 Perform threat analysis 3.3 Perform penetration tests 4.3 Analyze Indicators of compromise |
5.5 | Vulnerability Scoring Systems | |
5.6 | Classifying Vulnerability Information | 2.1 Perform threat analysis 3.1 Implement security controls to mitigate risk 4.3 Analyze Indicators of compromise |
6.0 | Network Security | |
6.1 | Security Monitoring | 1.1 Monitor networks 1.3 Implement Logging 2.1 Perform threat analysis 2.2 Detect threats using analytics and intelligence 3.2 Implement system hardening |
6.2 | Wireless Security | 1.1 Monitor networks 2.2 Detect threats using analytics and intelligence 4.3 Analyze Indicators of compromise |
6.3 | Web Server Security | 1.2 Monitor software and systems |
6.4 | SQL Injection | 1.2 Monitor software and systems 2.1 Perform threat analysis |
6.5 | Sniffing | 1.1 Monitor networks 4.3 Analyze Indicators of compromise |
6.6 | Authentication Attacks | 1.2 Monitor software and systems 2.1 Perform threat analysis 4.3 Analyze Indicators of compromise 5.1 Implement Identity and Access Management (IAM) |
6.7 | Cloud Security | 3.1 Implement security controls to mitigate risk |
6.8 | Email Security | 1.2 Monitor software and systems |
6.9 | Denial-of-Service Attacks | 1.1 Monitor networks 4.1 Manage security incidents |
6.10 | Industrial Computer Systems | |
7.0 | Host-Based Attacks | |
7.1 | Device Security | 1.2 Monitor software and systems 2.2 Detect threats using analytics and intelligence 3.2 Implement system hardening 4.2 Manage devices 5.2 Implement physical security controls |
7.2 | Unauthorized Changes | 1.2 Monitor software and systems 2.2 Detect threats using analytics and intelligence 3.1 Implement security controls to mitigate risk 5.1 Implement Identity and Access Management (IAM) |
7.3 | Malware | 1.2 Monitor software and systems 2.1 Perform threat analysis 2.2 Detect threats using analytics and intelligence 3.1 Implement security controls to mitigate risk 4.1 Manage security incidents 4.2 Manage devices |
7.4 | Command and Control | |
7.5 | Social Engineering | 1.2 Monitor software and systems 4.1 Manage security incidents |
7.6 | Scripting and Programming | 4.3 Analyze Indicators of compromise |
7.7 | Application Vulnerabilities | 4.3 Analyze Indicators of compromise |
8.0 | Security Management | |
8.1 | Security Information and Event Management (SIEM) | 1.1 Monitor networks 1.3 Implement Logging |
8.2 | Security Orchestration, Automation, and Response (SOAR) | |
8.3 | Exploring Abnormal Activity | 1.1 Monitor networks 2.2 Detect threats using analytics and intelligence 3.1 Implement security controls to mitigate risk 4.3 Analyze Indicators of compromise |
9.0 | Post-Attack | |
9.1 | Containment | 4.1 Manage security incidents |
9.2 | Incident Response | 2.2 Detect threats using analytics and intelligence 4.1 Manage security incidents 4.2 Manage devices 4.3 Analyze Indicators of compromise |
9.3 | Post-Incident Activities | 2.2 Detect threats using analytics and intelligence 4.2 Manage devices |
A.0 | CompTIA CySA+ CS0-003 - Practice Exams | |
A.1 | Prepare for CompTIA CySA+ Certification | |
A.2 | CompTIA CySA+ CS0-003 Domain Review (20 Questions) | |
A.3 | CompTIA CySA+ CS0-003 Practice Exams (All Questions) | |
B.0 | TestOut CyberDefense Pro - Practice Exams | |
B.1 | Prepare for TestOut CyberDefense Pro Certification | |
B.2 | TestOut CyberDefense Pro Exam Domain Review |
B.1.3 How to take the Pro Exam
To take the TestOut CyberDefense Pro Certification exam, it must first be scheduled by an instructor or an administrator.
You are encouraged to budget your time and keep moving through the exam so you can complete it within the time limit. Begin an exam at the scheduled exam time. Students should follow these steps to start the exam:
- You must be logged in to LabSim.
- Select the Certifications tab from the top navigation menu.
- Navigate to the certification.
- Select Start Exam and read the instructions.
- When you are ready to begin the exam, select Start Exam.
Exam Notes
- When you purchase a TestOut course, the Pro Certification exam is included. The course must have an active license to take the exam.
- Unlike the practice exams, the TestOut Pro certification exams are assessment exams that do not allow students to check their answers or get instant feedback.
- The exam may be attempted only once per exam voucher.
- If you do not pass the exam, you may purchase a retake exam voucher online.
- Do not click Start Exam until you are ready to complete the certification exam. Starting the exam and exiting will use the exam voucher.
B.1.4 Pro Exam FAQs
TestOut Pro Certification Frequently Asked Questions (FAQs)
For the most up-to-date TestOut Pro Certification FAQs, visit TestOut Pro Certification at http://www.testout.com/certification/pro-exams/Resources/FAQs .