CompTIA CySA+ Domain 2: Software and Systems Security - PowerPoint PPT Presentation

About This Presentation
Title:

CompTIA CySA+ Domain 2: Software and Systems Security

Description:

The CompTIA Cybersecurity Analyst+ certification (also known as CySA+) is a vendor-neutral certification for cybersecurity, threat, and vulnerability analysts. It focuses on security analytics and the actual application of security solutions in real-world situations. – PowerPoint PPT presentation

Number of Views:70

less

Transcript and Presenter's Notes

Title: CompTIA CySA+ Domain 2: Software and Systems Security


1
CompTIA CySA Domain 2 Software and Systems
Security
www.infosectrain.com sales_at_infosectrain.com
2
Information Technology (IT) has revolutionized by
leaps and bounds in the last few years. It has
opened up new possibilities for businesses and
how we go about our daily lives, and the ability
to organize the massive amount of data at our
fingertips. However, most businesses have
well-oiled systems dedicated to developing,
releasing, and maintaining viable software and
systems. Nonetheless, the rising concerns and
risks associated with insecure software have
raised awareness of the necessity to incorporate
security into the development process. Businesses
and organizations have had to up their game with
the concern of rising system threats.
www.infosectrain.com sales_at_infosectrain.com
3
www.infosectrain.com sales_at_infosectrain.com
4
Software and systems security is an important
aspect to keep software and systems in control
and working effectively. The CompTIA CySA
certification deals with the various aspects
related to software and systems security. The
CompTIA Cybersecurity Analyst certification
(also known as CySA) is a vendor-neutral
certification for cybersecurity, threat, and
vulnerability analysts. It focuses on security
analytics and the actual application of security
solutions in real-world situations.
www.infosectrain.com sales_at_infosectrain.com
5
Domains of CySA
www.infosectrain.com sales_at_infosectrain.com
6
  • Domain 1 Threat and Vulnerability
    Management (22)
  • Domain 2 Software and Systems Security (18)
  • Domain 3 Security Operations and
    Monitoring (25)
  • Domain 4 Incident Response (22)
  • Domain 5 Compliance and Assessment (13)
  • This article provides an overview of the CompTIA
    CySA Domain 2 Software and Systems Security.





www.infosectrain.com sales_at_infosectrain.com
7
CompTIA CySA Domain 2 Software and Systems
Security Software and Systems Security is the
second domain in the CompTIA CySA certification
exam. The domain comprises 18 weightage. In the
second domain of the CySA certification, you
will learn how to assess and integrate security
into your organizations software and hardware,
as well as how to use the Software Development
Life Cycle (SDLC) and its security implications
to ensure that the software your organization
uses is well-written and secure throughout its
lifespan. It will discuss how to ensure that any
cloud services you might inject into your
environment are secure to support your apps and
systems and best practices to develop a secure
environment. Security is vital to provide
integrity, authentication, and availability. Soft
ware security is a type of computer security that
focuses on the secure design and implementation
of software using the most up-to-date
technologies, tools, and methods. In other words,
it focuses on avoiding software flaws, bugs, and
vulnerabilities. Security is essential for a
device to function at its best, from
authentication to software updates, anti-virus
protection, and customizations. On the other
hand, all aspects of accessing information assets
are covered by system security.




www.infosectrain.com sales_at_infosectrain.com
8
  • The second domain of the CompTIA CySA
    certification exam covers the following
    subtopics
  • Given a scenario, apply security solutions for
    infrastructure management
  • Explain software assurance best practices
  • Explain hardware assurance best practices





www.infosectrain.com sales_at_infosectrain.com
9
1. Given a scenario, apply security solutions for
infrastructure management This subsection will
discuss the security solutions for infrastructure
management. It covers the critical areas
associated with Identity and Access Management
(IAM) to reflect a broader identity in a world of
numerous connected devices, people, and
processes. The section will discuss the two main
infrastructure models cloud vs. on-premises. The
domain will also cover the issues surrounding
asset management, including asset tagging and
change management. It will teach you how to
describe physical and virtual segmentation, jump
boxes, and system isolation with an air gap. The
section will also cover the physical,
software-defined, Virtual Private Cloud (VPC),
Virtual Private Network (VPN), and serverless
architectures.




www.infosectrain.com sales_at_infosectrain.com
10
2. Explain software assurance best practices
Software assurance refers to the development and
execution of methods and processes for verifying
that software performs as intended while limiting
the risks of vulnerabilities, malicious code, or
faults that could affect the end-user. This
subsection examines application security, the
types of testing to perform, and secure coding
best practices from a number of well-known
organizations that issue security guidelines. It
is preferable for software to be secured from the
start. The earlier security is incorporated in
the software development process, the less it
will cost to secure the software. This section
discusses the platforms such as web application,
mobile, client/server, embedded, and
System-on-Chip (SoC), Software Development Life
Cycle (SDLC) integration, discusses the DevSecOps
framework, various software assessment methods,
best practices for secure coding, static and
dynamic analysis tools, more structured
techniques of analysis for verification of
critical software, and service-oriented
architecture.




www.infosectrain.com sales_at_infosectrain.com
11
3. Explain hardware assurance best
practices This subsection covers critical
hardware security subjects such as dedicated
hardware, hardware encryption, secure processing,
trusted foundries, and anti-tamper measures.
Hardware root of trust, eFuse, the Unified
Extensible Firmware Interface (UEFI), trusted
foundry, Self-Encrypting Drives (SED) will all be
covered. You will learn about secure boot
processes and secure processing as well. CompTIA
CySA with InfosecTrain InfosecTrain, a
significant provider of Information Technology
and cybersecurity training, offers the CompTIA
CySA certification training course. We assist
participants in our training program by teaching
system security principles, with a focus on the
security aspects and implications of software and
information technologies. Every step of the
journey, our trainers will be there for you! So
get started with InfosecTrain today to prepare
for the CompTIA Cybersecurity Analyst (CySA)
certification exam. We are also CompTIAs
authorized training partner.




www.infosectrain.com sales_at_infosectrain.com
12
About InfosecTrain
  • Established in 2016, we are one of the finest
    Security and Technology Training and Consulting
    company
  • Wide range of professional training programs,
    certifications consulting services in the IT
    and Cyber Security domain
  • High-quality technical services, certifications
    or customized training programs curated with
    professionals of over 15 years of combined
    experience in the domain

www.infosectrain.com sales_at_infosectrain.com
13
Our Endorsements
www.infosectrain.com sales_at_infosectrain.com
14
Why InfosecTrain
Global Learning Partners
Access to the recorded sessions
Certified and Experienced Instructors
Flexible modes of Training
Tailor Made Training
Post training completion
www.infosectrain.com sales_at_infosectrain.com
15
Our Trusted Clients
www.infosectrain.com sales_at_infosectrain.com
16
(No Transcript)
17
Contact us
Get your workforce reskilled by our certified and
experienced instructors!
IND 1800-843-7890 (Toll Free) / US 1
657-221-1127 / UK 44 7451 208413
sales_at_infosectrain.com
www.infosectrain.com
Write a Comment
User Comments (0)
About PowerShow.com