CS0-003 Coverage Checklist (1.1-1.5)
Direct objective coverage from the CompTIA CS0-003 security operations domain.
- 1.1 System and network architecture: log ingestion (time synchronization, logging levels), OS concepts (Windows Registry, hardening, file structures/config locations, processes, hardware architecture), infrastructure (serverless, virtualization, containerization), network architecture (on-prem, cloud, hybrid, segmentation, zero trust, SASE, SDN), IAM (MFA, SSO, federation, PAM, passwordless, CASB), encryption (PKI, SSL inspection), and sensitive data protection (DLP, PII, CHD).
- 1.2 Indicators of malicious activity: network indicators (bandwidth, beaconing, irregular peer-to-peer, rogue devices, scans/sweeps, traffic spikes, unexpected ports), host indicators (CPU/memory/storage anomalies, unauthorized software/processes/changes/privileges, exfiltration, abnormal OS behavior, file/registry anomalies, unauthorized scheduled tasks), application indicators (anomalous activity, new accounts, unexpected output/outbound communication, service interruption, log anomalies), and social engineering or obfuscated links.
- 1.3 Tools and techniques: packet capture (Wireshark, tcpdump), SIEM/SOAR correlation, EDR telemetry, DNS/IP reputation (WHOIS, AbuseIPDB), file analysis (strings, VirusTotal), sandboxing (Joe Sandbox, Cuckoo), pattern recognition/C2 analysis, suspicious command interpretation, email analysis (header, impersonation, DKIM, DMARC, SPF, embedded links), file hashing, and user behavior analytics including impossible travel.
- 1.3 Programming and scripting support: JSON, XML, Python, PowerShell, shell scripting, and regular expressions.
- 1.4 Threat intelligence and hunting: threat actors (APT, hacktivist, organized crime, nation-state, script kiddie, insider intentional/unintentional, supply chain), TTPs, confidence (timeliness, relevancy, accuracy), collection methods (open and closed source), intelligence sharing (IR, vulnerability management, risk management, security engineering, detection/monitoring), and threat hunting (IoC collection/analysis/application, focus areas, active defense, honeypot).
- 1.5 Efficiency and process improvement: standardization and automation candidate identification, team coordination, streamlining with SOAR orchestration and enrichment, minimizing manual effort, tool integration via APIs/webhooks/plugins, and single pane of glass operations.