Cyber Security vs Computer Science Degree – Which is Right for You?

Cyber Security vs Computer Science Degree – Which is Right for You?

If you are looking to get into cyber security by the more formal “degree route”, you will be confronted with the decision between choosing whether you should get a computer science degree or a cyber security degree. This decision depends on a lot of personal factors, but in this article, we will be breaking down the pros and cons of each route and help you decide for yourself.

Computer science degree vs cyber security degree? Both computer science and cyber security degrees will get you a job in cyber security. Comp sci is more technical but is less specific to the field of cyber security while cyber security degrees are more specific but may lack important computer science theory and fundamentals.

How Do You Choose Which Degree Is Right for You?

Many colleges have recognized the difference between computer science and cyber security and offer separate programs. This presents prospective students with a serious dilemma.

It used to be that universities offered security-focused courses within their computer science programs. With the serious skills gap that the cyber security industry is experiencing colleges have identified the demand for cyber security-specific programs.

Cyber Security Degree

The concept of a cyber security degree is a relatively new concept. Many colleges are still developing them as you read this article, because of this the concepts and topics that the degrees cover are not very uniform.

This is not to discourage you from a cyber degree at all, it just means that you need to do your research to ensure the college your selecting is covering the areas of cyber security you want to learn.

What Do Cyber Security Degrees Cover?

  • Information Systems
  • Information Technology
  • Networking
  • Entry Level Programming
  • Digital Forensics
  • Cyber Security Ethics, Law & Policy
  • Risk Analysis
  • Offensive Security
  • Security Operations

As you can see, cyber security degrees cover a very wide range of topics. This is by design; the cyber security industry is very broad and these degree programs are designed to introduce you to many of the areas within the field.

How Hard is a Cyber Security Degree?

Cyber security degrees range in difficulty widely. Some cyber security degree programs can get very technical and difficult. I will use Penn State’s Cyber Security Analytics and Operations Major as an example. This degree program is at the cutting edge of cyber security and it very technical and difficult.

This degree program covers technical topics such as:

  • Incident Handling and Response
  • Malware Analytics
  • Cyber Analytics
  • Calculus
  • Advanced Programming Courses

I have included this information not to promote Penn State University, but to illustrate a more technical program that will really prepare you for a career in cyber security.

On the other hand, some schools provide a “cyber security degree” that is nothing more than an information technology degree with a class or two that focuses on security.

My final advice on cyber security degrees is to do your research and ensure you will be getting what you want from this 4-year investment.

More Support

In general, cyber security programs are focused on graduating as many qualified students as possible. This is due to the massive shortage of professionals cyber security is experiencing.

In my experience in taking both cyber security and computer science courses, cyber security professors and staff are much more supportive in ensuring that all students can succeed. Many other degree programs like engineering and comp sci have “weed-out courses” that are geared towards thinning out the heard because those job markets are more competitive.

In my personal experience, cyber security university staff will do whatever it takes to ensure that every student that is willing to do the work will be successful! Computer science feels more like an everyone for themselves type of mentality.

The Cyber Security Community

Cyber security degree programs also allow you to network with other security students and form clubs and organizations around specific interests. These connections go a long way and will really help you build hands-on experience that you can demonstrate to employers.

Cyber Security Degree Pros

  • Specific security topics that directly apply to jobs in cyber security
  • Tells companies you have foundational cyber security knowledge
  • Can be very advanced if you find a mature cyber security college program
  • More support
  • Joining the security community

Cyber Security Degree Cons

  • Cyber security degrees are not the same from school to school
  • Cyber security degrees are new and will have “growing pains”
  • Strong emphasis on concepts and theory (not every college)

Computer Science Degree

Computer science is the study of the theoretical foundations of information and computation and their implementation and application in computer systems.

Computer science degrees are very technical and can be very valuable for cyber security jobs. While comp sci degrees aren’t specific to the field of cyber security, they can really set you up with a strong foundation to build upon.

If you are very technical and are willing to learn security on your own time and get involved with the cyber security community, comp sci may be the best route for you.

The Computer Science Degree Route Is More Work

Let’s face it, computer science is a notoriously difficult degree. Most comp sci degree programs have many “weed out” courses where they try to cut out the students who cannot pass. This is not something we have to deal with in cyber security degree programs.

In addition to taking harder courses, if you choose to go the comp sci route you will have to learn security on your own time. There may be some courses that touch on security, but for the most part, it is on you to learn security and get involved with the community.

This degree program covers technical topics such as:

  • Mathematical foundations
  • Algorithms and data structures
  • Artificial intelligence
  • Computer architecture
  • Programming languages and compilers
  • Software engineering
  • Theory of computation

The Generalize Then Specialize Approach

The generalize then specialize approach is very applicable with the comp sci degree route into cyber security. Learning the fundamentals of computing before learning any security is my preferred approach and I wish that cyber security degree programs would adopt this mentality. This approach ensures that you have a very good understanding of the systems your securing.

Should You Get A Computer Science Degree for Cyber Security?

If you are willing to put in the extra work, a computer science degree will make you a very important member of a cyber security team. “Generalize then specialize” is a very valid concept and a great approach to cyber security. If you go this route you will have to make an extra effort to get involved with cyber security clubs and organizations, but if you do it right it will pay dividends!

Computer Science Degree Pros

  • Very strong foundation in math and computer theory
  • Generalize then specialize
  • Provides a great foundation for pen testers or very technical security engineers

Computer Science Degree Cons

  • Not specific to cyber security
  • Very difficult and math-based
  • Requires additional “extracurricular” cyber security research and practice
  • “Weed out” courses are very difficult
  • Less support

Final Thoughts

There is no perfect approach to going to college for cyber security. If you are fortunate enough to have access to a mature accredited cyber security program then you should consider it. If you chose this route, make sure you are not neglecting the computing theory even if you have to learn this information on your own time. Going the comp sci degree route can really set you up well for a technical role in cyber security as long as you are willing to put in the work and learn cyber security on your own time.

7 Best Cyber Security Certifications For Beginners

7 Best Cyber Security Certifications For Beginners

If you are new to the cyber security field, you have probably heard many people and job postings mention certifications. But there are so many IT and cyber security certifications out there. Let’s take a look at the best cyber security certifications for beginners.

With the serious demand for qualified cyber security professions, it may be time for you to get certified. Here are 7 beginner cyber security certifications that will help launch your career.

CompTIA Security+

Without a doubt, the Security+ is one of the most popular entry level cyber security certifications. We have covered just how important the Security+ is in numerous blog articles and these all can be seen under our Security+ blog category.

The Security+ provides the student with a great foundation of cyber security topics. The certification is “a mile wide and an inch deep” but when you’re just getting into the field, that’s exactly what you need! Having the Security+ on your resume will help it get noticed and will help land you that cyber security job!

If you are interested in taking the Security+, we have created the ultimate guide for you. Our guide covers strategies to pass the Security+ on your first attempt, the best security+ study material, common questions, and at the end we layout a success timeline to help you stay on track.

Security+ Prerequisites

The Security+ has no prerequisites. If you are brand new to IT and Security, we recommend that you take the Network+ or the A+ first depending on your level of comfort with the material.

CompTIA Network+

The Network+ is another foundational exam that is provided by CompTIA. If you are a beginner to IT and cyber security this is one of the first certifications we recommend.

While there are no prerequisites for the Security+, we recommend taking the Network+ first. Having a solid understanding of networking will make the Security+ a lot easier.

The Network+ covers basic computer networking concepts, such as routers, switches, and common protocols. The Network+ also touches some security concepts, such as cyber-attacks and systems hardening concepts.

If you can’t decide whether you should take the Network+ or the Security+, check out our comparison of these entry level CompTIA certifications.

Network+ Prerequisites

As with the Security+, the Network+ has no prerequisites. If you are brand new to IT and Security, we recommend that you take the CompTIA A+ first.

GIAC Security Essentials (GSEC)

GIAC is one of the most reputable and high-quality certification providers out there. I am currently pursuing the GDAT that is provided by them. SANS training is not cheap but it is absolutely worth the money with the information that you learn and the weight that these certifications hold.

The GSEC is a 400-level sans course (SEC401). Sans courses range from 300-level to 600-level in difficulty. You may ask, “should I take the 300 level sans course?” We recommend jumping into the GSEC certification instead of going for the lower level GIAC Information Security Fundamentals (GISF) because these certifications are not cheap and the GSEC will hold the best value for you.

GSEC Prerequisites

The SANS GSEC is an ideal entry-level certification and it does not have any prerequisites. The best way to prepare for this exam is to take the accompanying SANS 401 course.

ElearnSecurity Junior Penetration Tester (eJPT)

The eJPT may be a surprise on this list for many. ELearnSecurity is a certification/training company that is steadily gaining traction in the market. Whenever a new company or new certification hits the market, there is usually a large time gap until the recruiters understand and trust the company and the certifications they provide.

What is the eJPT? The eJPT is a 100% hands-on certification on penetration testing and information security essentials. Instead of answering multiple-choice on exams like the Pentest+ and the CEH, the eJPT is purely hands-on and aims to replicate a real-world scenario.

eJPT Knowledge Domains:

  • Good knowledge of TCP/IP
  • Good knowledge of IP routing
  • Good knowledge of LAN protocols and devices
  • Good knowledge of HTTP and web techologies
  • Essential penetration testing processes and methodologies
  • Basic Vulnerability Assessment of Networks
  • Basic Vulnerability Assessment of Web Applications
  • Exploitation with Metasploit
  • Simple Web application Manual exploitation
  • Basic Information Gathering and Reconnaissance
  • Simple Scanning and Profiling the target

What is the eJPT Exam Like?

The eJPT exam is hosted in Hera Lab, this lab environment mimics a real works network with realistic targets. Test takers will be provided VPN access and that’s all they need!

Who Should Take the eJPT?
If you are looking to transition into penetration testing and want a more practical exam than the Pentest+ or the CEH, then the eJPT is the right exam for you. The eJPT serves as a great introductory exam to the OSCP, or the other more advanced certifications that ELearnSecurity offers.

Does The eJPT Have Any Prerequisites?

Anyone can attempt the eJPT exam! We do recommend that you consider these skills that ELearnSecurity has announced are relevant to the exam.

  • Deep understanding of networking concepts
  • Simple manual web application security assessment and exploitation
  • Performing basic vulnerability assessment of networks
  • Using Metasploit for performing simple attacks
  • Web application Manual exploitation, by using common attack vectors
  • Ability to perform protocol analysis of a traffic capture
  • Understanding of information gathering techniques
  • Understanding of the penetration testing process

ISC2 Systems Security Certified Practitioner (SSCP)

The (ISC)2 Systems Security Certified Practitioner (SSCP) is an entry-level information security certification. It serves as the ideal precursor for the highly sought after Certified Information Systems Security Professional (CISSP).

According to ISC2 the SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor, and administer IT infrastructure using security best practices, policies, and procedures established by the cybersecurity experts at (ISC)².

SSCP Prerequisites

There are some experience requirements for the SSCP. Candidates must have a minimum of one-year cumulative paid work experience in one or more of the seven domains of the SSCP CBK. Work experience must fall within one of the following domains.

  • Domain 1. Access Controls
  • Domain 2. Security Operations and Administration
  • Domain 3. Risk identification, Monitoring, and Analysis
  • Domain 4. Incident Response and Recovery
  • Domain 5. Cryptography
  • Domain 6. Network and Communications Security
  • Domain 7. Systems and Application Security

Cisco Certified CyberOps Associate

According to Cisco, The Cisco Certified CyberOps Associate certification validates your skills and knowledge in security concepts, security monitoring, host-based analysis, network intrusion analysis, and security policies and procedures.

This is ideal for those who are looking to get into a Security Operations Center (SOC) position.

CCNA Certified CyberOps Associate Prerequisites

There are no prerequisites for the Cisco Certified CyberOps Associate but we do recommend that you review the exam blueprint before taking on this exam.

Certified Ethical Hacker

The Certified Ethical Hacker (CEH) is a popular entry-level penetration testing certification. The average salary of a Certified Ethical Hacker is $71,331. Having the CEH will help your resume get read, and will help you get your first job as a penetration tester.

We have an in-depth analysis of whether the CEH is worth it, but we will provide some of the main points here.

The CEH certification will open you up to many lucrative job positions. Below are some of the roles you can get into with a CEH and the corresponding salaries provided by

  • Information security analyst: $70,721
  • Penetration tester: $80,334
  • Information security manager: $108,352
  • Security engineer: $88,062
  • Cyber security analyst: $74,360
  • Information security engineer: $91,075

While the CEH is a great certification, we really only recommend taking it if the specific job you are applying for is looking for CEH certified candidates. While there are a lot of employers seeking certified ethical hackers, the certification itself isn’t the best bang for your buck considering the alternatives.

Related Questions

Do you need the A+, Network+, and Security+?

The A+, Network+, and Security+ are without a doubt the most popular, entry-level CompTIA exams. Many people ask whether they need all three or if they can get a smaller subset of these exams for a career in cyber security. Check out our article which will help you decide which exams are right for you given your unique situation.

Out of all 7 of these certifications, which is the best for beginners to start out with?

Out of all of the certifications that we cover in this article, we recommend that most beginners start with the Security+. If you want more Security+ content, we have an entire Security+ blog category on our site devoted to just that.

Final Thoughts

Hopefully, through reading this article, you have identified the perfect certification for you to pursue. We have covered many of these exams in separate, more in-depth blog posts.

If you want more, you can check our Certifications category, this is where we post all the most recent information and updates to our certification content. Best of luck in your certification journey!


6 Best Programming Languages to Learn for Cyber Security

6 Best Programming Languages to Learn for Cyber Security

Not all cyber security professionals need to know how to code. But if you do know how to code you will boost your productivity and make you an extremely valuable member of your cyber security team.


Here are 6 best programming languages to learn for Cyber Security.


Python is a powerful interpreted, object-oriented, high-level programming language.

Ok, that’s a very descriptive sentence, lets break it down and go through why Python is a great language to learn for cyber security.

A high-level language is a programming language with strong abstraction from the details of the computer. What this breaks down to is that the language of python is programmer-friendly, easy to understand, portable, and simple to maintain.

Python is an interpreted language. This means that it does not need to be compiled, all we need is the python interpreter installed on our system.

Why Should You Learn Python for Cyber Security? We have a full article on this topic, but we will give a brief summary here.

Python is number one on our list today because of its popularity and ease of use. When we have to write a script in cyber security, the odds are that we will be pretty crunched for time.

The amount of cyber security and other useful libraries that the python community offers are almost unmatched. This means that we can quickly implement libraries, or adapt solutions that other cyber security professionals have made public.


Let’s face it, Windows is not the preferred operating system for most cyber security professionals. For this reason, many people often overlook PowerShell.

If you are a defender, most of the systems and workstations you will be defending will be windows based.


If you are an attacker, most of the systems and workstations you will be attacking will be windows based.

So, if our clients and our targets are going to be windows based, it is a very good idea to learn PowerShell.

PowerShell For Blue Team

Understanding the Attacks: As Blue-Teamers it is very important for us to understand PowerShell. We need to be able to at least read and understand PowerShell. To better understand the PowerShell attacks that are occurring in our environment we may also need to de-obfuscate it.

Writing Defensive Rules: Hopefully, we can stop the attacks before they successfully execute. Understanding PowerShell will help us create alerts and ensure we are upholding all of the PowerShell best practices.

PowerShell For Red Team

PowerShell has been used widely by attackers in the past and is now becoming increasingly harder and harder to get away with.

Blue teams have invested a lot of time into rule creation and because of this, red teamers are moving away from PowerShell. More and more attackers are moving to C#. Don’t worry, we will be telling you why later on in this article.

Why Is PowerShell So Useful for Attackers?

Living off The Land

Living off the land is a common attacker expression that basically just breaks down to using the tools and utilities that are available to you on the system you are attacking.

PowerShell is a very dangerous tool in the hands of a red teamer. PowerShell is built on the .NET Framework. In addition, PowerShell is a built-in command line tools on the systems that attackers are targeting.

PowerShell has access to the Windows API and .NET classes so it can be used to perform some very dangerous and powerful actions.

Blending in With the Noise

PowerShell is used very often in enterprise environments. System administrators commonly use PowerShell to perform administrative tasks. This makes the life of the blue teamer very difficult.

Defenders must be able to sort out the legitimate PowerShell activity with that of the attacker.

PowerShell Through WinRM

WinRM is a remote management utility, commonly used by system administrators. It is also commonly abused by attackers. Attackers can run PowerShell commands or scripts through WinRM in an attempt to avoid security controls.

Fun Fact: You actually can install PowerShell on Linux.


Many people debate whether Bash can actually be described as a programming language. It is a shell scripting language that is available in the Linux shell and can be installed in windows as the Windows Subsystem for Linux (WSL).

Regardless of whether you want to call this a programming language or not, understanding bash is vital for your cyber security career.

Bash for Blue Teams

Bash can be very useful for blue teamers; they can use is to create scripts of tasks they have to run frequently. This saves time and eliminates misconfigurations.

Blue teamers also need to protect Linux systems. They can utilize bash scripts to harden the systems and ensure that systems are up to date.

Bash For Reverse Engineering. Defenders can perform basic checks or write a script that can examine malicious files.

  • Strings (prints strings of printable characters)
  • Nm (list symbols for target program)
  • Strace (trace system calls made by a program)

All of these Linux commands can be put into a bash script that may run a series of checks when a suspicious file is identified.

Bash for Red Teams

Attackers have to be very adept at bash scripting. Most attackers will be using Kali Linux or a similar distribution to carry out their attacks.

The more experienced an attacker becomes the more bash scripts they will create to automate their processes.

Some example use cases that an attacker would create scripts for are infrastructure scripts, text processing, password spraying, emailing, port scanning, etc.

Let me make this clear, bash is rarely used to actually perform the attacks, it is more of a language to support the back-end efforts of the attacker on their Linux attack host.

With that being said, if the attacker is targeting a Linux host or a server running Linux they may employ some more fun bash scripts.

Some examples of offensive bash are, identifying privilege escalation opportunities, creating a simple reverse shell, searching the file system for interesting information, etc.

As you can see, bash is very useful for both attackers and defenders to be able to write and understand.

If you are interested in learning bash, check out this video and article where I cover the 25 most commonly used bash commands in cyber security.


As we discussed while talking about PowerShell, C# is more commonly being used as a PowerShell replacement by attackers. This summary is about to get slightly technical.

Why Do Attackers Use C#?

The use of PowerShell by attackers hit its peak around 2015-2017. Defensive security teams caught on to this and there was a massive effort to secure PowerShell execution.

Skip ahead to 2020 and most organizations have at least enhanced PowerShell logging and have rules to pick up on malicious commands.

Enter C# which shares the same underlying technology (i.e. .NET runtime) with PowerShell but is lacking many of the security features that PowerShell has.

The bottom line is that C# still has access to the .Net libraries and underlying windows components but is not as heavily scrutinized by defensive toolsets.

Running A .NET Assembly in Memory

We previously mentioned that it is significant that C# utilizes the .NET framework. Let’s dig in to how attackers can abuse this.

C# is a compiled language. After we compile our code, we produce a .Net Assembly. Assemblies take the form of executable (.exe) or dynamic link library (. dll) files.

This becomes extremely useful when we have a tool like Cobalt Strike. Cobalt Strike is a popular command and control framework used by attackers and penetration testers.

Cobalt Strike’s “execute assembly” command will run a local .NET assembly in the memory of a process that is on the targeted host.

This means that your malicious binary (.exe file) will never touch the disk of the host you are targeting. This drastically decreases the risk of detection.

If you are looking to get into offensive security+, I strongly recommend you familiarize yourself with C#. It is a very powerful language.


If you are interested in testing or securing web applications you should invest the time to learn JavaScript.

JavaScript is a scripting or language that allows you to implement complex and reactive features on web pages. JavaScript is both a front end and back end language of the web.

If you want to work with cookies, manipulate event handlers, or perform cross-site scripting (XSS) JavaScript is the language for you.

Guess what was the most popular hacking technique (not a fan of that phrase) of 2019? The answer is XSS!

According to Fudzilla, Cyber-attacks have targeted nearly 75 percent of large companies across Europe and North America over the last 12 months. According to Precise Security’s research 40% of all cyber-attacks in 2019 were performed by using cross-site scripting, which is hackers’ favorite attack vector globally.

Fun Fact: 72.3% of all cyber-attacks were targeted towards websites, the 2019 data indicates this is the hackers’ favorite platform to perform attacks globally.


Assembly (commonly abbreviated to ASM) is by far the most important tool for any reverse engineer. Assembly is the human readable version of machine code. Assembly is able to be understood by the CPU.

Languages like C, C++, Go, Pascal, and Haskell are all compiled to machine code, and as a result, the majority of malware can be read as Assembly code using a disassembler (software which translates machine code into its human readable version, Assembly).

If you are able to read Assembly well, you don’t need the original code for anything written in a language that compiles to machine code. As a Reverse engineer, it is not expected that you will have the fortune of getting to reverse engineer high-level languages.

Different CPUs accept different versions of assembly language. Luckily there are only 2 common instruction sets when it comes to traditional computers (i386 and x86_64).

If you are interested in becoming a reverse engineer, you should invest the time to learn assembly. It is a long journey, but you will be well equipped and a very strong cyber security defender.

Top 3 Languages for Blue Teamers

  1. Python
  2. Assembly
  3. PowerShell

Top 3 Languages for Red Teamers

  1. Python
  2. C#
  3. JavaScript

Which of These 7 Languages Is for You?

After you have heard about the 6 best languages for cyber security you probably have a lot of questions about which language is right for you. We will try to make this easy.

For The Newer Programmer

If you don’t know how to program yet, go with python. The python ecosystem will open you up to many projects and libraries that will get you going very quickly.

Need more convincing, I go into more detail here about why you should learn python.

For The Web App Tester

Learn JavaScript, having this tool in your bag will help you better learn and understand the attacks that are facing our web applications.

For The Seasoned Blue Teamer

You should invest the time to learn ASM if you want to be a valuable asset to the blue team. Reverse Engineers are few and far between. You will never be without a job!

For The Advanced Red Teamer

Learn C#. This will allow you to better mimic the threats that are out there and ensure your organization is protected.


Everyone should learn at least the basics of Bash scripting. This will save you a lot of time in the long run. I have a video and article here where I cover the 25 most commonly used Linux commands for cyber security professionals.

Everything You Need To Know About The CySA+ – Tips, Alternatives, and Study Materials

Everything You Need To Know About The CySA+ – Tips, Alternatives, and Study Materials

The CySA+ is quickly gaining recognition for being a great intermediate level cyber security certification, but there is still a lack of information out there. Before I took the certification, I had a lot of unanswered questions and didn’t know if taking the CySA+ would help my cyber security career.

Should I take the CySA+? The CySA+ is a great intermediate level cyber security certification to hold. If you are working in the cyber security field or looking to enter the field of cyber security as an analyst, the CySA+ is a great certification. The CySA+ will build your skills and get your resume read.

Is the CySA+ Right for You?

There are a lot of well-respected certifications out there, how do you know if the CySA+ is the right cert for your career path.  We are doing to take a deep dive into the certification and answer some common questions and concerns

Is the CySA+ Difficult?

The CySA+ is not an easy exam. The exam questions require an in-depth understanding of the cyber security analyst role. But, with the proper study strategy and materials, the student can develop an understanding of the required material and have success on this exam.  

Who is the CySA+ Intended For?

The CySA+ is specifically intended for professionals following the cyber security analyst path. The CySA+ covers the following objectives (domains).

  • Threat Management
  • Vulnerability Management
  • Cyber Incident Response
  • Security Architecture

If you are an experienced blue-teamer the CySA+ is the perfect exam for you. While this exam does cover some red team topics, if you are a red-teamer or are looking to getting into offensive security, the Pentest+ will be a better option for you.

According to CompTIA the CySA+ Covers the Following Job Roles:

  • Security operations center (SOC) analyst
  • Vulnerability analyst
  • Cybersecurity specialist
  • Threat intelligence analyst
  • Security engineer
  • Cybersecurity analyst

What is a cyber security analyst?

Security analysts are ultimately responsible for ensuring that the company’s systems and network are protected from unauthorized access. Security Analysts are at the front lines in defending their organization against cyber threats.

CySA+ Job Relevance

When I got the CySA+ and I was a SOC Analyst. This certification was very relevant to the work that I was doing and I used the skills that learned every day on the job.

If you are currently working as a cyber security analyst, a lot of the information on the exam will be familiar to you.

The best part of the CySA+ is its relevance to the job, unlike a lot of exams that are more based upon theory, the CySA+ asks hands-on tool based questions.

Hands-On Tool Based Questions

A lot of the exam consists of interesting the output of common tools and logs. This is where I see the most value In the certification. The CySA+ will not tell you everything you need to know about a specific tool, but it will help you become familiar with tools when you encounter them in the field.

For the CySA+, you will get exposure to tools like (just to name a few):

  • Tcpdump
  • Netstat
  • Nbtstat
  • Dig
  • iptables
  • Nmap
  • Nessus
  • Wireshark

Like I said before, you don’t have to become a master at these tools, but the CySA+ will introduce you to them and ultimately will help you when you encounter the tools on the job.


What Topics Do the CySA+ Questions Cover?

  • Identifying Threats
  • Network Security Measures
  • Understanding Response and Countermeasures
  • Threats, Vulnerabilities, and Risk
  • Foot printing and Recon
  • Threats to Confidentiality, Integrity, and Availability
  • Controls to secure networks and endpoints
  • Evaluation of Security Controls
  • Information Gathering (passive and active)

You can expect questions to cover a range of areas. The ones I have provided above cover most of what you can expect on the exam.

Remember, the best source of information for the content that is actually going to be on the exam are the official CompTIA exam objectives.


comptia career path

Do I Need the Security+ before the CySA+?

The CySA+ falls after the Security+ in CompTIA’s Certification Career Path. While this path is recommended by CompTIA, the Security+ is not a prerequisite for the CySA+. While, there are no requirements to take the CySA+, the Security+ material will help you pass the CySA+.

CySA+ Alternatives

With so many certifications out there is can be hard to choose which one is right for your career path. It is important to weigh all of the options so you can devote your time and money towards the best certification for you.

If you are looking to get into security administration, the ISC2 Systems Security Certified Practitioner (SSCP) may be a better option for you.

If you are either a red-teamer, or looking to become a penetration tester the CompTIA Pentest+ will better serve your needs.

If you have the budget, the GIAC Continuous Monitoring (GMON) is a great certification for your resume. I have personally taken a SANS course and while they are very expensive, they provide you the highest quality information. The GMON or the GCDA may be the right certification for you if your employer is picking up the tab.

The CySA+ is specifically intended for professionals following the cyber security analyst path. Before committing to this exam, make sure it aligns with your goals.

CySA+ Expected Salary

The CySA+ will help you get a position as a Cyber Security analyst. Depending on the area where you live and your experience, a cyber security analyst salary can range from between $64,000 – $120,000. This is a wide range but location and experience are key factors in determining an analyst’s salary.

Will the CySA+ Look Good on My Resume?

The CySA+ is a great resume booster. The certification is still relatively new, but it is quickly proving to be a certification that recruiters are looking for. Recruiters know that candidates who possess this certification have a solid foundation in cyber security and are ready to take on important roles at the company.

Companies are rapidly looking for qualified professionals to fill the cyber security skills gap. The CySA+ tells employers that the candidate possesses up to date knowledge and that they are ready for action.

How Can You Best Prepare Yourself for the CySA+?

Everyone is different when it comes to studying methods, but here at Cyber Career School we have really honed in on the approach of utilizing 3 main study methods.

  1. Reading the Book
  2. Watching the Video
  3. Taking Practice Questions

While it sounds simple, this proven approach is effective for visual learners, auditory learners, kinesthetic learners, and reading / writing learners.

What Is the Best CySA+ Study Material?

The best book on the market right now is the Sybex CySA+ study guide. I really appreciated the deapth of the information in this book and especially the practice questions. Sybex makes some of the most best practice questions out there for this exam.

If you are like me and you burn through practice questions, you should consider getting the Sybex Practice Exam book. I studied these practice exams and did them all multiple times and it really helped in my final preparation. I ended up with a final score of 823!

For the video component of our study method, I recommend Pluralsight. Pluralsight makes some of the best video courses out there. This course really helped emphasize the material that I learned through reading the book.

One other bonus about Pluralsight is the fact that it’s one flat membership to access all of their course content. This means that when you have passed the CySA+ you can watch any of their other cyber security courses or even use the platform for your next certification!

Does the CySA+ Need to Be Renewed?

Like most CompTIA certifications, the CySA+ needs to be renewed every three years. You can renew your certification by getting another one of CompTIA’s certifications (of a higher level) or you can complete 60 Continuing Education Units (CEUs). There is a $50 fee for submitting your CEU credits.

Related Questions

Should I take The CySA+ or The Security+ First?

We actually have a full article to help you decide whether the Security+ or the CySA+ should be your next certification. When choosing whether to take the CompTIA Security+ or the CySA+ you need to identify both your current knowledge and which path you are aiming for.

If you have previous experience in cyber security and are following the cyber security analyst path, then the CySA+ will be the better option for you. If you are new to the field and are looking for a good first certification, then you should start with the Security+.

Final Thoughts:

The CySA+ is a great exam to add to your resume. If you have experience as a security analyst, it will validate your current skills while filling in the gaps and areas that you are weaker on. If you are looking to become a security analyst, the CySA+ is perfect for you. This exam is catered specifically for the role and will tell recruiters that you are ready for action.

If you choose to pursue the CySA+, follow the study strategy presented in this article and you will set yourself up for success!

How I passed The CompTIA CySA+ With A Score of 823

Is the CEH Worth It? (Costs & Alternatives Explained)

Is the CEH Worth It? (Costs & Alternatives Explained)

Choosing a certification is a decision that must not be taken lightly. You are exchanging your and your money and want to ensure that you are making the best decision for your career development. The Certified Ethical Hacker (CEH) certification is a popular entry-level cert, but especially with the other options out there, is it worth it?

Is the CEH Worth It?

The Certified Ethical Hacker (CEH) is a popular entry-level penetration testing certification. The average salary of a Certified Ethical Hacker is $71,331. Having the CEH will help your resume get read, and will help you get your first job as a penetration tester.

While the CEH is a popular certification that looks good on your resume, we recommend that you consider your options and devote some time to really deciding whether this exam is worth your time and money.

Similar certifications to the CEH, like the OSCP, eLearnSecurity PTS, and the Pentest+ may be better for your unique situation. In this article, we lay out all the options so you can be best informed when making this decision.

What Is the Certified Ethical Hacker Certification?

The CEH is an entry-level penetration testing certification that is issued by EC Council. The CEH measures the candidate’s ability to perform reconnaissance, enumeration, gain access, maintain access (persistence), and cover their tracks.

What Is Ethical Hacking?

Ethical Hacking is the process of testing one’s own computers, network, or devices to determine if vulnerabilities exist and to develop preventive, corrective, and protective countermeasures before an actual compromise to the system takes place.

What is the Job Outlook for Ethical Hackers?

As with all jobs in cyber security, there is a lot of anticipated growth in the ethical hacking space. More and more organizations are understanding the importance of testing their systems. For this, orgs will either have internal penetration testing teams or they will hire consultants.

What Jobs Can You Get with the CEH?

The CEH certification will open you up to many lucrative job positions. Below are some of the roles you can get into with a CEH and the corresponding salaries provided by

  • Information security analyst: $70,721
  • Penetration tester: $80,334
  • Information security manager: $108,352
  • Security engineer: $88,062
  • Cyber security analyst: $74,360
  • Information security engineer: $91,075

What Are the Prerequisites for the CEH?

To attempt the CEH you have two options, you can either take the official training path provided by EC council, or you can attempt the self-taught method. Each of these approaches has its own benefits and downsides.

EC Council Approved Training

The EC Council approved training costs around $850 and will provide you everything you need to know to prep for the exam. This approach is pricey, but you can go into the exam confidently knowing that you have covered all of the exam material.

CEH Self Study Approach

You can also take the CEH exam without taking the EC Council approved training, but this approach has some requirements you must first meet.

  • You must have two or more years of documented information security experience
  • Pay a non-refundable $100 application fee.
  • Submit the EC-Council Eligibility Form
  • Purchase the CEH exam voucher and your study materials

How Much Does It Cost to Get CEH Certified?

The total cost that you will have to pay to obtain the CEH certification varies whether you are taking the EC-Council certified training or taking the self-taught route.

EC-Council Training Approach: For this approach, the total cost will be around $2049 depending on the specific training you take. This cost breaks down into the cost of the exam voucher ($1,199) and the training ($850)

Self-Study Costs: The Self Study approach will cost around a total of $1499. This cost breaks down into the cost of the exam voucher ($1,199), application fee ($100), and estimated cost of study materials ($200).

Do I Have to Renew The CEH?

The Certified Ethical Hacker is valid for three years from the date of your successful completion. After this period has passed you will need to earn 120 CEU’s (continuing education units). EC-Council refers to these CEU’s as ECEs (electrical and computer engineering credits).

In addition to the ECEs, you will need to pay an annual membership fee of $80. This is a massive downside of the exam and should be considered before you invest your time and money in studying for it. Other comparable certifications like the CompTIA Pentest+ do not have an annual fee.

CEH vs The OSCP and The Pentest+

While I do think that the CEH is a good certification, I think that your money and time would be better spent studying for either the OSCP or The CompTIA Pentest+. Even with the recent price increase of the OSCP, both the OSCP and Pentest+ are more affordable than the CEH. In addition to being more affordable, they encompass more real-world scenarios and all for all will provide you a better education than the CEH.

CEH Alternatives:

CEH – $1499-$2049

OSCP – $999-$1349

Pentest+ – $359(+ Study Materials)

eLearnSecurity PTS – $399-$499

After Weighing the Options, Is the CEH Worth It?

On paper, the CEH looks like a great certification, but when you do more research and analyze the alternatives it is not the best option unless you are specifically going for a job that requires the certification.

Our Recommendations:

If you have previous penetration testing experience, we recommend that you take the OSCP. The OSCP is the best way to show you hands-on skills. If you are newer to penetration testing you should go with the Pentest+ or the eLearnSecurity PTS.

Final Thoughts:

This article is not meant to speak down on the CEH, our goal here is to provide an honest review on whether the CEH is worth it while considering the other options that are available. Hopefully, after reading this you are able to choose which certification is right for your unique situation and goal career path.