Overview

ISACA’s Certified Cybersecurity Operations Analyst (CCOA™) certification focuses on the technical skills to evaluate threats, identify vulnerabilities, and recommend countermeasures to prevent cyber incidents. As emerging technologies like automated systems using AI evolve, the role of the cyber analyst will only become more critical in protecting digital ecosystems. Analysts specialize in understanding the what, where and how behind cybersecurity incidents. By identifying patterns, anomalies and indicators of compromise, you become the eyes and ears of your organisation’s defense.

CCOA is administered through a hybrid exam that assesses a candidate’s knowledge and skills using a blend of traditional multiple-choice and performance-based questions.

A copy of ISACA’s CCOA Exam Candidate Guide can be downloaded here.

Taking and passing the CCOA certification exam is just the first step in becoming certified. To become CCOA certified, an individual must first meet the necessary requirements.

Request Certification Information


Prepare for the Certified Cybersecurity Operations Analyst (CCOA) exam with training from Lumify Work, an Accredited Partner of ISACA.



Exam Content and Weightings

Following are the key domains and topics on which CCOA candidates will be tested, with weightings.

Domain 1: Technology Essentials

Identify the key components of computer and cloud networking, understand how databases, virtualisation, and containerisation are leveraged, and become familiar with command-line interfaces, programming, scripting, and more.

A. Networking 

  1. Cloud Networking 

  2. Computer Networking 

  3. Devices, Ports, and Protocols 

  4. Network Access 

  5. Network Tools 

  6. Network Topology 

  7. Segmentation (Logical, Physical) 

B. Systems/Endpoint 

  1. Databases 

  2. Command Line 

  3. Containerisation/Virtualisation 

  4. Middleware 

  5. Operating Systems 

C. Applications

  1. Application Programming Interface (API) 

  2. Automated Deployment 

  3. Cloud Applications 

  4. Scripting/Coding 


Domain 2: Cybersecurity Principles and Risk

Understand cybersecurity governance and alignment with business drivers, define cybersecurity strategy based on enterprise objectives, establish effective cross-organisational communication for cybersecurity and more.

A. Cybersecurity Principles 

  1. Compliance 

  2. Cybersecurity Objectives 

  3. Governance 

  4. Risk Management 

  5. Roles and Responsibilities 

  6. Cybersecurity Models 

B. Cybersecurity Risk

  1. Application Risk 

  2. Cloud Technology Risk 

  3. Data Risk 

  4. Network Risk 

  5. Supply Chain Risk 

  6. System/Endpoint Risk 

  7. Web Application Risk 


Domain 3: Adversarial Tactics, Techniques, and Procedures

Understand common adversarial tactics, techniques, and procedures (TTPs), develop critical and creative thinking skills for threat detection and response, differentiate between dashboard events, attacker mindset insights and more.

A. Threat Landscape 

  1. Attack Vectors 

  2. Threat Actors/Agents 

  3. Threat Intelligence Sources 

B. Means and Methods 

  1. Attack Types 

  2. Cyber Attack Stages 

  3. Exploit Techniques 

  4. Penetration Testing 


Domain 4: Incident Detection and Response

Understand the importance of cybersecurity-incident preparedness, recognise the significance of incident detection and response in mitigating their impact, appreciate the role of proactive planning, practice, process refinement and more.

A. Incident Detection 

  1. Data Analytics 

  2. Detection Use Cases 

  3. Indicators of Compromise and/or Attack 

  4. Logs and Alerts 

  5. Monitoring Tools and Technologies 

B. Incident Response 

  1. Incident Containment 

  2. Incident Handling 

  3. Forensic Analysis 

  4. Malware Analysis 

  5. Network Traffic Analysis 

  6. Packet Analysis 

  7. Threat Analysis 


Domain 5: Securing Assets

Understand the importance of designing countermeasures to protect digital assets, recognise the iterative nature of securing systems and their ecosystems, appreciate the holistic approach to securing assets, consider technical aspects and organisational products, services and critical business processes, and more.

A. Controls 

  1. Contingency Planning 

  2. Controls and Techniques 

  3. Identity and Access Management 

  4. Industry Best Practices, Guidance, Frameworks, and Standards 

B. Vulnerability Management 

  1. Vulnerability Assessment 

  2. Vulnerability Identification 

  3. Vulnerability Remediation 

  4. Vulnerability Tracking 


Supporting Tasks

  1. Identify and analyse threats applicable to the organisation.

  2. Identify and analyse vulnerabilities applicable to the organisation.

  3. Monitor the threat landscape of an organisation.

  4. Synthesise information to protect the organisation from cybersecurity risks.

  5. Contextualise information to aid in the identification of threats/vulnerabilities to protect the organisation from risk.

  6. Develop detection use cases and rule sets for monitoring.

  7. Monitor events for potential cybersecurity incidents.

  8. Triage events to determine if an incident has occurred.

  9. Handle cybersecurity incidents according to incident response documentation, including classification, escalation, and notification.

  10. Perform analysis considering type, volume, and impact/scale.

  11. Aid in determining business impact.

  12. Aid in the prioritisation of cybersecurity incidents for management.

  13. Propose containment measures for a cybersecurity incident.

  14. Support forensic investigation processes.

  15. Interpret analysis results.

  16. Document and report on cybersecurity incidents, including the analysis process and results.

  17. Consult with external stakeholders (e.g., clients/customers/suppliers) regarding cybersecurity.

  18. Learn from cybersecurity incidents for continuous improvement.

  19. Support business objectives for an organisation.

  20. Communicate and/or advise other departments regarding cybersecurity operations and risks.

  21. Contribute to cybersecurity policies and procedures to align with business objectives.


Request Certification Information