Want to Get into the Fastest Growing Field in IT?

Get ready to join the elite ranks of IT pros who fight cyber crime.

Cyber Security Essentials is a vendor-neutral exam that measures competency in nine subject areas. Click on a subject title to learn more.


Information Systems Security

Means by which electronically stored information is kept confidential. Information Systems Security, also known as INFOSEC, often refers to the access controls to prevent unauthorized people from accessing an information system, which is accomplished through a combination of processes.

Application Security

Use of software, hardware and procedural methods to protect applications from hacker threats. Because applications are increasingly accessible over networks, they are vulnerable to a wide variety of threats.

Governance

Practices exercised by those responsible for an organization or enterprise. The overarching goal of governance is to provide an organization with a strategic direction to ensure that it reaches business objectives and that risks, including ever-increasing cyber security risks, are effectively managed.

Compliance

How well an organization adheres to the standards of good practice when it comes to managing cyber risks.

Operational Security

Identification and safeguarding of sensitive or critical information. In a well-run organization, management and users enhance operational security against cyber risks by instilling effective procedures and guidelines into the day-to-day operations.

Network Security

Procedures and policies adopted by an organization’s computer network administrator to prevent unauthorized access or misuse of a computer network and systems attached to that network. It also refers to the systems put in place to ensure authorization of access to data in a network.

Physical Security

Procedures and polices that blunt unauthorized access to areas in a facility where computer and networking resources are housed. Some common types of physical security include door alarms, video cameras, locked doors and barrier fences.

Environmental Security

Protection of computer and networking resources from environmental damage from threats such as fire, water, smoke, dust, radiation and impact.

Vulnerability Management*

Consolidated methodology and process for assessing, mitigating and protecting an organization’s computer and networking resources, while also reducing the cost of security and compliance. Vulnerability management also includes assessing and planning for myriad threat scenarios, from environmental disaster to cyber attack.

* Not covered with CompTIA Security+TM Certification Exam (SY0-301)

Test Details:

  • Number of Questions: 100
  • Types of Quesitons: Multiple choice, single response
  • Penalty for Incorrect Answer: No
  • Passing Score: 180 (on a scale of 0 – 300)
  • Languages: English – American
  • Length of Test: 180 minutes (no breaks)

Why Prometric's Cyber Security Essentials?

Cyber Security Essentials can help you rapidly expand your career options and gain the IT industry's acknowledgment and respect. You can use the experience and skills you already have to jump-start your cyber security certification process!

Who Should Take This Exam?

Cyber Security Essentials is recommended to:

  • IT technicians, tier 1 and 2 support, PC support technicians, field technicians, among others!
  • IT professionals seeking to obtain DoD 8570, CISSP, and GIAC certification.
  • Anyone interested in career advancement or career move into the cyber security field.
  • IT professionals who want to demonstrate acquired cyber security skills to employers.

Meet the Developers:

Cyber Security Essentials was developed by Prometric, the world's trusted leader in test development, delivery and certification, in collaboration with senior IT engineers and technical staff from leading companies, expanding the globe, with over 20 years of experience. Subject Matter Experts who developed this exam hold excellent credentials including CISSP, CISA and CEH to name a few. They currently perform in a variety of fields, including computer hacking forensic investigation, ethical hacking, network security, digital forensics and cyber security.