EC-Council • CSA
Validates foundational and advanced skills in Security Operations Center monitoring and analysis, covering SOC operations, SIEM deployment and use cases, log management, incident triaging, indicators of compromise investigation, threat hunting, and malware analysis.
Questions
570
Duration
180 minutes
Passing Score
70%
Difficulty
AssociateLast Updated
Feb 2026
The Certified SOC Analyst (CSA) — exam code 312-39 — is an associate-level credential awarded by EC-Council that validates a candidate's ability to perform Tier I and Tier II Security Operations Center (SOC) functions. The certification covers the full SOC workflow, from understanding the People, Process, and Technology framework of SOC operations to deploying and tuning SIEM platforms, managing centralized log pipelines, triaging alerts, investigating indicators of compromise (IoCs), and executing incident response procedures. The curriculum spans over 350 SIEM use cases across application, network, insider-threat, and compliance scenarios, and incorporates AI-enabled capabilities for alert prioritization, threat detection automation, and SIEM rule generation.
The CSA is the only SOC analyst credential that maps 100% to the NIST/NICE Framework under the Protect and Defend (PR) work role of Cyber Defense Analysis (CDA). It was recently updated to CSA v2, adding modules on cloud security operations (AWS, Azure, GCP), forensic investigation and malware analysis within a SOC context, and threat hunting using modern tools such as Velociraptor, YARA, and UEBA platforms. Candidates gain hands-on experience with industry-standard platforms including Splunk, the ELK Stack, OSSIM, and Log360, preparing them to operate effectively in real-world SOC environments from day one.
The CSA is primarily designed for current and aspiring Tier I and Tier II SOC analysts seeking to formalize and advance their operational skills. It is equally well-suited for network administrators, network security engineers, and cybersecurity analysts who want to transition into a dedicated security operations role. IT professionals working in network defense, security monitoring, or incident handling — including federal employees and government contractors with NICE Framework responsibilities — will find the credential directly applicable to their daily work.
Candidates do not need prior security certifications to pursue the CSA, but a foundational understanding of networking concepts, operating systems, and basic cybersecurity principles is strongly recommended. Professionals who have completed EC-Council's Network Defense Essentials (NDE) or Certified Network Defender (CND), or who hold equivalent knowledge, are well-positioned to succeed.
EC-Council does not mandate formal prerequisites for the CSA exam, making it accessible to candidates early in their cybersecurity careers. However, EC-Council recommends that candidates possess a working knowledge of networking fundamentals (TCP/IP, protocols, network devices), basic operating system concepts for both Windows and Linux environments, and a general understanding of information security concepts before attempting the exam.
Candidates who complete EC-Council's official CSA training program — available in instructor-led, online self-paced, and live-online formats — are best prepared for the exam, as the course is aligned directly to the exam blueprint. Practical familiarity with at least one SIEM platform (such as Splunk or the ELK Stack) and exposure to log analysis tools will significantly ease the learning curve for the more heavily weighted domains.
The CSA exam (code 312-39) consists of 100 multiple-choice questions delivered in a proctored format through EC-Council's ECC Exam Centre. Candidates are allotted 180 minutes (3 hours) to complete the exam. A passing score of 70% (70 out of 100 correct) is required to earn the certification. The exam is available as an online proctored test or at an authorized EC-Council testing center.
The exam is aligned to the CSA v2 blueprint, and all questions are mapped to the eight official exam domains. There are no separate practical or lab components required to earn the certification, though EC-Council's official training includes extensive hands-on lab exercises. The exam fee is approximately $250 USD, and the resulting certification is valid for three years, after which holders must earn continuing education credits or retake the exam to maintain the credential.
Earning the CSA credential positions professionals for Tier I and Tier II SOC analyst roles, which are among the most consistently in-demand positions in cybersecurity. SOC analysts in the United States typically earn between $60,000 and $95,000 annually at the entry-to-mid level, with Tier II analysts and those holding recognized credentials commanding salaries toward the higher end of that range. The CSA is recognized by government agencies and federal contractors, and its alignment to the NICE Framework (CDA work role) makes it relevant for public-sector cybersecurity positions that require role-based certifications.
Compared to alternatives such as CompTIA CySA+ or the SANS GIAC GCIA, the CSA is more narrowly focused on SOC operations and SIEM-centric detection workflows, making it a strong choice for professionals whose day-to-day work centers on alert triage and incident monitoring rather than broader threat analysis or network forensics. The CSA is often pursued as a stepping stone toward more advanced EC-Council credentials such as the Certified Incident Handler (E|CIH) or Certified Threat Intelligence Analyst (C|TIA), or toward vendor-specific SIEM certifications from Splunk or Microsoft.
1. A security engineer implements network security controls to prevent attackers from spoofing internal IP addresses when sending packets from external networks. Which filtering technique prevents packets with spoofed source addresses using invalid network prefixes from entering the network? (Select one!)
2. A Tier 2 analyst investigates a web application attack using Apache access.log files. The analyst runs the command: grep -Ei 'union|select|drop' access.log | awk '{print $1}' | sort | uniq -c | sort -rn | head -5. What is the purpose of this command pipeline? (Select one!)
3. A Linux system administrator configures auditd to monitor privilege escalation attempts. Which audit rule captures all execve system calls on a 64-bit system with a custom key for analysis? (Select one!)
4. A vulnerability management analyst receives EPSS scores for three critical vulnerabilities affecting the organization's infrastructure. CVE-2025-11111 has CVSS 9.8 with EPSS 2.3%, CVE-2025-22222 has CVSS 7.5 with EPSS 45.7%, and CVE-2025-33333 has CVSS 8.2 with EPSS 0.8%. The organization can only patch one vulnerability immediately due to resource constraints. Which vulnerability should be prioritized? (Select one!)
5. A threat intelligence analyst receives STIX 2.1 objects via TAXII protocol from an industry sharing community. The analyst needs to extract all malicious IP addresses and file hashes to import into the organization's firewall and endpoint protection platform. Which two STIX object types should the analyst query? (Select two!)
Select all that applyAll exams included • Cancel anytime