ISACA • CCOA
Validates technical cybersecurity skills across five domains: technology essentials, cybersecurity principles and risk, adversarial tactics and techniques, incident detection and response, and securing assets, combining knowledge-based and hands-on performance-based questions.
Questions
593
Duration
240 minutes
Passing Score
450/800
Difficulty
AssociateLast Updated
Feb 2026
The Certified Cybersecurity Operations Analyst (CCOA) is a technical cybersecurity credential introduced by ISACA in early 2025, designed to validate the operational skills required by security analysts working in modern threat environments. It bridges a recognized gap in the certification landscape by combining traditional knowledge-based multiple-choice questions with hands-on, performance-based questions that require candidates to work with real open-source tools such as Security Onion and Kibana. The credential was named Professional Certification Program of the Year in the 2025 Cybersecurity Breakthrough Awards, reflecting rapid industry recognition since its launch.
Spanning five globally validated domains — Technology Essentials, Cybersecurity Principles and Risk, Adversarial Tactics and Techniques, Incident Detection and Response, and Securing Assets — the CCOA assesses both conceptual understanding and practical ability. Candidates must demonstrate proficiency in areas ranging from cloud and network fundamentals to forensic analysis, malware investigation, and vulnerability remediation, making it one of the few associate-level credentials to rigorously test applied, hands-on cybersecurity competency.
The CCOA is targeted at early- to mid-career cybersecurity professionals with approximately two to three years of experience in security operations. It is particularly well-suited for individuals working as or aspiring to become Cybersecurity Analysts, Information Security Analysts, SOC (Security Operations Center) Analysts, Vulnerability Analysts, and Incident Response Analysts.
The exam is open to anyone with an interest in cybersecurity — there are no formal prerequisites — making it accessible to career changers and recent graduates who can demonstrate technical proficiency through self-study or bootcamp training. It is especially valuable for those seeking to distinguish themselves in a competitive SOC hiring market or to formalize practical skills acquired on the job.
ISACA does not impose formal prerequisites to register for the CCOA exam; it is open to all candidates. However, ISACA recommends that candidates have approximately two to three years of hands-on experience in a cybersecurity operations role before attempting the exam, as the performance-based questions require familiarity with real-world tools and workflows.
Candidates should be comfortable with core networking concepts (TCP/IP, protocols, ports), operating systems (Windows and Linux command-line interfaces), cloud infrastructure basics, and scripting fundamentals. Prior exposure to SIEM platforms, log analysis, and basic incident response procedures will be highly beneficial, particularly given that Domain 4 (Incident Detection and Response) accounts for 34% of the exam weight. To earn the full CCOA certification designation, candidates must apply within five years of passing the exam.
The CCOA exam consists of 115 scored multiple-choice questions and 25 performance-based questions, for a total of 140 questions. The performance-based questions present candidates with simulated, hands-on scenarios using open-source cybersecurity tools, assessing practical skills rather than purely theoretical recall. The exam has a time limit of 240 minutes (4 hours).
The exam is computer-based and can be taken either at an authorized PSI testing center globally or via remote proctoring. Registration is continuous — candidates can register at any time and schedule a testing appointment as early as 48 hours after payment. The passing score is 450 out of 800. Exam fees are $399 for ISACA members and $499 for non-members. Eligibility established at registration remains valid for 12 months.
The CCOA addresses a well-documented gap in technical, operations-focused cybersecurity credentials and has gained rapid traction since its 2025 launch — LinkedIn listed nearly 2,000 CCOA-preferred job postings within six months of the credential's release, with demand concentrated at MSSPs and enterprise security teams in the U.S., U.K., Canada, and India. Early salary data indicates the credential can increase compensation offers by 5–10%, with the average advertised salary for a certified SOC Tier II analyst in the United States at approximately $104,000. The U.S. Bureau of Labor Statistics projects 33% employment growth for information security analysts over the coming decade, and ISACA's 2025 research found that 70% of CISOs expect SOC headcount to grow in the near term.
Beyond immediate job market impact, the CCOA provides a structured pathway within ISACA's certification ecosystem. Passing the CCOA exam grants a one-year educational experience waiver toward the Certified Information Security Manager (CISM) exam, enabling analysts to progress toward a governance-level credential without duplicating experience documentation. Compared to alternatives such as CompTIA Security+ (which is broader and less operationally focused) or CompTIA CySA+ (a close competitor), the CCOA differentiates itself through its mandatory hands-on lab component and ISACA's established enterprise credibility.
1. A security architect designs a detection strategy using the Pyramid of Pain model. The team wants to maximize impact on adversary operations. Which three indicator types should the architect prioritize for detection rules? (Select three!)
Select all that apply2. A security analyst investigates potential data exfiltration and discovers DNS queries with unusually long subdomain names containing hexadecimal characters. The queries are sent to an attacker-controlled authoritative DNS server. Which technique is MOST likely being used? (Select one!)
3. A SOC implements detection use cases and establishes the following alert thresholds: failed logins generate alerts after 5 attempts in 10 minutes, privilege escalation triggers immediate alerts, and data exfiltration over 1GB within 1 hour creates high-severity incidents. After deployment, Tier 1 analysts report 450 daily failed login alerts with 2 percent true positive rate. Which metric indicates the PRIMARY problem? (Select one!)
4. A vulnerability management team is prioritizing remediation using CVSS v3.1 environmental metrics to customize base scores. They identify a vulnerability with base score 7.5 (High) affecting a critical revenue-generating application with no compensating controls. Which environmental metric modification would result in the HIGHEST adjusted score? (Select one!)
5. A vulnerability management team evaluates a newly disclosed zero-day exploit affecting their infrastructure. The CVE has a CVSS score of 8.9 (High) but an EPSS score of 0.96. Which remediation timeline should the team prioritize based on exploitation probability? (Select one!)
All exams included • Cancel anytime