• To ensure you get the most out of your CIN membership and stay connected with the latest updates, we are asking all members to update their community profiles. Please take a few moments to log in and: • Complete all sections of your profile • Review your current information for accuracy • Enter an alternative email address if desired (CIN requires your valid business email address for your training organization). Keeping your profile up to date helps us better serve you, ensures your account is correctly linked with CompTIA’s CRM, streamlines processes, enhances communication, and guarantees you never miss out on valuable CIN opportunities. Thank you for taking this important step! step!

The WOW factor

Well, if it were me, for CySA, I'd do a mockup of a major forensics incident. Set up a workstation office, cordoned off with yellow tape. Machine is still up, so maybe figuring out how to preserve the evidence in RAM, doing a proper disk copy with dd, using a write blocker.

Actual scans using OpenVAS/Greenbone, Nessus, or Qualys - or setting up some target Metasploitables that you can scan are also good for getting interest. Since CySA is Blue Team operations its not quite as alluring as the Red Team stuff in PenTest, but you can still pull those tools out. A run through Kali/Parrot/Security Onion, doing some intelligence gathering with Maltego, or going through Metasploit - all fun things to show the students.

I've always wanted to do a Red vs. Blue capture the flag thing.

/r