This class was created by Brainscape user David Caranfa. Visit their profile to learn more about the creator.

Decks in this class (27)

Risk Management
Formula for single loss expectancy 1,
Formula of annualized loss expect...,
Risk responses 6 3
7  cards
Controls
Functional order of physical cont...,
Cobit 2,
Cobit 6 principles 3
6  cards
BC/DC
Business continuity planning step...,
Business impact analysis steps 5 2,
Continuity planning tasks 2 3
4  cards
Common Protocols and Ports
Ftp 1,
Ssh 2,
Telnet 3
17  cards
Incident Response
Incident response steps 7 1,
Security incident definition 2
2  cards
Encryption/Cryptography-General
Goals of cryptography 1,
Kerckhoff s principle 2,
And logical operation function 3
20  cards
Symmetric Key Cryptography
Electronic code book mode ecb 1,
Cipher block chaining mode cbc 2,
Cipher feedback mode cfb 3
20  cards
Security models
Trusted computing base tcb 1,
Reference montitor 2,
State machine model 3
20  cards
Networking General
Types of virtual circuits 1,
Data types at the different osi l...,
Osi model layers 7 3
6  cards
Protections
Computer protection rings 1,
4 common business data classifica...
2  cards
Ethics and investigations
Isc 2 4 ethics canons 1,
Admissible evidence criteria 3 2,
Types of evidence 4 3
5  cards
Threats
Threat models 1,
Stride 6 threat classifications 2,
Pasta threat classification meani...
4  cards
Assessment and Testing
Network discovery scan types 5 1,
Tcp syn 2,
Tcp connect 3
8  cards
Data Protection Methods
Randomized masking 1,
Pseudonymization 2,
Tokenization 3
5  cards
Multi-tasking
Multitasking 1,
Multicore 2,
Multiprocessing 3
5  cards
SSO Solutions
Xml 1,
Saml 2,
Saml entities 3
7  cards
Secure Network Architecture
Wpa3 1,
Wpa3 sae 2,
Dragonfly key exchange 3
3  cards
Software Development Security
Two software assurance security m...,
Software assurance maturity model...,
Ideal model 3
6  cards
Network Attacks
Syn flood 1,
Smurf attack 2,
Fraggle attack 3
4  cards
Software Review Testing
Formal code review 1,
Testing types 2 2,
Synthetic transactions 3
4  cards
IP Networking
Ip 4 classes 1,
Rfc 1918 2
2  cards
Web Application Vulnerabilities
Xss 1,
Xsrf 2
2  cards
Controlling and monitoring Access
Kerberos definition 1,
Kerberos system components 2,
Kerberos login process 6 steps 3
13  cards
NIST publications
800 53a 1,
800 37 2,
800 53 3
4  cards
Malicious code and applications
Types of viruses 4 1
1  cards
Physical Security Controls
Wet pipe system 1,
Dry pipe system 2,
Preaction system 3
4  cards
Governance
Due diligence 1,
Due care 2
2  cards

More about
CISSP

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study David Caranfa's CISSP flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CISSP
  • 43 decks
  • 2470 flashcards
  • 703 learners
Decks: Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, And more!
CISSP
  • 21 decks
  • 865 flashcards
  • 2755 learners
Decks: Cissp Chapter 1, Cissp Glossary, Cissp Domain 1 Access Control, And more!
CISSP Exam
  • 32 decks
  • 1092 flashcards
  • 2669 learners
Decks: Access Control, Telecommunications And Network Security, Information Security Guidelines And Risk, And more!
CISSP
  • 16 decks
  • 2148 flashcards
  • 705 learners
Decks: Security Management Practices, Security Architecture And Models, Access, And more!
Make Flashcards