This class was created by Brainscape user David Caranfa. Visit their profile to learn more about the creator.

Decks in this class (27)

Risk Management
Formula for single loss expectancy,
Formula of annualized loss expect...,
Risk responses
7  cards
Controls
Functional order of physical cont...,
Cobit,
Cobit 6 principles
6  cards
BC/DC
Business continuity planning steps,
Business impact analysis steps,
Continuity planning tasks
4  cards
Common Protocols and Ports
Ftp,
Ssh,
Telnet
17  cards
Incident Response
Incident response steps,
Security incident definition
2  cards
Encryption/Cryptography-General
Goals of cryptography,
Kerckhoff s principle,
S
20  cards
Symmetric Key Cryptography
Electronic code book mode ecb,
Cipher block chaining mode cbc,
Cipher feedback mode cfb
20  cards
Security models
Trusted computing base tcb,
Reference montitor,
State machine model
20  cards
Networking General
Type so virtual circuits,
Data types at the different osi l...,
Osi model layers
6  cards
Protections
Computer protection rings,
4 common business data classifica...
2  cards
Ethics and investigations
Isc 2 4 ethics canons,
Admissible evidence criteria 3,
Types of evidence
5  cards
Threats
Threat models,
Stride 6 threat classifications,
Pasta threat classification meanings
4  cards
Assessment and Testing
Network discovery scan types,
Tcp,
Tcp connect
8  cards
Data Protection Methods
Randomized masking,
Pseudonymization,
Tokenization
5  cards
Multi-tasking
Multitasking,
Multicore,
Multiprocessing
5  cards
SSO Solutions
Xml,
Saml,
Saml entities
7  cards
Secure Network Architecture
Wpa3,
Wpa3 sae,
Dragonfly key exchange
3  cards
Software Development Security
Two software assurance security m...,
Software assurance maturity model...,
Ideal model
6  cards
Network Attacks
Syn flood,
Smurf attack,
Fraggle attack
4  cards
Software Review Testing
Formal code review,
Testing types 2,
Synthetic transactions
4  cards
IP Networking
Ip 4 classes,
Rfc 1918
2  cards
Web Application Vulnerabilities
Xss,
Xsrf
2  cards
Controlling and monitoring Access
Kerberos definition,
Kerberos system components,
Kerberos login process
13  cards
NIST publications
800 53a,
800 37,
800 53
4  cards
Malicious code and applications
Types of viruses
1  cards
Physical Security Controls
Wet pipe system,
Dry pipe system,
Preaction system
4  cards
Governance
Due diligence,
Due care
2  cards

More about
CISSP

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study David Caranfa's CISSP flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CISSP
  • 10 decks
  • 822 flashcards
  • 482 learners
Decks: Access Control, Telecommunications And Network Security, Information Security Governance And Risk, And more!
CISSP ISC2 2023
  • 90 decks
  • 3704 flashcards
  • 43 learners
Decks: Cissp Glossary, Cissp Lesson 1 Pretest, Domain 1 Access Control, And more!
CISSP
  • 22 decks
  • 1024 flashcards
  • 118 learners
Decks: Introduction, Chapter 1 Access Control, Chapter 2 Access Control Attacks And Mon, And more!
CISSP + Exams
  • 16 decks
  • 2148 flashcards
  • 194 learners
Decks: Security Management Practices, Security Architecture And Models, Access, And more!
Make Flashcards