This class was created by Brainscape user Eric Lekus. Visit their profile to learn more about the creator.

Decks in this class (22)

Chapter 1 Security Governance Through Principles and Policies
What are the six goals for cobit,
What is itil,
What is a security policy
12  cards
Chapter 2 Personnel Security and Risk Management
What is risk management,
What is risk assessment,
What is risk response
12  cards
Chapter 3 Business Continuity Planning
What are the four steps of busine...,
What is the difference between mt...,
What is the rpo
3  cards
Laws, Regulations, and Compliance
What is the comprehensive crime c...,
What is the computer fraud and ab...,
What was the national information...
23  cards
Chapter 5 Protecting the Security of Assets
What are sample data classificati...,
What is data remanence,
What is erasing
18  cards
Chapter 6 Cryptography and Symmetric Key Algorithms
What is key space,
What is kerchoff s principle,
What is cryptography cryptoanalys...
32  cards
Chapter 7 PKI and Cryptographic Applications
Describe rsa,
Compare different symmetric and a...,
Describe elgamal
28  cards
Chapter 8 Principles of Security Models, Design, and Capabilities
What is the difference between su...,
What is privacy by design,
What is confinement
26  cards
Chapter 9 Security Vulnerabilities, Threats, and Countermeasures
What are the hardware execution t...,
What are the protection rings,
What are the process states
24  cards
Chapter 10 Physical Security Requirements
What is crime prevention through ...,
Describe wiring closets,
Describe how proximity devices work
7  cards
Chapter 11 Secure Network Architecture
Describe encapsulation in the osi...,
What does the application layer do,
What does the presentation layer do
61  cards
Chapter 12 Secure Communications and Network Attacks
What is point to point protocol,
What are the important eap deriva...,
What is disa
22  cards
Chapter 13 Managing Identity and Authentication
What is identification,
What is authentication,
What is the difference between su...
21  cards
Chapter 14 Controlling and Monitoring Access
What is the difference between pe...,
What are common authorization mec...,
Describe access control models
13  cards
Chapter 15 Security Assessment and Testing
What is nist 800 3a,
What are security assessments,
What are security audits
17  cards
Chapter 16 Managing Security Operations
What is the media management life...,
What are the key steps of provisi...,
What are the steps of the change ...
3  cards
Chapter 17 Preventing and Responding to Incidents
What are the steps of the inciden...,
What is a drdos attack,
What is a syn flood attack
10  cards
Chapter 18 Disaster Recovery Planning
What is the difference between th...,
How do you protect hard drives,
How do you protect servers
13  cards
Chapter 19 Investigations
What is the electronic discovery ...,
What are the requirements for evi...,
What are the types of evidence
6  cards
Chapter 20 Software Development Security
Describe programming languages,
What are software libraries,
What is an integrated development...
32  cards
Chapter 21 Malicious Code and Application Attacks
What are four common virus propag...,
What are advanced virus tactics,
Describe buffer overflows
17  cards
Total seminars
What is the mau in a token ring n...,
What is a system account,
What is octave
124  cards

More about
CISSP

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Eric Lekus's CISSP flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CISSP
  • 10 decks
  • 822 flashcards
  • 482 learners
Decks: Access Control, Telecommunications And Network Security, Information Security Governance And Risk, And more!
CISSP ISC2 2023
  • 90 decks
  • 3704 flashcards
  • 43 learners
Decks: Cissp Glossary, Cissp Lesson 1 Pretest, Domain 1 Access Control, And more!
CISSP
  • 22 decks
  • 1024 flashcards
  • 118 learners
Decks: Introduction, Chapter 1 Access Control, Chapter 2 Access Control Attacks And Mon, And more!
CISSP + Exams
  • 16 decks
  • 2148 flashcards
  • 194 learners
Decks: Security Management Practices, Security Architecture And Models, Access, And more!
Make Flashcards