This class was created by Brainscape user Russell Davis. Visit their profile to learn more about the creator.

Decks in this class (35)

Social Engineering
What is phishing 1,
What is smishing 2,
What is vishing 3
33  cards
Determine type of attack via indicators
What is malware 1,
What is ransomware 2,
What is trojans 3
37  cards
Application Attacks
What is privilege escalation 1,
What is cross site scripting 2,
What is injections 3
28  cards
Networks Attacks
What is wireless 1,
What is evil twin 2,
What is rogue access point 3
30  cards
Explain different threat actors, vectors, and intelligence sources
What is actors and threats 1,
What is advanced persistent threa...,
What is insider threats 3
48  cards
Security concerns related to vulnerabilities
What is cloud based vs on premise...,
What is zero day 2,
What is weak configurations 3
30  cards
Techniques employed in security Assessments
What is threat hunting 1,
What is intelligence fusion 2,
What is threat feeds 3
26  cards
Penetration testing techniques
Penetration testing 1,
Known environment 2,
Unknown environment 3
22  cards
Security concepts in enterprise environment
Configuration management 1,
Diagrams 2,
Baseline configuration 3
30  cards
Virtualization and Cloud Computing concepts
Cloud models 1,
Infrastructure as a service iaas 2,
Platform as a service paas 3
26  cards
secure application development, deployment, and automation concepts
Environment 1,
Development 2,
Test 3
31  cards
Summarize authentication and authorization design concepts
Authentication methods 1,
Directory services 2,
Federation 3
31  cards
Given a scenario, implement cybersecurity resilience
Redundancy 1,
Geographic dispersal 2,
Disk 3
37  cards
Explain the security implications of embedded and specialized systems
Embedded systems 1,
Raspberry pi 2,
Field programmable gate array fpga 3
44  cards
Explain the importance of physical security controls
Bollards barricades 1,
Access control vestibules 2,
Badges 3
50  cards
Summarize the basics of cryptographic concepts
Digital signatures 1,
Key length 2,
Key stretching 3
49  cards
Given a scenario, implement secure protocols
Protocols 1,
Domain name system security exten...,
Ssh 3
25  cards
Given a scenario, implement host or application security solutions
Endpoint protection 1,
Antivirus 2,
Anti malware 3
42  cards
Given a scenario, implement secure network designs
Load balancing 1,
Active active 2,
Active passive 3
64  cards
Given a scenario, install and configure wireless security settings
Cryptographic protocols 1,
Wifi protected access 2 wpa2 2,
Wifi protected access 3 wpa3 3
24  cards
Given a scenario, implement secure mobile solutions
Connection methods and receivers 1,
Cellular 2,
Wifi 3
53  cards
Given a scenario, apply cybersecurity solutions to the cloud
Cloud security controls 1,
High availability across zones 2,
Resource policies 3
30  cards
Given a scenario, implement identity and account management controls
Identity 1,
Identity provider idp 2,
Attributes 3
28  cards
Given a scenario, implement authentication and authorization solutions
Authentication management 1,
Password keys 2,
Password vaults 3
27  cards
Given a scenario, implement public key infrastructure
Public key infrastructure pki 1,
Key management 2,
Certificate authority ca 3
37  cards
Given a scenario, use the appropriate tool to assess organizational security
Network reconnaissance and discov...,
Tracert traceroute 2,
Nslookup dig 3
44  cards
Summarize the importance of policies, processes, and procedures for incident response
Incident response plans 1,
Incident response process 2,
Preparation 3
23  cards
Given an incident, utilize appropriate data sources to support an investigation
Vulnerability scan output 1,
Siem dashboards security and info...,
Sensor 3
32  cards
Given an incident, apply mitigation techniques or controls to secure an environment
Reconfigure endpoint security sol...,
Application approved list 2,
Application block list deny list 3
16  cards
Explain the key aspects of digital forensics
Documentation evidence 1,
Legal hold 2,
Video 3
37  cards
Compare and contrast various types of controls
Category 1,
Managerial 2,
Operational 3
11  cards
Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture
Regulations standards and legisla...,
General data protection regulatio...,
National territory or state laws 3
18  cards
Explain the importance of policies to organizational security
Personnel 1,
Acceptable use policy 2,
Job rotation 3
46  cards
Explain privacy and sensitive data concepts in relation to security
Organizational consequences of pr...,
Reputation damage 2,
Identity theft 3
37  cards
Summarize risk management processes and concepts
Risk types 1,
External 2,
Internal 3
48  cards

More about
Comptia

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Russell Davis's Comptia flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA A+
  • 28 decks
  • 3865 flashcards
  • 735 learners
Decks: Chapter 1 Mobile Devices Mc, Chapter 1 Mobile Devices, Chapter 1 Mobile Devices Key Terms, And more!
Comp TIA Chapter Reviews
  • 28 decks
  • 758 flashcards
  • 21 learners
Decks: Chapter 2 Review Operational Procedures, Chapter 3 Review The Visible Computer, Chapter 4 Review Microprocessors, And more!
CompTIA Security +
  • 43 decks
  • 2139 flashcards
  • 34 learners
Decks: Fundamentals Of Security, Threat Actors, Physical Security, And more!
Make Flashcards