This class was created by Brainscape user James Groth. Visit their profile to learn more about the creator.

Decks in this class (62)

GCGA Ch. 1 Mastering Security Basics
Security control categories 1,
Security control types 2,
Access controls 3
55  cards
GCGA Ch.2 Understanding Identity and Access Management
Authentication 1,
Authorization 2,
Accounting 3
35  cards
GCGA Ch. 3 Exploring Network Technologies and Tools
Osi model 1,
Tls ssl 2,
Ftp sftp 3
35  cards
GCGA Ch. 4 Securing Your Network
Ids 1,
Ips 2,
Hids vs nids 3
36  cards
GCGA Ch. 5 Securing Hosts and Data
Virtualization 1,
Vdi 2,
Container virtualization 3
49  cards
GCGA Ch. 6 Comparing Threats, Vulnerabilities, and Common Attacks
Nation state attackers 1,
Hacktivist 2,
Insiders 3
29  cards
GCGA Ch. 7 Protecting Against Advanced Attacks
Ddos attacks 1,
Major variants of ddos attacks 2,
Forgery attacks 3
23  cards
GCGA Ch. 8 Using Risk Management Tools
Risk 1,
Risk evaluation 2,
Risk management 3
38  cards
GCGA Ch. 9 Implementing Controls to Protect Assets
Physical security controls 1,
Cable locks 2,
Access badges 3
30  cards
GCGA Ch. 10 Understanding Cryptography and PKI
Integrity 1,
Symmetric encryption 2,
Asymmetric encryption 3
53  cards
GCGA Ch. 11 Implementing Policies to Mitigate Risks
Change management programs 1,
Business process issues covered b...,
Technical implications of change ...
63  cards
GCGA Ch. 11 Change Management (ST)
Change management programs 1,
Business process issues covered b...,
Technical implications of change ...
5  cards
GCGA Ch. 11 Protecting Data (ST)
Regulated data 1,
Intellectual property 2,
Data classification systems 3
7  cards
GCGA Ch. 11 Incident Response (ST)
Incident response policy 1,
Communication plan 2,
First step in incident response 3
8  cards
GCGA Ch. 11 Understanding Digital Forensics (ST)
Chain of custody 1,
Legal hold 2,
Event logs 3
12  cards
GCGA Ch. 11 Security Governance (ST)
Security governance 1,
Boards company 2,
Centralized vs decentralized gove...
11  cards
GCGA Ch. 11 Third-Party Risk Management (ST)
Supply chain 1,
Security controls used to assess ...,
Conducting due diligence 3
10  cards
GCGA Ch. 11 Security Compliance (ST)
Compliance programs 1,
Due diligence 2,
Attestation 3
6  cards
GCGA Ch. 11 Security Awareness (ST)
User training 1,
Cbt 2,
Training programs 3
4  cards
GCGA Ch. 10 Introducing Cryptography Concepts (ST)
Integrity 1,
Symmetric encryption 2,
Asymmetric encryption 3
7  cards
GCGA Ch. 10 Providing Integrity with Hashing (ST)
Hashing hashes 1,
Checksum 2,
Hashing algorithms 3
5  cards
GCGA Ch. 10 Understanding Password Attacks (ST)
Password attacks 1,
Brute force attack 2,
Dictionary attack 3
8  cards
GCGA Ch. 10 Providing Confidentiality with Encryption (ST)
Confidentiality 1,
Block cipher 2,
Stream ciphers 3
12  cards
GCGA Ch. 10 Using Cryptographic Protocols (ST)
Encryption decryption of emails u...,
Sending email digital signatures 2,
S mime 3
4  cards
GCGA Ch. 10 Exploring PKI Components (ST)
Pki 1,
Public cas 2,
Csr 3
15  cards
GCGA Ch. 9 Comparing Physical Security Controls (ST)
Physical security controls 1,
Cable locks 2,
Access badges 3
10  cards
GCGA Ch. 9 Adding Redundancy and Fault Tolerance (ST)
Single point of failure 1,
Raid disk subsystems 2,
Load balancers 3
6  cards
GCGA Ch. 9 Protecting Data with Backups (ST)
Offline backups 1,
Traditional backup methods 2,
Backup best practices 3
4  cards
GCGA Ch. 9 Comparing Business Continuity Elements (ST)
Bia 1,
Rto 2,
Rpo 3
10  cards
GCGA Ch. 8 Understanding Risk Management (ST)
Risk 1,
Risk evaluation 2,
Risk management 3
13  cards
GCGA Ch. 8 Comparing Scanning and Testing Tools (ST)
Port scanner 1,
Vulnerability scanners 2,
Cve 3
11  cards
GCGA Ch. 8 Capturing Network Traffic (ST)
Protocol analyzers sniffers 1,
Captured packets 2,
Tcpreplay 3
5  cards
GCGA Ch. 8 Understanding Frameworks and Standards (ST)
Frameworks 1,
Cybersecurity frameworks 2,
The international organization fo...
5  cards
GCGA Ch. 8 Audits and Assessments (ST)
Audits 1,
Assessments 2,
External audits 3
4  cards
GCGA Ch. 7 Identifying Network Attacks (ST)
Ddos attacks 1,
Major variants of ddos attacks 2,
Forgery attacks 3
9  cards
GCGA Ch. 7 Summarizing Secure Coding Concepts (ST)
Input validation 1,
Server side input validation 2,
Race conditions 3
11  cards
GCGA Ch. 7 Automation and Orchestration for Secure Operations (ST)
Automation and orchestration tech...,
Common use cases for automation a...,
The key benefits of automation an...
3  cards
GCGA Ch. 6 Understanding Threat Actors (ST)
Nation state attackers 1,
Hacktivist 2,
Insiders 3
6  cards
GCGA Ch. 6 Determining Malware Types (ST)
Malware types 1,
Ransomware 2,
Trojan 3
11  cards
GCGA Ch. 6 Recognizing Common Attacks (ST)
Social engineering 1,
Shoulder surfing 2,
Hoax 3
10  cards
GCGA Ch. 6 Blocking Malware and Other Attacks (ST)
Anti spam software 1,
Antivirus software 2
2  cards
GCGA Ch. 5 Summarizing Virtualization Concepts (ST)
Virtualization 1,
Vdi 2,
Container virtualization 3
5  cards
GCGA Ch. 5 Implementing Secure Systems (ST)
Endpoints 1,
Edr 2,
Hardening 3
12  cards
GCGA Ch. 5 Summarizing Cloud Concepts (ST)
Cloud computing 1,
Saas 2,
Paas 3
15  cards
GCGA Ch. 5 Deploying Mobile Devices Securely (ST)
Cope 1,
Byod vs cyod 2,
Vdi 3
11  cards
GCGA Ch. 5 Exploring Embedded Systems (ST)
Embedded system 1,
Iot 2,
Scada ics 3
6  cards
GCGA Ch. 4 Exploring Advanced Security Devices (ST)
Ids 1,
Ips 2,
Hids vs nids 3
7  cards
GCGA Ch. 4 Securing Wireless Networks (ST)
Wireless ap 1,
Ssid 2,
Mac filtering 3
10  cards
GCGA Ch. 4 Understanding Wireless Attacks (ST)
Disassociation attack 1,
Wps 2,
Rogue ap 3
8  cards
GCGA Ch. 4 Using VPNs for Remote Access
Vpn 1,
Ipsec tunnel mode 2,
Site to site vpns 3
11  cards
GCGA Ch. 3 Reviewing Basic Networking Concepts (ST)
Osi model 1,
Tcp udp 2,
Ftp sftp ftps 3
11  cards
GCGA Ch. 3 Basic Networking Devices (ST)
Switch 1,
Port security 2,
Router 3
12  cards
GCGA Ch. 3 Implementing Network Designs (ST)
Screened subnet 1,
Intranet vs extranet 2,
Nat 3
8  cards
GCGA Ch. 2 Exploring Authentication Management (ST)
Authentication 1,
Authorization 2,
Accounting 3
15  cards
GCGA Ch. 2 Managing Accounts (ST)
Shared accounts 1,
Pam 2,
Admin account policies 3
6  cards
GCGA Ch. 2 Comparing Authentication Services (ST)
Sso 1,
Sso federated identity 2,
Saml 3
4  cards
GCGA Ch. 2 Comparing Access Control Schemes (ST)
Role bac 1,
Group based privileges 2,
Rule bac 3
6  cards
GCGA Ch. 1 Understanding Core Security Goals (ST)
Confidentiality 1,
Integrity 2,
Availability 3
8  cards
GCGA Ch. 1 Introducing Basic Risk Concepts (ST)
Risk 1,
Threat 2,
Vulnerability 3
4  cards
GCGA Ch. 1 Understanding Security Controls
Four security control categories 1,
Managerial controls 2,
Operational controls 3
11  cards
GCGA Ch. 1 Understanding Logs (ST)
Windows logs 1,
Linux logs 2,
Network logs 3
7  cards

More about
CompTIA Sec+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study James Groth's CompTIA Sec+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Sec+ SY0-701
  • 22 decks
  • 953 flashcards
  • 658 learners
Decks: Comptia Sec Sy0 701 Acronyms V1, Comptia Sec Sy0 701 Acronyms V2, Comptia Sec Sy0 701 Acronyms V3, And more!
Sec+
  • 16 decks
  • 936 flashcards
  • 351 learners
Decks: Ch 1 5, Sec Vista, Ch 6 7 8, And more!
CompTIA A+
  • 28 decks
  • 3865 flashcards
  • 770 learners
Decks: Chapter 1 Mobile Devices Mc, Chapter 1 Mobile Devices, Chapter 1 Mobile Devices Key Terms, And more!