This class was created by Brainscape user Rachelle Pestanas. Visit their profile to learn more about the creator.

Decks in this class (16)

Lesson 1: Comparing & Contrasting Attacks
Information security,
Primary goals or functions of inf...,
Assets
63  cards
Lesson 2: Comparing and Contrasting Security Controls
Frameworks,
Cybersecurity,
Security control
27  cards
Lesson 3: Assessing Security Posture with Software Tools
Security assessment frameworks,
Vulnerability scanning,
Penetration testing pen test acti...
52  cards
Lesson 4: Basic Cryptography Concepts
Plaintext or cleartext,
Ciphertext,
Cipher
75  cards
Lesson 5: Implementing Public Key Infrastructure
Public key infrastructure pki,
Digital certificate,
Object identifiers oids
51  cards
Lesson 6: Implementing Identity and Access Management Controls
Access control system,
Subjects,
Objects
52  cards
Lesson 7: Managing Access Services and Accounts
Authorization,
Implicit deny,
Least privilege
65  cards
Lesson 8: Implementing a Secure Network Architecture
Network architecture weaknesses,
Ciscos safe architecture,
Safes places in the network pin
67  cards
Lesson 9: Installing and Configuring Security Appliances
Firewall,
Packet filtering,
Circuit level stateful inspection...
69  cards
Lesson 10: Installing and Configuring Wireless and Physical Access Security
Wireless networking,
Service set identifier ssid,
Wireless controller
69  cards
Lesson 11: Deploying Secure Host, Mobile, and Embedded Systems
Common criteria cc,
Trusted os tos,
Trusted computing group
95  cards
Lesson 12: Implementing Secure Network Access Protocols
Dynamic host configuration protoc...,
Domain name system dns,
Dns spoofing
33  cards
Lesson 13: Implementing Secure Network Applications
Hypertext transfer protocol http,
Http header,
Http payload
58  cards
Lesson 14: Explaining Risk Management and Disaster Recovery Concepts
Vulnerable business process,
Risk management,
Phases of risk management
74  cards
Lesson 15: Summarizing Secure Application Development Concepts
Software exploitation,
Zero day exploit,
Input validation attack
59  cards
Lesson 16: Explaining Organization Security Concepts
Security posture,
Corporate security policy,
Standard
42  cards

More about
COMPTIA - Sec+ Textbook

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Rachelle Pestanas's COMPTIA - Sec+ Textbook flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Comptia SEC+
  • 27 decks
  • 1865 flashcards
  • 13 learners
Decks: Section 22 Virtualization And Cloud Comp, Section 23 Secure Application Developmen, Section 24 Authentication And Authorizat, And more!
Sec+
  • 16 decks
  • 936 flashcards
  • 336 learners
Decks: Ch 1 5, Sec Vista, Ch 6 7 8, And more!
CompTIA A+
  • 28 decks
  • 3865 flashcards
  • 617 learners
Decks: Chapter 1 Mobile Devices Mc, Chapter 1 Mobile Devices, Chapter 1 Mobile Devices Key Terms, And more!
Comp TIA Chapter Reviews
  • 28 decks
  • 758 flashcards
  • 21 learners
Decks: Chapter 2 Review Operational Procedures, Chapter 3 Review The Visible Computer, Chapter 4 Review Microprocessors, And more!
Make Flashcards