This class was created by Brainscape user Jason Owens. Visit their profile to learn more about the creator.

Decks in this class (35)

1.1 Social Engineering
Phishing,
Smishing,
Vishing
30  cards
1.2 Attack Types
Ransomware,
Trojan,
Worm
39  cards
1.3 Application Attacks
Define privilege escalation,
Examples of privilege escalation ...,
Preventing privilege escalation a...
42  cards
1.4 Network Attacks
Define evil twin attack,
How to protect against evil twin ...,
Define rouge access point attack
28  cards
1.5 Threat Actors, Vectors & Intelligence Sources
Apt,
Example of an apt,
Insider threats
39  cards
1.6 Vulnerabilities & Security Concerns
Security concerns of a zero day v...,
Security concern of open permissions,
Security concern of unsecure root...
16  cards
1.7 Security Assessment Techniques
Define threat hunting intelligenc...,
Define threat hunting advisories ...,
Define threat hunting maneuver
21  cards
1.8 Penetration Testing
Penetration testing 3 levels of k...,
Define penetration testing rules ...,
Define penetration testing latera...
17  cards
2.1 Enterprise Security Concepts
What is the importance of configu...,
What is the importance of network...,
What is the importance of baselin...
25  cards
2.2 Virtualization & Cloud Computing
Define iaas,
Define saas,
Define paas 3
26  cards
2.3 Application Development, Deployment & Automation
What is the staging environment,
Define provisioning,
Define de provisioning
20  cards
2.4 Authentication & Authorization
Define federation,
Define attestation,
Define totp
31  cards
2.5 Cybersecurity Resilience
Define 3 common raid levels,
Define multipath relative to disk...,
Define geographic dispersal
40  cards
2.6 Embedded & Specialized Systems
What are security concerns of ras...,
Define fpga,
Scada ics security concerns
12  cards
2.7 Physical Security Controls
0  cards
2.8 Cryptographic Concepts
Define cipher,
Define key,
5 steps of digital signature usin...
27  cards
3.1 Secure Protocols
Define dnssec,
Define ssh,
Define smime
15  cards
3.2 Securing Hosts & Applications
What vulnerability exists with an...,
Define edr,
Define dlp
24  cards
3.3 Secure Network Designs
Define east west traffic,
Define north south traffic,
Define concept of zero trust
36  cards
3.4 Wireless Security
Define counter cbc mac protocol ccmp,
Define wpa2,
Define galois counter mode protoc...
24  cards
3.5 Securing Mobile Devices
Define context aware authentication,
Define containerization relative ...,
Define storage segmentation relat...
10  cards
3.6 Cloud Security
Define az and its relation to hig...,
Define resource policies in relat...,
Define secrets management in rela...
8  cards
3.7 Identity & Account Management
Define idp,
3 idp standards,
Define attributes relative to ide...
5  cards
3.8 Authentication & Authorization
Define password key,
Advantages of using a password vault,
How is hsm implemented for enterp...
21  cards
3.9 Public Key Infrastructure PKI
Define ca 3,
Define intermediate ca 2,
Define ra 2
21  cards
4.1 Tools to Assess Security
Nmap,
Curl,
Hping 4
24  cards
4.2 Policies, Procedures & Processes
Define incident response plan 5,
Tabletop exercises,
Walk through exercise
10  cards
4.3 Incident Investigation
Vulnerability scans,
Security information and event ma...,
Define sensor relative to siem
11  cards
4.4 Post-Incident Mitigation
Endpoint mitigation,
Isolation relative to post incide...,
Define containment as a mitigatio...
7  cards
4.5 Digital Forensics
Define legal hold,
Admissibility of digital evidence,
Chain of custody
29  cards
5.1 Governance - Controls
Define managerial security contro...,
Define operational security contr...,
Define technical security controls 2
9  cards
5.2 Governance - Regulations, Standards & Frameworks
Define general data protection re...,
Define payment card industry data...,
Define center for internet securi...
9  cards
5.3 Organizational Security Policies
Define acceptable use policy,
Security benefit of job rotation,
Security benefit of mandatory vac...
16  cards
5.4 Risk Management
Define risk register,
Define risk matrix heat map,
Define inherit risk
22  cards
5.5 Data Privacy
Define data minimization,
Define data masking,
Define data anonymization
8  cards

More about
CompTia Security Plus

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Jason Owens's CompTia Security Plus flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security (plus)
  • 2 decks
  • 110 flashcards
  • 17 learners
Decks: Comptia Security Plus, Citrix Xenapp 45 65 Project, And more!
Security Plus
  • 19 decks
  • 555 flashcards
  • 268 learners
Decks: Mastering The Basics Of Security, Exploring Control Types And Methods, Understanding Basic Network Security, And more!
CompTIA Security+ (SY0-601)
  • 35 decks
  • 745 flashcards
  • 2095 learners
Decks: Security Overview, Malware, Malware Infections, And more!
Comp TIA Chapter Reviews
  • 28 decks
  • 758 flashcards
  • 21 learners
Decks: Chapter 2 Review Operational Procedures, Chapter 3 Review The Visible Computer, Chapter 4 Review Microprocessors, And more!
Make Flashcards