This class was created by Brainscape user xavier Xavier. Visit their profile to learn more about the creator.

Flashcard maker: xavier Xavier

Decks in this class (45)

1.0 Threats, Attacks and Vulnerabilities (21%)
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
1.1 Given a scenario, analyze indicators of compromise and determine the type of malware.
The creator of this deck did not yet add a description for what is included in this deck.
13  cards
1.2 Compare and contrast types of attacks.
The creator of this deck did not yet add a description for what is included in this deck.
61  cards
1.3 Explain threat actor types and attributes.
The creator of this deck did not yet add a description for what is included in this deck.
11  cards
1.4 Explain penetration testing concepts.
The creator of this deck did not yet add a description for what is included in this deck.
10  cards
1.5 Explain vulnerability scanning concepts.
The creator of this deck did not yet add a description for what is included in this deck.
7  cards
1.6 Explain the impact associated with types of vulnerabilities.
The creator of this deck did not yet add a description for what is included in this deck.
22  cards
2.0 Technologies and Tools (22%)
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
2.1 Install and configure network components, both hardware and software-based, to support organizational security.
The creator of this deck did not yet add a description for what is included in this deck.
76  cards
2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization.
The creator of this deck did not yet add a description for what is included in this deck.
25  cards
2.3 Given a scenario, troubleshoot common security issues.
The creator of this deck did not yet add a description for what is included in this deck.
22  cards
2.4 Given a scenario, analyze and interpret output from security technologies.
The creator of this deck did not yet add a description for what is included in this deck.
12  cards
2.5 Given a scenario, deploy mobile devices securely.
The creator of this deck did not yet add a description for what is included in this deck.
45  cards
2.6 Given a scenario, implement secure protocols
The creator of this deck did not yet add a description for what is included in this deck.
22  cards
3.0 Architecture and Design (15%)
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides.
The creator of this deck did not yet add a description for what is included in this deck.
18  cards
3.2 Given a scenario, implement secure network architecture concepts.
The creator of this deck did not yet add a description for what is included in this deck.
31  cards
3.3 Given a scenario, implement secure systems design.
The creator of this deck did not yet add a description for what is included in this deck.
31  cards
3.4 Explain the importance of secure staging deployment concepts.
The creator of this deck did not yet add a description for what is included in this deck.
8  cards
3.5 Explain the security implications of embedded systems.
The creator of this deck did not yet add a description for what is included in this deck.
10  cards
3.6 Summarize secure application development and deployment concepts.
The creator of this deck did not yet add a description for what is included in this deck.
30  cards
3.7 Summarize cloud and virtualization concepts.
The creator of this deck did not yet add a description for what is included in this deck.
19  cards
3.8 Explain how resiliency and automation strategies reduce risk.
The creator of this deck did not yet add a description for what is included in this deck.
21  cards
3.9 Explain the importance of physical security controls.
The creator of this deck did not yet add a description for what is included in this deck.
27  cards
4.0 Identity and Access Management (16%)
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
4.1 Compare and contrast identity and access management concepts
The creator of this deck did not yet add a description for what is included in this deck.
10  cards
4.2 Given a scenario, install and configure identity and access services.
The creator of this deck did not yet add a description for what is included in this deck.
13  cards
4.3 Given a scenario, implement identity and access management controls.
The creator of this deck did not yet add a description for what is included in this deck.
29  cards
4.4 Given a scenario, differentiate common account management practices.
The creator of this deck did not yet add a description for what is included in this deck.
28  cards
5.0 Risk Management (14%)
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
5.1 Explain the importance of policies, plans and procedures related to organizational security.
The creator of this deck did not yet add a description for what is included in this deck.
28  cards
5.2 Summarize business impact analysis concepts.
The creator of this deck did not yet add a description for what is included in this deck.
14  cards
5.3 Explain risk management processes and concepts.
The creator of this deck did not yet add a description for what is included in this deck.
25  cards
5.4 Given a scenario, follow incident response procedures.
The creator of this deck did not yet add a description for what is included in this deck.
13  cards
5.5 Summarize basic concepts of forensics
The creator of this deck did not yet add a description for what is included in this deck.
16  cards
5.6 Explain disaster recovery and continuity of operations concepts.
The creator of this deck did not yet add a description for what is included in this deck.
23  cards
5.7 Compare and contrast various types of controls
The creator of this deck did not yet add a description for what is included in this deck.
9  cards
5.8 Given a scenario, carry out data security and privacy practices
The creator of this deck did not yet add a description for what is included in this deck.
21  cards
6.0 Cryptography and PKI (12%)
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
6.1 Compare and contrast basic concepts of cryptography.
The creator of this deck did not yet add a description for what is included in this deck.
39  cards
6.2 Explain cryptography algorithms and their basic characteristics
The creator of this deck did not yet add a description for what is included in this deck.
33  cards
6.3 Given a scenario, install and configure wireless security settings
The creator of this deck did not yet add a description for what is included in this deck.
17  cards
6.4 Given a scenario, implement public key infrastructure.
The creator of this deck did not yet add a description for what is included in this deck.
43  cards
CompTIA Security+ Acronyms
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
Security+ Proposed Hardware and Software List
The creator of this deck did not yet add a description for what is included in this deck.
5  cards

More about
CompTIA Security+ SY0-501 - Based on Objectives X

  • Full test name Unspecified
  • Test acronym Unspecified

The creator of this class did not yet add a description for what is included in this class.

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer.

Looking for something else?

CompTIA Security+ SY0-501
  • 134 decks
  • 913 flashcards
  • 4 learners
Decks: Glossary Of Terms Page 1, Glossary Of Terms Page 2, Glossary Of Terms Page 3, And more!
COMPTIA SY0-501 Security+
  • 12 decks
  • 218 flashcards
  • 7 learners
Decks: Tcp Ports, Udp Ports, Wi Fi Specifications, And more!
My Security+ SY0-501 Acronyms
  • 3 decks
  • 572 flashcards
  • 69 learners
Decks: Security Syo 501 Acronyms, Security Syo 501 Quiz, Book 1, And more!
Make Flashcards