CompTia Security+ SY0-601 Definitions

This class was created by Brainscape user Kiki's Kastle. Visit their profile to learn more about the creator.

Flashcard maker: Kiki's Kastle

Decks in this class (47)

1.1 Social Engineering Techniques
Threats, Attacks and Vulnerabilities: Compare and Contrast Different Types of Social Engineering Techniques
28  cards
1.2 Potential Indicators - Attack Type
Threats, Attacks, and Vulnerabilities: Given a Scenario, Analyze Potential Indicators to determine the type of attack
52  cards
1.3 Potential Indicators - Associated with Application Attacks
Threats, Attacks, and Vulnerabilities: Analyze potential indicators associated with application attacks
29  cards
1.4 - Network Attacks
Analyze Potential Indicators Associated with Network Attacks
53  cards
1.5 - Threat Actors, Vectors, and Intelligence Sources
The creator of this deck did not yet add a description for what is included in this deck.
44  cards
1.6 - Various Types of Vulnerabilities
Security Concerns Associated with Various Types of Vulnerabilities
25  cards
1.7 - Techniques Used in Security Assessments
The creator of this deck did not yet add a description for what is included in this deck.
28  cards
1.8 - Penetration Testing Techniques
The creator of this deck did not yet add a description for what is included in this deck.
22  cards
2.1 - Enterprise Environment Security Concepts
The creator of this deck did not yet add a description for what is included in this deck.
55  cards
2.2 - Virtualization and Cloud Computing Concepts
The creator of this deck did not yet add a description for what is included in this deck.
45  cards
2.3 - Application Development, Deployment, and Automation Concepts
The creator of this deck did not yet add a description for what is included in this deck.
37  cards
2.4 - Authentication and Authorization Design Concepts
The creator of this deck did not yet add a description for what is included in this deck.
38  cards
2.5 - Implement Cybersecurity Resilience
The creator of this deck did not yet add a description for what is included in this deck.
50  cards
2.6 - Embedded and Specialized Systems
Security Implications of Embedded and Specialized Systems
34  cards
2.7 - Importance of Physical Security Controls
The creator of this deck did not yet add a description for what is included in this deck.
41  cards
2.8 - Importance of Physical Security Controls
The creator of this deck did not yet add a description for what is included in this deck.
82  cards
3.1 - Secure Protocols
The creator of this deck did not yet add a description for what is included in this deck.
30  cards
3.2 - Host and Application Security
The creator of this deck did not yet add a description for what is included in this deck.
59  cards
3.3 - Secure Network Designs
The creator of this deck did not yet add a description for what is included in this deck.
89  cards
3.4 - Wireless Security
The creator of this deck did not yet add a description for what is included in this deck.
25  cards
3.5 - Mobile Security
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
3.6 - Cloud Security
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
3.7 - Identity and Account Management
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
3.8 - Authentication and Authorization Services
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
3.9 - Public Key Infrastructure
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
4.1 - Security Tools
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
4.2 - Incident Response
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
4.3 - Investigations
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
4.4 - Securing an Environment
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
4.5 Digital Forensics
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
5.1 - Security Controls
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
5.2 - Regulations, Standards, and Frameworks
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
5.3 - Organizational Security Policies
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
5.4 - Risk Management
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
5.5 - Data Privacy
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
3.3 - Firewalls
The creator of this deck did not yet add a description for what is included in this deck.
23  cards
Boot camp
The creator of this deck did not yet add a description for what is included in this deck.
54  cards
Acronyms
The creator of this deck did not yet add a description for what is included in this deck.
346  cards
Acronyms + Description
The creator of this deck did not yet add a description for what is included in this deck.
323  cards
Ports
The creator of this deck did not yet add a description for what is included in this deck.
34  cards
Logs
The creator of this deck did not yet add a description for what is included in this deck.
6  cards
Networking Commands
The creator of this deck did not yet add a description for what is included in this deck.
17  cards
File Manipulation Commands
The creator of this deck did not yet add a description for what is included in this deck.
6  cards
Shell and Scripts
The creator of this deck did not yet add a description for what is included in this deck.
4  cards
Forensics
The creator of this deck did not yet add a description for what is included in this deck.
5  cards
Exploitation
The creator of this deck did not yet add a description for what is included in this deck.
4  cards
Packet Capture
The creator of this deck did not yet add a description for what is included in this deck.
3  cards

More about
CompTia Security+ SY0-601 Definitions

  • Class purpose General learning

The creator of this class did not yet add a description for what is included in this class.

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer.

Looking for something else?

CompTIA Security+_SY0-601
  • 6 decks
  • 129 flashcards
  • 3 learners
Decks: 11 Compare And Contrast Different Types, 12given A Scenario Analyze Potential Ind, 13 Given A Scenario Analyze Potential In, And more!
Security + SY0-301
  • 10 decks
  • 551 flashcards
  • 70 learners
Decks: Exam I Questions, Exam A Questions, Exam B Questions, And more!
CompTIA Security+ SY1-601 from Canvas
  • 11 decks
  • 103 flashcards
  • 1 learners
Decks: 1 Overview Of Security, 2 Malware, 3 Malware Infections, And more!
SY0-601 Security+
  • 5 decks
  • 258 flashcards
  • 16 learners
Decks: Domain 10 Attacks Threats And Vulnerabil, Domain 20 Architecture And Design, Domain 30 Implementation, And more!
Make Flashcards