This class was created by Brainscape user William Reese. Visit their profile to learn more about the creator.

Decks in this class (51)

Acronym
Ids,
Acronym siem,
Acronym ips
102  cards
Ecosystem (Companies and what they do)
What does soar stand for in cyber...,
What is the role of secops platforms,
Which companies provide mdr mssp ...
36  cards
Cybersecurity Attack Types
Cover various types of attacks that security professionals need to defend against.
1  cards
Security Tools & Technologies
Including tools used for monitoring, detection, defense, and investigation (Wireshark, Metasploit, Splunk, Kali Linux, etc.)
0  cards
Security Protocols
Networking and encryption protocols that play a crucial role in securing communications (IPSec, SSH, SSL/TLS, HTTPS, etc.)
0  cards
Security Certifications
Important cybersecurity certifications that professionals strive for, to showcase their expertise (CISM, CEH, GIAC, OSCP)
0  cards
Cloud Security
With cloud computing's growth, specific acronyms and concepts related to securing cloud environments are crucial (CASB, IAM, IaaS, CSPM)
0  cards
Data Security
Concepts related to encryption, key management, and data protection mechanisms (DLP, FDE, Tokenization, Zero-Knowledge Proof)
0  cards
Networking
Security professionals need to understand networking concepts to identify and mitigate potential vulnerabilities (VPN, NAT, DNSSEC, 802.1X)
0  cards
Incident Response & Recovery
Concepts related to how organizations respond to and recover from cyber incidents (IRP, BCP, RTO, CIRT)
0  cards
Threat Intelligence & Defense Strategies
Acronyms and terms used in gathering intelligence on threats and creating defensive strategies (MITRE ATT&CK, SIEM, TTPs, IOC)
0  cards
Vulnerability Management
Cover concepts around identifying, assessing, and mitigating vulnerabilities (CVE, CVSS, Patch Management, Penetration Testing)
0  cards
Authentication & Access Control
Include terms related to how systems authenticate users and control access (MFA, OAuth, LDAP, SSO)
0  cards
Malware & Exploit Types
Various types of malware and exploitation techniques can be categorized (RAT, Botnet, Exploit Kit, Adware)
0  cards
Cybersecurity Concepts and Terminology
Broader concepts in the field of cybersecurity, which don’t fit neatly into other categories (Defense in Depth, Zero Trust, Air Gap, Honey Pot)
0  cards
Governance, Risk, and Compliance (GRC)
Acronyms related to how organizations manage cybersecurity governance, risk, and compliance (GRC, COBIT, SOX, ISO)
0  cards
W3 Cyber Security Quiz
Which 3 levels in osi model are u...,
A netmask can be represented by w...,
Which is the broadcast address in...
26  cards
ISO Standards in Cybersecurity
What does iso iec 27001 specify,
What is the focus of iso iec 27001,
What does iso iec 27002 provide g...
41  cards
2FA Security: Understanding SMS and Email Risks
Why is sms 2fa considered insecure,
How can sms messages be intercepted,
What is sim swapping in the conte...
17  cards
ISACA Cybersecurity Fundamentals practice quiz
Who has the greatest influence ov...,
Which of the following interpret ...,
Business continuity plans bcps as...
25  cards
Purple Griffon - Cyber Security Quiz Questions
What is the main purpose of a san...,
Which groups exploit vulnerabilit...,
What is a group of computers netw...
12  cards
Hashing and Encryption
What is the purpose of a cryptogr...,
Fill in the blank the output of a...,
What does sha stand for in sha 256
74  cards
ProProf - Cyber Security Quiz Questions
What are two types of network lay...,
Which attack requires a carrier f...,
Which of the following uses asymm...
20  cards
ProProfs - Cyber Crime Awareness Quiz
A coffee shop that collects payme...,
A hacker can use a remote adminis...,
A social engineer convinces a per...
10  cards
ProProfs - CyberSecurity Fundamentals Quiz: Exam!
Three common controls used to pro...,
Governance has several goals incl...,
Choose three according to the nis...
46  cards
ProProf - Penetration Testing MCQ Quiz
Is penetration testing used to he...,
Which of the following are ways t...,
Penetration testing should focus ...
9  cards
NIST Cybersecurity Framework
What are the five core functions ...,
What is the purpose of the identi...,
Fill in the blank the identify fu...
23  cards
NIST Frameworks
What does nist stand for,
What is the nist cybersecurity fr...,
Fill in the blank nist s mission ...
24  cards
OWASP Frameworks
What does owasp stand for,
What is the primary goal of owasp,
Fill in the blank owasp focuses o...
40  cards
Psychological Tricks for Arguments
What is the benefit of staying ca...,
Fill in the blank people equate _...,
What is verbal judo
12  cards
Cybersecurity Tools and Usage
What is the primary use of nmap,
Which tool is commonly used to se...,
Which tool helps with gathering i...
50  cards
Nmap
What does nmap stand for,
What is nmap used for,
Fill in the blank nmap is commonl...
29  cards
Wireshark
What is wireshark used for,
Fill in the blank wireshark is a ...,
What does the filter tcpport 80 d...
24  cards
Metasploit
What is metasploit used for,
Fill in the blank metasploit is c...,
What are the three main component...
31  cards
Burp Suite
What is burp suite used for,
Fill in the blank burp suite acts...,
What is the purpose of the proxy ...
31  cards
John the Ripper
What is john the ripper used for,
Fill in the blank john the ripper...,
What types of attacks does john t...
30  cards
Hydra
What is hydra used for,
Fill in the blank hydra is common...,
What types of services can hydra ...
30  cards
Kali Linux Tools - Generic Tools
What is netcat used for,
Fill in the blank netcat is often...,
How do you use netcat to create a...
33  cards
SQLmap
What is sqlmap used for,
Fill in the blank sqlmap is prima...,
How do you use sqlmap to check if...
20  cards
Netcat
What is netcat used for,
Fill in the blank netcat is often...,
How do you use netcat to create a...
19  cards
Gobuster/Dirbuster
What is gobuster used for,
Fill in the blank gobuster is a t...,
How do you use gobuster to brute ...
24  cards
Docker Quizz
What is docker,
What is a docker container,
Fill in the blank docker uses ___...
86  cards
OWASP Projects
What is the owasp top ten,
What is the primary purpose of ow...,
Fill in the blank owasp dependenc...
20  cards
20 Most Notorious Ransomwares in History
What was the main vulnerability e...,
What was the estimated financial ...,
Which two vulnerabilities were ex...
52  cards
20 Most Notorious Malwares in History
What vulnerability did wannacry e...,
How much damage was caused global...,
Which ransomware spread primarily...
49  cards
Notable Threats in Cyber (Malware, Ransomware, etc.)
What is malware,
What are common types of malware,
What is ransomware
50  cards
Cybersecurity Frameworks and Regulations
What are the five core functions ...,
The iso iec 27001 standard provid...,
True or false the cis controls ar...
31  cards
Antivirus (AV) vs. EDR vs. XDR
What is the primary focus of anti...,
Edr stands for _______,
True or false xdr is designed to ...
26  cards
Types of SQLi
What is sql injection,
True or false error based sql inj...,
Fill in the blank ________ sql in...
20  cards
Secure Operating System Qubes OS
What operating system is known fo...,
Qubes os ensures security primari...,
True or false in qubes os a secur...
13  cards
Cyber Attack Damages Types
What is a common financial cost t...,
Fill in the blank cyber attacks c...,
True or false reputational damage...
24  cards

More about
Cyber

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study William Reese's Cyber flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Cyber Security
  • 19 decks
  • 2737 flashcards
  • 99 learners
Decks: Security Risk Management Srm, Security Assessment And Testing Ant, Software Development Security Dev, And more!
Cyber-Security
  • 23 decks
  • 663 flashcards
  • 410 learners
Decks: Computer Fraud And Abuse, Wireless, Radio Frequency Fundamentals, And more!
Cyber Security
  • 27 decks
  • 612 flashcards
  • 10 learners
Decks: Unit 2 Module 3, Unit 2 Module 4, Unit 3 Module 1, And more!
Cyber Trans
  • 12 decks
  • 809 flashcards
  • 51 learners
Decks: Block 4, Block 5, Block 5 C, And more!
Make Flashcards