cyber security 601

This class was created by Brainscape user L PUA. Visit their profile to learn more about the creator.

Decks in this class (118)

Encryption Overview
No deck description has yet been added by the author.
8  cards
IPSec & TLS/SSL
No deck description has yet been added by the author.
7  cards
Securing Storage Devices
No deck description has yet been added by the author.
7  cards
Endpoint Analysis
No deck description has yet been added by the author.
7  cards
Securing Wireless Devices
No deck description has yet been added by the author.
4  cards
SIM Cloning, ID Theft, & Bluetooth Attacks
No deck description has yet been added by the author.
5  cards
Root of Trust
No deck description has yet been added by the author.
2  cards
Trusted Firmware
No deck description has yet been added by the author.
8  cards
Secure Processing
No deck description has yet been added by the author.
6  cards
Mobile Device Theft
No deck description has yet been added by the author.
2  cards
Security of Mobile Apps
No deck description has yet been added by the author.
3  cards
Bring Your Own Device
No deck description has yet been added by the author.
6  cards
Hardening Mobile Devices
No deck description has yet been added by the author.
1  cards
Hardening
Unnecessary Applications, Restricting Applications
5  cards
Trusted Operating System
No deck description has yet been added by the author.
4  cards
Group Policies
No deck description has yet been added by the author.
6  cards
File Systems & Hard Drives
No deck description has yet been added by the author.
5  cards
Supply Chain Assessment
No deck description has yet been added by the author.
5  cards
Root of Trust Supply Chain
No deck description has yet been added by the author.
1  cards
Hypervisors
No deck description has yet been added by the author.
4  cards
Threats to VM's
No deck description has yet been added by the author.
5  cards
Securing VM's
No deck description has yet been added by the author.
6  cards
Web Browser Security
No deck description has yet been added by the author.
4  cards
Web Browser Concerns
No deck description has yet been added by the author.
8  cards
Securing Applications
No deck description has yet been added by the author.
3  cards
Software Development
No deck description has yet been added by the author.
12  cards
SDLC Principles (Software Development Life Cycle)
No deck description has yet been added by the author.
15  cards
Testing Methods (Software)
No deck description has yet been added by the author.
9  cards
Vulnerabilities & Exploits
No deck description has yet been added by the author.
4  cards
Buffer Overflows
No deck description has yet been added by the author.
5  cards
Cross Site Scripting & Cross Site Request Forgery
No deck description has yet been added by the author.
7  cards
SQL Injection
No deck description has yet been added by the author.
5  cards
XML Vulnerabilities
No deck description has yet been added by the author.
7  cards
Race Conditions
No deck description has yet been added by the author.
3  cards
Design Vulnerabilities
No deck description has yet been added by the author.
7  cards
The OSI Model
No deck description has yet been added by the author.
9  cards
Switches
No deck description has yet been added by the author.
5  cards
Routers
No deck description has yet been added by the author.
4  cards
Network Zones
No deck description has yet been added by the author.
4  cards
Jumpbox
No deck description has yet been added by the author.
5  cards
Network Access Control
No deck description has yet been added by the author.
4  cards
VLAN's
No deck description has yet been added by the author.
4  cards
Subnetting
No deck description has yet been added by the author.
3  cards
Network Address Translation
No deck description has yet been added by the author.
6  cards
Firewalls
No deck description has yet been added by the author.
14  cards
Proxy Servers
No deck description has yet been added by the author.
0  cards
Authentication Summary
No deck description has yet been added by the author.
7  cards
Access Control Models
No deck description has yet been added by the author.
6  cards
Best Practices for Access Control
No deck description has yet been added by the author.
5  cards
Users and Groups
No deck description has yet been added by the author.
6  cards
Permissions
No deck description has yet been added by the author.
3  cards
Risk Assesment
No deck description has yet been added by the author.
7  cards
Qualitative and Quantitative Risk
No deck description has yet been added by the author.
9  cards
Methodologies and Security Controls
No deck description has yet been added by the author.
19  cards
Types of Risk
No deck description has yet been added by the author.
6  cards
Vulnerability Management
No deck description has yet been added by the author.
4  cards
Penetration Testing
No deck description has yet been added by the author.
4  cards
Training and Exercises
No deck description has yet been added by the author.
4  cards
OVAL
No deck description has yet been added by the author.
1  cards
Vulnerability Assessment Tools
No deck description has yet been added by the author.
6  cards
Password Analysis Tools
No deck description has yet been added by the author.
10  cards
Performance Baselining
No deck description has yet been added by the author.
3  cards
Protocol Analyzers
No deck description has yet been added by the author.
6  cards
Simple Network Management Protocol (SNMP)
No deck description has yet been added by the author.
7  cards
Auditing
No deck description has yet been added by the author.
6  cards
Logging
No deck description has yet been added by the author.
9  cards
Log Files
No deck description has yet been added by the author.
5  cards
Security Information and Event Management Systems (SIEM)
No deck description has yet been added by the author.
2  cards
SYSLOG
No deck description has yet been added by the author.
10  cards
Security Orchestration Automation and Response
No deck description has yet been added by the author.
4  cards
Symmetric Algorithms
No deck description has yet been added by the author.
10  cards
Asymmetric Algorithms
No deck description has yet been added by the author.
4  cards
Pretty Good Privacy
No deck description has yet been added by the author.
3  cards
One-Time Pad
No deck description has yet been added by the author.
2  cards
Cryptography Considerations
No deck description has yet been added by the author.
4  cards
Hashing
No deck description has yet been added by the author.
13  cards
Hashing Attacks
No deck description has yet been added by the author.
7  cards
Public Key Infrastructure
No deck description has yet been added by the author.
3  cards
Digital Certificates
No deck description has yet been added by the author.
14  cards
Certificate Authorities
No deck description has yet been added by the author.
9  cards
Secure/Multipurpose Internet Mail Extensions (S/MIME)
No deck description has yet been added by the author.
3  cards
More on SSL and TLS
No deck description has yet been added by the author.
3  cards
Secure Shell (SSH)
No deck description has yet been added by the author.
4  cards
VPN Protocols
No deck description has yet been added by the author.
13  cards
Planning for the Worst
No deck description has yet been added by the author.
2  cards
Redundant Power
No deck description has yet been added by the author.
8  cards
Backup Power
No deck description has yet been added by the author.
3  cards
Data Redundancy / Disk Redundancy
No deck description has yet been added by the author.
10  cards
Network Redundancy
No deck description has yet been added by the author.
4  cards
Server Redundancy
No deck description has yet been added by the author.
4  cards
Redundant Sites
No deck description has yet been added by the author.
4  cards
Data Backup
No deck description has yet been added by the author.
4  cards
Tape Rotation
No deck description has yet been added by the author.
6  cards
Disaster Recovery Plan
No deck description has yet been added by the author.
1  cards
Business Impact Analysis
No deck description has yet been added by the author.
10  cards
Policies and Procedures
No deck description has yet been added by the author.
5  cards
Data Classifications
No deck description has yet been added by the author.
13  cards
Data Ownership
No deck description has yet been added by the author.
5  cards
PII and PHI
No deck description has yet been added by the author.
9  cards
Legal Requirements
No deck description has yet been added by the author.
3  cards
Privacy Technologies
No deck description has yet been added by the author.
5  cards
Security Policies
No deck description has yet been added by the author.
4  cards
Vendor Relationships
No deck description has yet been added by the author.
5  cards
Disposal Policies
No deck description has yet been added by the author.
6  cards
IT Security Framework
No deck description has yet been added by the author.
13  cards
Incident Response Procedures
No deck description has yet been added by the author.
9  cards
Incident Response Planning
No deck description has yet been added by the author.
9  cards
Investigative Data
No deck description has yet been added by the author.
10  cards
Forensic Procedures
No deck description has yet been added by the author.
10  cards
Data Collection Procedures
No deck description has yet been added by the author.
2  cards
Security Tools Part 1 (Network Tools)
No deck description has yet been added by the author.
10  cards
Security Tools Part 2 (Network Tools)
No deck description has yet been added by the author.
7  cards
Security Tools Part 3 (File Manipulation)
No deck description has yet been added by the author.
6  cards
Security Tools Part 4 (Shells and Scripts)
No deck description has yet been added by the author.
4  cards
Security Tools Part 5 (Packet Capture)
No deck description has yet been added by the author.
3  cards
Security Tools Part 6 (Forensics)
No deck description has yet been added by the author.
5  cards
Security Tools Part 7 (Exploitation)
No deck description has yet been added by the author.
4  cards
Ports & Protocols
No deck description has yet been added by the author.
37  cards

More about
cyber security 601

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study L PUA's Cyber Security 601 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Security + SY0-601
  • 24 decks
  • 258 flashcards
  • 40 learners
Decks: 11 Compare And Contrast Different Types, 12 Given A Scenario Analyze Potential In, 13 Given A Scenario Analyze Potential In, And more!
Cyber Security (CompTIA Security+)
  • 41 decks
  • 1670 flashcards
  • 3 learners
Decks: Chapter 1 Threats Attacks And Vulnerabil, Chapter 11 Social Engineering, Chapter 12 Attack Types, And more!
Study CompTia SY0-601
  • 24 decks
  • 746 flashcards
  • 11 learners
Decks: Must Know Items, Security Acronyms, Ports To Service, And more!
Cyber Security - Cambridge Technical
  • 4 decks
  • 101 flashcards
  • 55 learners
Decks: Lo1, Lo2, L03, And more!
Make Flashcards