Professor Messer Security+

This class was created by Brainscape user iam P. Visit their profile to learn more about the creator.

Decks in this class (89)

Threat Actors
What are all threat actors covere...,
What is a threat actor 2,
Reasons they attack 3
10  cards
Threat Vectors
What are the vectors went over in...,
Message vectors 2,
Image based vectors 3
12  cards
Memory Injection
What does dll stand for 1,
What is memory injection 1,
What is dll injection 2
3  cards
Buffer Overflow
What is it 1,
How hard is it to do this 2,
Give an example 3
4  cards
Race Conditions
What is race conditions 1,
Toctou 2,
Example of rc 3
4  cards
Malicious Updates
Malicious update 1,
What are best practices when upda...,
Automatics updates 3
3  cards
Operating System Vulnerabilities
Ms example 1,
Best practices 2
2  cards
SQL Injection
Code injection 1,
Sql 2,
Sqli 3
4  cards
Cross-site Scripting
What is xss 1,
What is commonly used 2,
What does it do 3
7  cards
Hardware Vulnerabilities
Iot 1,
Firmware 2,
Eol 3
5  cards
Virtualization Vulnerabilities
Why so difficult 1,
What are vm 2,
What are vms susceptible to 3
6  cards
Cloud-specific Vulnerabilities
Dos 1,
Applications 2,
Out of bounds write 3
3  cards
Supply Chain Vulnerabilities
Supply chain 1,
Why is it important in cybersec 2,
Service provider 3
4  cards
Misconfiguration Vulnerabilities
Open permissions 1,
Unsecured admin account 2,
Insecure protocols 3
5  cards
Mobile Device Vulnerabilities
Jailbreaking rooting 1,
Sideloading 2
2  cards
Zero-day Vulnerabilities
Quick summary 1
1  cards
An Overview of Malware
What is malware 1,
Types 2,
Ransomware 3
4  cards
Viruses and Worms
What is a virus 1,
Virus types 2,
Fileless virus 3
4  cards
Spyware and Bloatware
Spyware 1,
Bloatware 2
2  cards
Other Malware Types
Keylogger 1,
Logic bomb 2,
Example of logic bomb 3
5  cards
Physical Attacks
Brute force 1,
Rfid cloning 2,
Environmental 2
3  cards
Denial of Service
Denial of service dos 1,
Ddos 2,
Botnet 3
4  cards
DNS attacks
Dns poisoning 1,
Domain hijacking 2,
Url hijacking 3
3  cards
Wireless Attacks
Wireless deauthentication 1,
How does it work 2,
Rf jamming 3
4  cards
On-path attack
What is it 1,
What do they do 2,
Arp poisoning 3
4  cards
Replay Attack
Pass the hash 1,
Browser cookies 2,
Session id 3
4  cards
Malicious Code
Malificous code 1
1  cards
Application Attacks
Buffer overflow 1,
Replay attack 2,
Privilege escalation 3
8  cards
Cryptographic Attacks
Digital key 1,
Weakest link 2,
Birthday attack 3
7  cards
Password Attacks
Plaintext 1,
Sha 256 2,
Spraying attack 3
4  cards
Indicators of Compromise
Ioc 1,
Indicators 2,
Account lockout 3
11  cards
Segmentation and Access Control
Segmentation 1,
Acl 2,
What does acl do 3
4  cards
Mitigation Techniques
Mitigation 1,
Patching 2,
Encrytion 3
7  cards
Hardening Techniques
System hardening 1,
Encryption 2,
The endpoint 3
9  cards
Cloud Infrastructures
Cloud responsibility matrix 1,
Hybrid cloud 2,
Vendor risk management policy 3
6  cards
Network Infrastructure Concepts
Physical isolation 1,
Example of physical isolation 2,
Logical segmentation 3
10  cards
Other Infrastructure Concepts
On premise security 1,
Virtualization 2,
Containerizaion 3
10  cards
Infrastructure Considerations
Availabilty 1,
Resiliance 2,
Mttr 3
10  cards
Secure Infrastructures
Security zone 1,
Example 2,
Attack surface 3
3  cards
Intrusion Prevention
Ips 1,
What does an ips do 2,
Failure modes 3
7  cards
Network Appliances
Jump server 1,
Proxies 2,
Nat 3
8  cards
Port Security
Eap 1,
What does it do 2,
8021x 3
3  cards
Firewall Types
What does firewall do 1,
Ngfw 2,
Describe ngfw 3
5  cards
Secure Communication
Vpn 1,
What does it do 2,
Concentrator 3
9  cards
Data Types and Classifications
Data types 1,
Sensitivity 2,
Proprietary 3
5  cards
States of Data
Data at rest 1,
Data in transit 2,
Data in use 3
5  cards
Protecting Data
Geographic restrictions 1,
Geofencing 2,
Encryption 3
6  cards
Recovery Testing
Recovery testing 1,
Tabletop exercises 2,
Fail over 3
5  cards
Backups
Back up 1,
Snapshot 2,
Replication 3
4  cards
Secure Baselines
Secure baselines 1
1  cards
Hardening Targets
Mobile devices 1,
Mdm 2,
What are hardening guides 2
12  cards
Securing Wireless and Mobile
Site survey 1,
Wireless survey tools 2,
Mdm 3
5  cards
Wireless Security Settings
Wpa2 1,
Gcmp 2,
Sae 3
9  cards
Application Security
Qa 1,
Input validation 2,
Fuzzing 3
7  cards
Asset Management
Asset management 1,
Central asset tracking system 2,
Ownership 3
5  cards
Vulnerability Scanning
What is vulnerability scan 1,
Sast 2,
Dynamic analysis 3
4  cards
Threat Intelligence
What is threat intelligence 1,
Osint 2,
Propriety intelligence 3
5  cards
Penetration Testing
Pentest 1,
Nist 2,
Rules of engagement 3
5  cards
Analyzing Vulnerabilities
False positives 1,
Prioritizing 2,
Cve 3
6  cards
Vulnerability Remediation
Patching 1,
Unscheduled patch 2,
Insurance 3
8  cards
Security Monitoring
What to monitor 1,
Siem security information and eve...,
Scanning 3
7  cards
Security Tools
Scap 1,
Benchmarks 2,
Agents agentless 3
9  cards
Firewalls
Network based firewalls 1,
Next generation firewall 2,
Ports and protocols 3
6  cards
Web Filtering
Content filters 1,
Agent based 2,
Proxies 3
6  cards
Operating System Security
Active directory 1,
Group policy 2,
Selinux 3
3  cards
Secure Protocols
Protocol encryption 1,
Examples of encryptions 2,
Port selection 3
4  cards
Email Security
Mail gateway 1,
Spf 2,
Dkim 3
4  cards
Monitoring Data
Fim 1,
Sfc 2,
Dlp 3
10  cards
Endpoint Security
Endpoint 1,
Edge 2,
Access control 3
9  cards
Identity and Access Management
Iam 1,
What does it do 2,
Sso 3
8  cards
Access Controls
Access control 1,
Least privilege 2,
Mac 3
7  cards
Multifactor Authentication
Multifactor authentication 1,
Something you know 2,
Something you have 3
5  cards
Password Security
Strong password 1,
Password age 2,
Password managers 3
5  cards
Scripting and Automation
Scripting 1,
Benefits 2,
Cases 3
6  cards
Incident Response
Nist sp800 61 1,
Communication methods 2,
Analysis 3
6  cards
Incident Planning
Tabletop exercises 1,
Testing 1,
Simulation 2
5  cards
Digital Forensics
Digital forensics 1,
Rfc 3227 2,
Legal hold 3
9  cards
Log Data
Security log files 1,
Firewall logs 2,
Application logs 3
11  cards
Security Policies
Security policy guidelines 1,
Information security policy 2,
Aup 3
9  cards
Security Standards
Security standards 1,
Password 2,
Access control 3
5  cards
Security Procedures
Change management 1,
Onboarding 1,
Offboarding 2
7  cards
Security Considerations
Regulatory 1,
Sox 2,
Hipaa 3
6  cards
Risk Analysis
Risk analysis 1,
Quantitative risk assessment 2,
Aro 3
11  cards
Risk Management Strategies
Accept 1,
Risk transfer 1,
Exception vs exemption 2
3  cards
Business Impact Analysis
Rto 1,
Rpo 2,
Mttr 3
4  cards
Third-party Risk Assessment
Third party risk 1,
Penetration testing 2,
Rules of engagemetn 3
8  cards
Agreement Types
Sla 1,
Mou 2,
Moa 3
6  cards
Compliance
Compliance 1,
Penalties 2,
Compliance reporting 3
6  cards
Privacy
Privacy legal implications 1,
Gdpr 2,
Data subject 3
6  cards

More about
Professor Messer Security+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study iam P's Professor Messer Security+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Professor Messer
  • 49 decks
  • 1374 flashcards
  • 27 learners
Decks: 11, 12, 13, And more!
Security+ UDemy
  • 34 decks
  • 1562 flashcards
  • 16 learners
Decks: Section 1, Section 2, Section 3, And more!