This class was created by Brainscape user Zoubida Regzal. Visit their profile to learn more about the creator.

Decks in this class (35)

1.1 Social engineering attacks
What is phishing 1,
How to spot phishing attack 2,
How phishing attack are so succes...
26  cards
1.2 Malware & common attacks
What is a malware 1,
What are the different type of ma...,
How to get a malware 3
35  cards
1.3 Application attacks
What is privilege escalation 1,
How to mitigate privilege escalat...,
What is xxs cross site scripting 3
32  cards
1.4 Network attacks
What is a rogue access point 1,
How to prevent a rogue access poi...,
What is a wireless evil twins 3
32  cards
1.5 Threat actors, vectors and intelligence sources
What is a threat 1,
What is an apt 2,
Who are the threat actors 3
8  cards
1.6 Type of vulnerabilities
What is a vulnerability 1,
What are the different vulnerabil...,
What is a zero day vulnerabiliy 3
15  cards
1.7 Security assessments techniques
What is threat hunting 1,
What is intelligence fusion cyber...,
What is vulnerability scanning 3
13  cards
1.8 Penetration test techniques
What is a penetration testing 1,
What are the rule of engagement f...,
What is a unknown environment pen...
19  cards
2.1 Configuration management
Why configuration management is i...,
Why is documentation important in...,
What type of documentation is nee...
30  cards
2.2 Cloud & Virtualization
Cloud models what is infrastructu...,
Cloud models what are the benefit...,
Cloud models what is software as ...
21  cards
2.3 Application dev, deployment and automation
Secure deployment what is sandbxi...,
Secure deployment how to build an...,
Secure deployment once the applic...
23  cards
2.4 Authentication & authoriaztion
Authentication methods what is di...,
Authentication methods why direct...,
Authentication methods what are t...
25  cards
2.5 Cybersecurity resilience
Disk redundancy what is redundancy 1,
Disk redundancy what is geographi...,
Disk redundancy what is multipath...
29  cards
2.6 Security implications of embedded & specialized systems
Embedded system what is an embedd...,
Embedded system what is a soc and...,
Embedded system what is an fpga 3
20  cards
2.7 Physical security controls
Physical security controls what i...,
Physical security controls what a...,
Physical security controls why si...
19  cards
2.8 Encryption
Cryptography concepts what is cry...,
Cryptography concepts what is pla...,
Cryptography concepts what is cip...
68  cards
3.1 Implement secure protocols
What is srtp 1,
What is ntp ntpsec 2,
What is s mime 3
17  cards
3.2 Implement host & application security solutions
Endpoint protection what is an en...,
Endpoint protection how to protec...,
Endpoint protection what is the d...
50  cards
3.3 Implement secure network design
Load balancing what is load balan...,
Load balancing what is one of the...,
Load balancing how load balancer ...
79  cards
3.4 Install & configure wireless security settings
Wireless cryptography why wireles...,
Wireless cryptography how to secu...,
Wireless cryptography why wireles...
26  cards
3.5 Implement secure mobile solutions
Mobile device mgt what is mdm 1,
Mobile device mgt why mdm is impo...,
Mobile device mgt what is byod in...
27  cards
3.6 Apply cybersecurity solution to the cloud
Cloud security controls what is a...,
Cloud security controls what is h...,
Cloud security controls is iam sh...
23  cards
3.7 Implement identity & account management
Identity controls what is an idp 1,
Identity controls why is an idp c...,
Identity controls what are the st...
19  cards
3.8 Implement authentication and authorization solutions
Authentication management what is...,
Authentication management is pass...,
Authentication management what is...
32  cards
3.9 Implement public key infrastructure
Public key infrastructure what is...,
Public key infrastructure what is...,
Public key infrastructure what is...
27  cards
4.1 Tool to assess organizational security
Reconnaissance tools what is trac...,
Reconnaissance tools what are the...,
Reconnaissance tools what is the ...
39  cards
4.2 Importance of policies, processes and procedure in Incident response
Incident response process what ar...,
Incident response process what fr...,
Incident response process how a c...
13  cards
4.3 Incident, utilize appropriate data sources to support investigation
Vulnerability scan output what a ...,
Vulnerability scan output how to ...,
Siem dashboard what is a siem 3
18  cards
4.4 Incident, apply mitigation techniques or controls to secure an environment
Endpoint configuration what are t...,
Endpoint configuration why some a...,
Endpoint configuration why os are...
9  cards
4.5 Key aspects of digital forensics
Digital forensics what is digital...,
Digital forensics is there a feam...,
Digital forensics what are the 3 ...
8  cards
5.1 Compare & contrast various types of controls
Security controls what are the 3 ...,
Security controls what is manager...,
Security controls what is operati...
8  cards
5.2 Importance of regulations, standards, frameworks that impact security posture
Security regulation standards wha...,
Security regulation standards wha...,
Security regulation standards wha...
12  cards
5.3 Importance of policies to organizational security
Personnel security what is an aup 1,
Personnel security why an aup is ...,
Personnel security what is least ...
15  cards
5.4 Risk management processes and concepts
Risk management how to assess a r...,
Risk management how to manage the...,
Risk analysis how to evaluate a r...
15  cards
5.5 Privacy & sensitive data concepts in relation to security
Privacy data breaches what is the...,
Privacy data breaches what conseq...,
Privacy data breaches what is a p...
7  cards

More about
Security+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Zoubida Regzal's Security+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security +
  • 43 decks
  • 2139 flashcards
  • 59 learners
Decks: Fundamentals Of Security, Threat Actors, Physical Security, And more!
Security +
  • 26 decks
  • 1501 flashcards
  • 241 learners
Decks: Deck A, Deck B, Deck C, And more!
Make Flashcards