This class was created by Brainscape user Jonathan Russial. Visit their profile to learn more about the creator.

Decks in this class (20)

Chapter 1 - General Concepts
What are the three components of ...,
What does confidentiality protect...,
What are some examples of confide...
16  cards
Chapter 2 - Threat Landscape
What are the four characteristics...,
Unskilled attackers 2,
Hacktivist 3
18  cards
Chapter 3 - Malicious Code
Malware 1,
Ransomware 2,
Trojans 3
10  cards
Chapter 4 - Social Engineering and Password Attacks
Social engineering 1,
What are some of the most common ...,
Phishing 3
19  cards
Chapter 5 - Program Management and Oversight
Vulnerability management 1,
Vulnerability scanning 2,
Asset inventory 3
32  cards
Chapter 6 - Application Security
Software development life cycle s...,
What are the main steps of the so...,
What are the four most common typ...
34  cards
Chapter 7 - Cryptography and the PKI
Cryptography 1,
Cipher 2,
Substitution cipher 3
52  cards
Chapter 8 - Identity and Access Management
Identity 1,
What are some of the common ways ...,
Single sign on sso 3
34  cards
Chapter 9 - Resilience and Physical Security
Continuity of operations 1,
Geographic dispersion 2,
Load balancing 3
27  cards
Chapter 10 - Cloud and Virtualization Security
Cloud computing 1,
Multitenancy 2,
Scalability 3
39  cards
Chapter 11 - Endpoint Security
What are some of the most common ...,
Firmware 2,
End of life legacy hardware 3
41  cards
Chapter 12 - Network Security
Defense in depth 1,
Attack surface 2,
Security zone 3
61  cards
Chapter 13 - Wireless and Mobile Security
Cellular 1,
Bluetooth 2,
Radio frequency identification rf...
23  cards
Chapter 14 - Monitoring and Incident Response
Incident 1,
Event 2,
What are the six steps of the inc...
27  cards
Chapter 15 - Digital Forensics
Legal hold 1,
E discovery 2,
Order of volatility 3
13  cards
Chapter 16 - Security Governance and Compliance
Governance 1,
Board of directors 2,
Independent directors 3
43  cards
Chapter 17 - Risk Management and Privacy
Enterprise risk management erm 1,
Threats 2,
Vulnerabilities 3
34  cards
Important Terms/Topics
Data subjects 1,
Data controllers 2,
Data custodians 3
31  cards
Dion Review
Isolation 1,
Data controller 2,
Exposure factor 3
67  cards
Dion Review 2
Which service port on email serve...,
Kisha a security official is impl...,
What are some data categories tha...
29  cards

More about
Security+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Jonathan Russial's Security+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security +
  • 43 decks
  • 2139 flashcards
  • 62 learners
Decks: Fundamentals Of Security, Threat Actors, Physical Security, And more!
Security +
  • 26 decks
  • 1501 flashcards
  • 242 learners
Decks: Deck A, Deck B, Deck C, And more!
Make Flashcards