This class was created by Brainscape user Nick Barber. Visit their profile to learn more about the creator.

Decks in this class (74)

Secure Protocols
No deck description has yet been added by the author.
24  cards
Symmetric vs Asymmetric
No deck description has yet been added by the author.
12  cards
Encryption and stenography
No deck description has yet been added by the author.
9  cards
PKI concepts
No deck description has yet been added by the author.
15  cards
Keys
No deck description has yet been added by the author.
10  cards
IPsec
No deck description has yet been added by the author.
6  cards
Authentication and Authorization
No deck description has yet been added by the author.
11  cards
Authentication methods
No deck description has yet been added by the author.
8  cards
Biometrics
No deck description has yet been added by the author.
5  cards
Pap and CHAP
No deck description has yet been added by the author.
4  cards
EAP and 802.1x
No deck description has yet been added by the author.
9  cards
Radius and Tacacs
No deck description has yet been added by the author.
5  cards
Keberos
No deck description has yet been added by the author.
10  cards
Account Management-Account Types
No deck description has yet been added by the author.
5  cards
Password Policies
No deck description has yet been added by the author.
2  cards
Account polices
No deck description has yet been added by the author.
4  cards
Application Security
No deck description has yet been added by the author.
13  cards
Physical security
No deck description has yet been added by the author.
7  cards
Wireless Security
No deck description has yet been added by the author.
13  cards
Secure Data destruction
No deck description has yet been added by the author.
14  cards
Hardening
No deck description has yet been added by the author.
7  cards
Mobile Device managment
No deck description has yet been added by the author.
8  cards
Mobile Device management and enforcement
No deck description has yet been added by the author.
14  cards
Network segmentation
No deck description has yet been added by the author.
6  cards
VPNs
No deck description has yet been added by the author.
10  cards
Proxies
No deck description has yet been added by the author.
7  cards
Port security
No deck description has yet been added by the author.
6  cards
Firewalls
No deck description has yet been added by the author.
5  cards
Virtualization
No deck description has yet been added by the author.
8  cards
Cloud concepts
No deck description has yet been added by the author.
9  cards
Cloud services
No deck description has yet been added by the author.
4  cards
Cloud Models
No deck description has yet been added by the author.
5  cards
Computing Types
No deck description has yet been added by the author.
6  cards
Cloud security
No deck description has yet been added by the author.
2  cards
Hardware redundancy
No deck description has yet been added by the author.
8  cards
Site redundancy
No deck description has yet been added by the author.
3  cards
Non-persistance concepts
No deck description has yet been added by the author.
3  cards
Backup and Restore
No deck description has yet been added by the author.
6  cards
Network recon
No deck description has yet been added by the author.
13  cards
Vulnerability scans
No deck description has yet been added by the author.
8  cards
SIEM and SOAR systems
No deck description has yet been added by the author.
5  cards
Penetration testing
No deck description has yet been added by the author.
8  cards
Penetesting exercise types
No deck description has yet been added by the author.
6  cards
Digital Forensics
No deck description has yet been added by the author.
6  cards
Investigative data sources
No deck description has yet been added by the author.
1  cards
Incident response process
No deck description has yet been added by the author.
7  cards
Incident response plans
No deck description has yet been added by the author.
4  cards
Attack frameworks
No deck description has yet been added by the author.
4  cards
Security Controls
No deck description has yet been added by the author.
3  cards
Regulations, Standards, and frameworks
No deck description has yet been added by the author.
11  cards
GDPR
No deck description has yet been added by the author.
9  cards
Personal in OSP
No deck description has yet been added by the author.
3  cards
OSP- 3rd party risk
No deck description has yet been added by the author.
5  cards
data policies
No deck description has yet been added by the author.
3  cards
OSP- other areas
No deck description has yet been added by the author.
3  cards
Risk managment concepts
No deck description has yet been added by the author.
5  cards
Risk Management - Types and strategies
No deck description has yet been added by the author.
3  cards
Risk Analysis
No deck description has yet been added by the author.
5  cards
business impact analysis
No deck description has yet been added by the author.
14  cards
Privacy and Data Sensitivity Breach and Data types
No deck description has yet been added by the author.
7  cards
Privacy enhancing technologies
No deck description has yet been added by the author.
13  cards
Privacy data roles and responsibility
No deck description has yet been added by the author.
12  cards
Privacy and data sensitivity - other areas
No deck description has yet been added by the author.
4  cards
Social engineering
No deck description has yet been added by the author.
17  cards
malware
No deck description has yet been added by the author.
45  cards
Network attack - Layer 2 attack
No deck description has yet been added by the author.
5  cards
DoS and DDoS attacks
No deck description has yet been added by the author.
7  cards
MiTM and MiTB attacks
No deck description has yet been added by the author.
2  cards
Wireless attacks
No deck description has yet been added by the author.
11  cards
OSINT
No deck description has yet been added by the author.
3  cards
THreat actors and vectors
No deck description has yet been added by the author.
10  cards
cryptography
No deck description has yet been added by the author.
7  cards
encryption and stenography
No deck description has yet been added by the author.
5  cards
Hashing
No deck description has yet been added by the author.
9  cards

More about
security+ exam

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Nick Barber's Security+ exam flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Security+ Exam
  • 3 decks
  • 573 flashcards
  • 4 learners
Decks: Acronyms, Security Terminology, Practice Questions, And more!
Security+ SY0-601
  • 37 decks
  • 832 flashcards
  • 372 learners
Decks: 10 Acronyms, 11 Social Engineering Techniques, 12 Malware Types, And more!
2023 Lieutenants Exam
  • 32 decks
  • 4552 flashcards
  • 23 learners
Decks: 2019 Emergency Medical Services, Respiratory Protection Program, Command Officer Operations, And more!
Make Flashcards