This class was created by Brainscape user Russell Davis. Visit their profile to learn more about the creator.

Decks in this class (35)

Social Engineering
No deck description has yet been added by the author.
33  cards
Determine type of attack via indicators
No deck description has yet been added by the author.
37  cards
Application Attacks
No deck description has yet been added by the author.
28  cards
Networks Attacks
No deck description has yet been added by the author.
30  cards
Explain different threat actors, vectors, and intelligence sources
No deck description has yet been added by the author.
48  cards
Security concerns related to vulnerabilities
No deck description has yet been added by the author.
30  cards
Techniques employed in security Assessments
No deck description has yet been added by the author.
26  cards
Penetration testing techniques
No deck description has yet been added by the author.
22  cards
Security concepts in enterprise environment
No deck description has yet been added by the author.
30  cards
Virtualization and Cloud Computing concepts
No deck description has yet been added by the author.
26  cards
secure application development, deployment, and automation concepts
No deck description has yet been added by the author.
31  cards
Summarize authentication and authorization design concepts
No deck description has yet been added by the author.
31  cards
Given a scenario, implement cybersecurity resilience
No deck description has yet been added by the author.
37  cards
Explain the security implications of embedded and specialized systems
No deck description has yet been added by the author.
44  cards
Explain the importance of physical security controls
No deck description has yet been added by the author.
50  cards
Summarize the basics of cryptographic concepts
No deck description has yet been added by the author.
49  cards
Given a scenario, implement secure protocols
No deck description has yet been added by the author.
25  cards
Given a scenario, implement host or application security solutions
No deck description has yet been added by the author.
42  cards
Given a scenario, implement secure network designs
No deck description has yet been added by the author.
64  cards
Given a scenario, install and configure wireless security settings
No deck description has yet been added by the author.
24  cards
Given a scenario, implement secure mobile solutions
No deck description has yet been added by the author.
53  cards
Given a scenario, apply cybersecurity solutions to the cloud
No deck description has yet been added by the author.
30  cards
Given a scenario, implement identity and account management controls
No deck description has yet been added by the author.
28  cards
Given a scenario, implement authentication and authorization solutions
No deck description has yet been added by the author.
27  cards
Given a scenario, implement public key infrastructure
No deck description has yet been added by the author.
37  cards
Given a scenario, use the appropriate tool to assess organizational security
No deck description has yet been added by the author.
44  cards
Summarize the importance of policies, processes, and procedures for incident response
No deck description has yet been added by the author.
23  cards
Given an incident, utilize appropriate data sources to support an investigation
No deck description has yet been added by the author.
32  cards
Given an incident, apply mitigation techniques or controls to secure an environment
No deck description has yet been added by the author.
16  cards
Explain the key aspects of digital forensics
No deck description has yet been added by the author.
37  cards
Compare and contrast various types of controls
No deck description has yet been added by the author.
11  cards
Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture
No deck description has yet been added by the author.
18  cards
Explain the importance of policies to organizational security
No deck description has yet been added by the author.
46  cards
Explain privacy and sensitive data concepts in relation to security
No deck description has yet been added by the author.
37  cards
Summarize risk management processes and concepts
No deck description has yet been added by the author.
48  cards

More about
comptia

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Russell Davis's Comptia flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTia
  • 16 decks
  • 1014 flashcards
  • 138 learners
Decks: Acronym, Ch2, Ch3, And more!
CompTIA A+
  • 36 decks
  • 1910 flashcards
  • 3 learners
Decks: Mike Meyers Total A Certification 220 10, Jason Dion Comptia A 1001 Exam Prep 1, Jason Dion Comptia A 1001 Exam Prep 2, And more!
CompTIA Linux+
  • 20 decks
  • 752 flashcards
  • 752 learners
Decks: 01 Introduction, 11 The Shell, 12 Help, And more!
CompTIA Network+ (N10-008)
  • 27 decks
  • 788 flashcards
  • 2461 learners
Decks: Networks Basic Concepts, Osi Model, Tcp Ip Model, And more!
Make Flashcards