This class was created by Brainscape user L PUA. Visit their profile to learn more about the creator.

Decks in this class (134)

Glossary of Terms Page 1
No deck description has yet been added by the author.
14  cards
Glossary of Terms Page 2
No deck description has yet been added by the author.
14  cards
Glossary of Terms Page 3
No deck description has yet been added by the author.
13  cards
Glossary of Terms Page 4
No deck description has yet been added by the author.
9  cards
Glossary of Terms Page 5
No deck description has yet been added by the author.
12  cards
Injection Attacks
No deck description has yet been added by the author.
6  cards
Buffer Overflows
No deck description has yet been added by the author.
2  cards
Replay Attack
No deck description has yet been added by the author.
6  cards
Phishing
No deck description has yet been added by the author.
11  cards
Impersonation
No deck description has yet been added by the author.
4  cards
Dumpster Diving
No deck description has yet been added by the author.
3  cards
Shoulder Surfing
No deck description has yet been added by the author.
1  cards
Hoaxes
No deck description has yet been added by the author.
1  cards
Watering Hole Attacks
No deck description has yet been added by the author.
1  cards
Spam
No deck description has yet been added by the author.
6  cards
Influence Campaigns
No deck description has yet been added by the author.
3  cards
Other Social Engineering Attacks
No deck description has yet been added by the author.
4  cards
Principles of Social Engineering
No deck description has yet been added by the author.
1  cards
Malware
No deck description has yet been added by the author.
4  cards
Viruses
No deck description has yet been added by the author.
8  cards
Ransomware
No deck description has yet been added by the author.
4  cards
Trojans and RATs
No deck description has yet been added by the author.
4  cards
Rootkits
No deck description has yet been added by the author.
4  cards
Adware
No deck description has yet been added by the author.
3  cards
Penetration Testing 1.4
No deck description has yet been added by the author.
12  cards
Reconnaissance
No deck description has yet been added by the author.
5  cards
Security Teams
No deck description has yet been added by the author.
5  cards
Configuration Management
No deck description has yet been added by the author.
6  cards
Protecting Data
No deck description has yet been added by the author.
10  cards
Data Loss Prevention 2.1
No deck description has yet been added by the author.
4  cards
Managing Security
No deck description has yet been added by the author.
8  cards
Vulnerability Types 1.6
No deck description has yet been added by the author.
17  cards
Firewalls 2.1
No deck description has yet been added by the author.
6  cards
VPN Concentrators 2.1
No deck description has yet been added by the author.
12  cards
Network Intrusion Detection and Prevention 2.1
No deck description has yet been added by the author.
6  cards
Router and Switch Security 2.1
No deck description has yet been added by the author.
9  cards
Proxies 2.1
No deck description has yet been added by the author.
5  cards
Load Balancers 2.1
No deck description has yet been added by the author.
4  cards
Wireless Access Points (WAP) 2.1
No deck description has yet been added by the author.
10  cards
SIEM 2.1
No deck description has yet been added by the author.
6  cards
Network Access Control 2.1
No deck description has yet been added by the author.
7  cards
Mail Gateways 2.1
No deck description has yet been added by the author.
4  cards
Other Security Devices 2.1
No deck description has yet been added by the author.
5  cards
Software Security Tools 2.2
No deck description has yet been added by the author.
14  cards
Command Line Security Tools 2.2
No deck description has yet been added by the author.
11  cards
Common Security Issues 2.3
No deck description has yet been added by the author.
13  cards
Analyzing Security Output 2.4
No deck description has yet been added by the author.
12  cards
Mobile Device Connection Methods 2.5
No deck description has yet been added by the author.
7  cards
Mobile Device Management 2.5
No deck description has yet been added by the author.
11  cards
Mobile Device Enforcement 2.5
No deck description has yet been added by the author.
13  cards
Mobile Device Deployment Models 2.5
No deck description has yet been added by the author.
5  cards
Secure Protocols 2.6
No deck description has yet been added by the author.
13  cards
Compliance and Frameworks 3.1
No deck description has yet been added by the author.
7  cards
Secure Configuration Guides 3.1
No deck description has yet been added by the author.
6  cards
Defense-in-Depth 3.1
No deck description has yet been added by the author.
4  cards
Secure Network Topologies 3.2
No deck description has yet been added by the author.
8  cards
Network Segmentation 3.2
No deck description has yet been added by the author.
5  cards
VPN Technologies 3.2
No deck description has yet been added by the author.
3  cards
Security Technology Placement 3.2
No deck description has yet been added by the author.
7  cards
Securing SDN 3.2
No deck description has yet been added by the author.
2  cards
Hardware Security 3.3
No deck description has yet been added by the author.
8  cards
Operating System Security 3.3
No deck description has yet been added by the author.
10  cards
Secure Deployments 3.4
No deck description has yet been added by the author.
3  cards
Embedded Systems 3.5
No deck description has yet been added by the author.
7  cards
Development Life-Cycle Models 3.6
No deck description has yet been added by the author.
3  cards
Secure DevOps 3.6
No deck description has yet been added by the author.
5  cards
Version Control and Change Management 3.6
No deck description has yet been added by the author.
4  cards
Provisioning and Deprovisioning 3.6
No deck description has yet been added by the author.
3  cards
Secure Coding Techniques 3.6
No deck description has yet been added by the author.
12  cards
Code Quality and Testing 3.6
No deck description has yet been added by the author.
7  cards
Virtualization 3.7
No deck description has yet been added by the author.
3  cards
Virtualization Security 3.7
No deck description has yet been added by the author.
2  cards
Cloud Deployment Models 3.7
No deck description has yet been added by the author.
4  cards
Security in the Cloud 3.7
No deck description has yet been added by the author.
5  cards
Resiliency and Automation 3.8
No deck description has yet been added by the author.
5  cards
Redundancy, Fault Tolerance, and High Availability 3.8
No deck description has yet been added by the author.
12  cards
Physical Security Controls 3.9 Part 1
No deck description has yet been added by the author.
10  cards
Physical Security Controls 3.9 Part 2
No deck description has yet been added by the author.
13  cards
AAA and Authentication 4.1
No deck description has yet been added by the author.
10  cards
Identity and Access Service 4.2
No deck description has yet been added by the author.
8  cards
PAP, CHAP, MS-CHAP 4.2
No deck description has yet been added by the author.
4  cards
Federated Identities 4.2
No deck description has yet been added by the author.
5  cards
Access Control Models 4.3
No deck description has yet been added by the author.
8  cards
Access Control Technologies 4.3
No deck description has yet been added by the author.
8  cards
Account Types 4.4
No deck description has yet been added by the author.
4  cards
Account Management 4.4
No deck description has yet been added by the author.
9  cards
Account Policy Enforcement 4.4
No deck description has yet been added by the author.
6  cards
Agreement Types 5.1
No deck description has yet been added by the author.
7  cards
Personnel Management 5.1
No deck description has yet been added by the author.
9  cards
Role Based Awareness Training 5.1
No deck description has yet been added by the author.
7  cards
General Security Policies 5.1
No deck description has yet been added by the author.
2  cards
Business Impact Analysis 5.2
No deck description has yet been added by the author.
12  cards
Risk Assessment 5.3
No deck description has yet been added by the author.
8  cards
Incident Response Planning 5.4
No deck description has yet been added by the author.
5  cards
Incident Response Process 5.4
No deck description has yet been added by the author.
10  cards
Gathering Forensic Data 5.5
No deck description has yet been added by the author.
11  cards
Using Forensics Data 5.5
No deck description has yet been added by the author.
3  cards
Disaster Recovery Sites 5.6
No deck description has yet been added by the author.
3  cards
Application Recovery 5.6
No deck description has yet been added by the author.
6  cards
Geographic Considerations 5.6
No deck description has yet been added by the author.
4  cards
Continuity of Operations 5.6
No deck description has yet been added by the author.
5  cards
Security Controls 5.7
No deck description has yet been added by the author.
5  cards
Data Destruction 5.8
No deck description has yet been added by the author.
5  cards
Handling Sensitive Data 5.8
No deck description has yet been added by the author.
3  cards
Data Roles and Retention 5.8
No deck description has yet been added by the author.
5  cards
Cryptography Concepts 6.1
No deck description has yet been added by the author.
8  cards
Symmetric and Asymmetric Encryption 6.1
No deck description has yet been added by the author.
4  cards
Hashing and Digital Signatures 6.1
No deck description has yet been added by the author.
4  cards
Randomizing Cryptography 6.1
No deck description has yet been added by the author.
3  cards
Weak Encryption 6.1
No deck description has yet been added by the author.
4  cards
Cryptographic Keys 6.1
No deck description has yet been added by the author.
4  cards
Steganography 6.1
No deck description has yet been added by the author.
3  cards
Stream and Block Ciphers 6.1
No deck description has yet been added by the author.
2  cards
States of Data 6.1
No deck description has yet been added by the author.
3  cards
Perfect Forward Secrecy 6.1
No deck description has yet been added by the author.
2  cards
Common Cryptography Use Cases 6.1
No deck description has yet been added by the author.
3  cards
Symmetric Algorithms 6.2
No deck description has yet been added by the author.
7  cards
Block Cipher Modes 6.2
No deck description has yet been added by the author.
7  cards
Asymmetric Algorithms 6.2
No deck description has yet been added by the author.
7  cards
Hashing Algorithms 6.2
No deck description has yet been added by the author.
4  cards
Key Stretching Algorithms 6.2
No deck description has yet been added by the author.
2  cards
Obfuscation 6.2
No deck description has yet been added by the author.
5  cards
Wireless Cryptographic Protocols 6.3
No deck description has yet been added by the author.
6  cards
Wireless Security 6.3
No deck description has yet been added by the author.
4  cards
PKI Components 6.4
No deck description has yet been added by the author.
10  cards
PKI Concepts 6.4
No deck description has yet been added by the author.
7  cards
Types of Certificates 6.4
No deck description has yet been added by the author.
8  cards
Certificate File Formats 6.4
No deck description has yet been added by the author.
7  cards
Ports & Protocols
No deck description has yet been added by the author.
26  cards
Important Acronyms Ch 6 Network Components
No deck description has yet been added by the author.
21  cards
Important Acronyms Chapter 7
No deck description has yet been added by the author.
13  cards
Chapter 16 Resiliency and Automation Strategies
No deck description has yet been added by the author.
7  cards
CompTia Ports
No deck description has yet been added by the author.
19  cards
Exam Premium Practice Test A Review Cards
No deck description has yet been added by the author.
5  cards

More about
comptia security+ sy0-501

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study L PUA's CompTIA Security+ SY0-501 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

COMPTIA SY0-501 Security+
  • 12 decks
  • 218 flashcards
  • 7 learners
Decks: Tcp Ports, Udp Ports, Wi Fi Specifications, And more!
Cyber Security - CompTIA 501
  • 10 decks
  • 440 flashcards
  • 16 learners
Decks: Ch1 Risk Management, Ch2 Cryptography, Ch3 Identity And Access Management, And more!
CompTIA Sec+ SY0-501
  • 9 decks
  • 931 flashcards
  • 7 learners
Decks: Chapter 1 Security Basics, Chapter 2 Understanding Identity Access, Threats Attacks Vulnerabilities, And more!
Make Flashcards