Decks in this Class (45):
-
10 Threats Attacks And Vulnerabilities 2
1.0 Threats, Attacks and Vulnerabilities (21%)
0 CardsPreview Flashcards -
11 Given A Scenario Analyze Indicators O
1.1 Given a scenario, analyze indicators of compromise and determine the type of malware.
Sample Cards:virus,crypto malware,ransomware13 CardsPreview Flashcards -
12 Compare And Contrast Types Of Attacks
1.2 Compare and contrast types of attacks.
Sample Cards:social engineering phishing,social engineering spear phishing,social engineering whaling61 CardsPreview Flashcards -
13 Explain Threat Actor Types And Attrib
1.3 Explain threat actor types and attributes.
Sample Cards:types of actors script kiddies,types of actors hacktivist,types of actors organized crime11 CardsPreview Flashcards -
14 Explain Penetration Testing Concepts
1.4 Explain penetration testing concepts.
Sample Cards:active reconnaissance,passive reconnaissance,pivot10 CardsPreview Flashcards -
15 Explain Vulnerability Scanning Concep
1.5 Explain vulnerability scanning concepts.
Sample Cards:passively test security controls,identify vulnerability,identify lack of security controls7 CardsPreview Flashcards -
16 Explain The Impact Associated With Ty
1.6 Explain the impact associated with types of vulnerabilities.
Sample Cards:race conditions,vulnerabilities due to end of life syste,vulnerabilities due to embedded systems22 CardsPreview Flashcards -
20 Technologies And Tools 22
2.0 Technologies and Tools (22%)
0 CardsPreview Flashcards -
21 Install And Configure Network Compone
2.1 Install and configure network components, both hardware and software-based, to support organizational security.
Sample Cards:firewall acl,firewall application based vs network ba,firewall stateful vs stateless76 CardsPreview Flashcards -
22 Given A Scenario Use Appropriate Soft
2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization.
Sample Cards:protocol analyzer,network scanners,network scanners rogue system detection25 CardsPreview Flashcards -
23 Given A Scenario Troubleshoot Common
2.3 Given a scenario, troubleshoot common security issues.
Sample Cards:unencrypted credentials clear text,logs and events anomalies,permission issues22 CardsPreview Flashcards -
24 Given A Scenario Analyze And Interpre
2.4 Given a scenario, analyze and interpret output from security technologies.
Sample Cards:hids hips,antivirus,file integrity check12 CardsPreview Flashcards -
25 Given A Scenario Deploy Mobile Device
2.5 Given a scenario, deploy mobile devices securely.
Sample Cards:connection methods,connection methods cellular,connection methods wifi45 CardsPreview Flashcards -
26 Given A Scenario Implement Secure Pro
2.6 Given a scenario, implement secure protocols
Sample Cards:protocols,protocols dnssec,protocols ssh22 CardsPreview Flashcards -
30 Architecture And Design 15
3.0 Architecture and Design (15%)
0 CardsPreview Flashcards -
31 Explain Use Cases And Purpose For Fra
3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides.
Sample Cards:industry standard frameworks and referen,industry standard frameworks and referen,industry standard frameworks and referen18 CardsPreview Flashcards -
32 Given A Scenario Implement Secure Net
3.2 Given a scenario, implement secure network architecture concepts.
Sample Cards:zones topologies,zones topologies dmz,zones topologies extranet31 CardsPreview Flashcards -
33 Given A Scenario Implement Secure Sys
3.3 Given a scenario, implement secure systems design.
Sample Cards:hardware firmware security,hardware firmware security fde sed,hardware firmware security tpm31 CardsPreview Flashcards -
34 Explain The Importance Of Secure Stag
3.4 Explain the importance of secure staging deployment concepts.
Sample Cards:sandboxing,environment,environment development8 CardsPreview Flashcards -
35 Explain The Security Implications Of
3.5 Explain the security implications of embedded systems.
Sample Cards:scada ics,smart devices iot,smart devices iot wearable technology10 CardsPreview Flashcards -
36 Summarize Secure Application Developm
3.6 Summarize secure application development and deployment concepts.
Sample Cards:development life cycle models,development life cycle models waterfall,secure devops30 CardsPreview Flashcards -
37 Summarize Cloud And Virtualization Co
3.7 Summarize cloud and virtualization concepts.
Sample Cards:hypervisor,hypervisor type i,hypervisor type ii19 CardsPreview Flashcards -
38 Explain How Resiliency And Automation
3.8 Explain how resiliency and automation strategies reduce risk.
Sample Cards:automation scripting,automation scripting automated courses o,automation scripting continuous monitori21 CardsPreview Flashcards -
39 Explain The Importance Of Physical Se
3.9 Explain the importance of physical security controls.
Sample Cards:lighting,signs,fencing gate cage27 CardsPreview Flashcards -
40 Identity And Access Management 16
4.0 Identity and Access Management (16%)
0 CardsPreview Flashcards -
41 Compare And Contrast Identity And Acc
4.1 Compare and contrast identity and access management concepts
Sample Cards:identification authentication authorizat,multifactor authentication authenticatio,multifactor authentication something you10 CardsPreview Flashcards -
42 Given A Scenario Install And Configur
4.2 Given a scenario, install and configure identity and access services.
Sample Cards:ldap,kerberos,tacacs13 CardsPreview Flashcards -
43 Given A Scenario Implement Identity A
4.3 Given a scenario, implement identity and access management controls.
Sample Cards:access control models,access control models mac,access control models dac29 CardsPreview Flashcards -
44 Given A Scenario Differentiate Common
4.4 Given a scenario, differentiate common account management practices.
Sample Cards:account types,account types user account,account types shared and genetic account28 CardsPreview Flashcards -
50 Risk Management 14
5.0 Risk Management (14%)
0 CardsPreview Flashcards -
51 Explain The Importance Of Policies Pl
5.1 Explain the importance of policies, plans and procedures related to organizational security.
Sample Cards:standard operating procedure sop aka pro,agreement types,agreement types bpa28 CardsPreview Flashcards -
52 Summarize Business Impact Analysis Co
5.2 Summarize business impact analysis concepts.
Sample Cards:rto rpo,mtbf,mttr bonus mttf14 CardsPreview Flashcards -
53 Explain Risk Management Processes And
5.3 Explain risk management processes and concepts.
Sample Cards:threat assessment,threat assessment environmental,threat assessment manmade25 CardsPreview Flashcards -
54 Given A Scenario Follow Incident Resp
5.4 Given a scenario, follow incident response procedures.
Sample Cards:incident response plan,incident response plan documented incide,incident response plan roles and respons13 CardsPreview Flashcards -
55 Summarize Basic Concepts Of Forensics
5.5 Summarize basic concepts of forensics
Sample Cards:order of volatility,chain of custody,legal hold16 CardsPreview Flashcards -
56 Explain Disaster Recovery And Continu
5.6 Explain disaster recovery and continuity of operations concepts.
Sample Cards:recovery sites,recovery sites hot site,recovery sites warm site23 CardsPreview Flashcards -
57 Compare And Contrast Various Types Of
5.7 Compare and contrast various types of controls
Sample Cards:deterrent a class of controls,preventive a class of controls,detective a class of controls9 CardsPreview Flashcards -
58 Given A Scenario Carry Out Data Secur
5.8 Given a scenario, carry out data security and privacy practices
Sample Cards:data destruction and media sanitization,data destruction and media sanitization,data destruction and media sanitization21 CardsPreview Flashcards -
60 Cryptography And Pki 12
6.0 Cryptography and PKI (12%)
0 CardsPreview Flashcards -
61 Compare And Contrast Basic Concepts O
6.1 Compare and contrast basic concepts of cryptography.
Sample Cards:symmetric algorithms,modes of operation,asymmetric algorithms39 CardsPreview Flashcards -
62 Explain Cryptography Algorithms And T
6.2 Explain cryptography algorithms and their basic characteristics
Sample Cards:symmetric algorithms,symmetric algorithms aes,symmetric algorithms des33 CardsPreview Flashcards -
63 Given A Scenario Install And Configur
6.3 Given a scenario, install and configure wireless security settings
Sample Cards:cryptographic protocols,cryptographic protocols wpa,cryptographic protocols wpa217 CardsPreview Flashcards -
64 Given A Scenario Implement Public Key
6.4 Given a scenario, implement public key infrastructure.
Sample Cards:components,components ca certificate authority,components intermediate ca subordinate c43 CardsPreview Flashcards -
Comptia Security Acronyms
CompTIA Security+ Acronyms
0 CardsPreview Flashcards -
Security Proposed Hardware And Software
Security+ Proposed Hardware and Software List
Sample Cards:equipment,spare parts hardware,hardware tools5 CardsPreview Flashcards
Current Learners (3)
Popular Related Classes Brainscape Certified - ( See All )
Comptia Security + SY0-501
11 Decks -
160 Cards -
5 Learners
Decks: Networking, Securing Systems, Policies Plans And Procedures, And more!
CompTIA Security+ SY0-501
117 Decks -
739 Cards -
3 Learners
Decks: Glossary Of Terms Page 1, Glossary Of Terms Page 2, Glossary Of Terms Page 3, And more!
My Security+ SY0-501 Acronyms
3 Decks -
572 Cards -
65 Learners
Decks: Security Syo 501 Acronyms, Security Syo 501 Quiz, Book 1, And more!