This class was created by Brainscape user GiGi C.. Visit their profile to learn more about the creator.

Decks in this class (38)

1.1 social engineering techniques
No deck description has yet been added by the author.
4  cards
1.2 analyze potential indicators to determine the type of attack
No deck description has yet been added by the author.
7  cards
1.3 potential indicators associated with application attacks
No deck description has yet been added by the author.
19  cards
1.4 potential indicators associated with network attacks.
No deck description has yet been added by the author.
10  cards
1.5 different threat actors, vectors, and intelligence sources
No deck description has yet been added by the author.
9  cards
1.6 security concerns associated with various types of vulnerabilities
No deck description has yet been added by the author.
1  cards
1.7 techniques used in security assessments
No deck description has yet been added by the author.
5  cards
1.8 techniques used in penetration testing
No deck description has yet been added by the author.
7  cards
2.1 security concepts in an enterprise environment
No deck description has yet been added by the author.
5  cards
2.2 virtualization and cloud computing concepts
No deck description has yet been added by the author.
9  cards
2.3 secure application development, deployment, and automation concepts
No deck description has yet been added by the author.
7  cards
2.4 authentication and authorization design concepts
No deck description has yet been added by the author.
6  cards
2.5 implement cybersecurity resilience
No deck description has yet been added by the author.
10  cards
2.6 embedded and specialized systems
No deck description has yet been added by the author.
7  cards
2.7 physical security controls
No deck description has yet been added by the author.
3  cards
2.8 cryptographic concepts
No deck description has yet been added by the author.
23  cards
2.8 Algorithms, Protocols, Encryptions
No deck description has yet been added by the author.
21  cards
2.8 Block Cipher Modes
No deck description has yet been added by the author.
4  cards
3.1 secure protocols PORTS
No deck description has yet been added by the author.
19  cards
3.2 host or application security solutions
No deck description has yet been added by the author.
16  cards
3.3 secure network designs
No deck description has yet been added by the author.
22  cards
3.4 install and configure wireless security settings
No deck description has yet been added by the author.
9  cards
3.5 secure mobile solutions
No deck description has yet been added by the author.
6  cards
3.6 cybersecurity solutions to the cloud
No deck description has yet been added by the author.
7  cards
3.7 identity and account management controls.
No deck description has yet been added by the author.
2  cards
3.8 implement authentication and authorization solutions
No deck description has yet been added by the author.
14  cards
3.9 public key infrastructure
No deck description has yet been added by the author.
17  cards
4.1 Organizational Security
No deck description has yet been added by the author.
25  cards
4.2 policies, processes, and procedures for incident response
No deck description has yet been added by the author.
5  cards
4.3 data sources to support an investigation
No deck description has yet been added by the author.
7  cards
4.4 apply mitigation techniques or controls to secure an environment
No deck description has yet been added by the author.
5  cards
4.5 key aspects of digital forensics
No deck description has yet been added by the author.
7  cards
5.1 types of controls
No deck description has yet been added by the author.
9  cards
5.2 applicable regulations, standards, or frameworks that impact organizational security posture.
No deck description has yet been added by the author.
12  cards
5.3 policies to organizational security
No deck description has yet been added by the author.
7  cards
5.4 Risk Analysis
No deck description has yet been added by the author.
10  cards
5.5 privacy and sensitive data concepts in relation to security
No deck description has yet been added by the author.
5  cards
Test Study
No deck description has yet been added by the author.
26  cards

More about
sec+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study GiGi C.'s Sec+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Sciences Sec.3 (Martin Roy)
  • 12 decks
  • 612 flashcards
  • 138 learners
Decks: Chapitre 5 La Distribution Des Nutriment, Chapitre 4 La Chimie De La Digestion, Chapitre 3 Des Atomes Aux Aliments, And more!
Science Sec 4
  • 14 decks
  • 419 flashcards
  • 34 learners
Decks: Quiz 1, Quiz 2, Quiz 3, And more!
Human Physiology - PNUR1143 -22S - Sec 1
  • 26 decks
  • 3535 flashcards
  • 28 learners
Decks: Cells, Tissues And Membranes, Integumentary System, And more!
Info Sec
  • 13 decks
  • 491 flashcards
  • 141 learners
Decks: 1 What Is Info Sec, 2 Identification And Authentication, 3 Authorization And Access Control, And more!
Make Flashcards