This class was created by Brainscape user Scott Byrams. Visit their profile to learn more about the creator.

Decks in this class (35)

1.1 Compare and contrast different types of social engineering tecchniques
No deck description has yet been added by the author.
33  cards
1.2 Analyze potential indicators to determine the type of attack
No deck description has yet been added by the author.
35  cards
1.3 Analyze potential indicators associated with application attacks
No deck description has yet been added by the author.
41  cards
1.4 Analyze potential indicators associated with network attacks
No deck description has yet been added by the author.
42  cards
1.5 Explain different threat actor, vectors and intelligence sources
No deck description has yet been added by the author.
20  cards
1.6 Explain the security concerns associated with various types of vulnerabilities
No deck description has yet been added by the author.
6  cards
1.7 Summarize the techniques used in security assessments
No deck description has yet been added by the author.
16  cards
1.8 Explain the techniques used in penetrating testing
No deck description has yet been added by the author.
19  cards
2.1 Explain the Importance of security concepts in an enterprise environment
No deck description has yet been added by the author.
17  cards
2.2 Summarize virtualization and cloud computing concepts
No deck description has yet been added by the author.
24  cards
2.3 Summarize secure application development, deployment, and automation conpcepts.
No deck description has yet been added by the author.
36  cards
2.4 Summarize authentication and authorization design concepts.
No deck description has yet been added by the author.
27  cards
2.5 Given a scenario, implement cybersecurity resilience.
No deck description has yet been added by the author.
21  cards
2.6 Explain the security implications of embedded and specialized systems. (Page 10).
No deck description has yet been added by the author.
43  cards
2.7 Explain the importance of physical security controls.
No deck description has yet been added by the author.
50  cards
2.8 Summarize the basics of cryptographic concepts.
No deck description has yet been added by the author.
54  cards
3.1 Implement secure protocols
No deck description has yet been added by the author.
20  cards
3.2 Implement host or application security solutions
No deck description has yet been added by the author.
33  cards
3.3 Implement secure network design
No deck description has yet been added by the author.
9  cards
3.4 Install and configure wireless security settings
No deck description has yet been added by the author.
0  cards
3.5 Implement secure mobile solutions
No deck description has yet been added by the author.
0  cards
3.6 Apply cybersecurity solutions to the cloud
No deck description has yet been added by the author.
0  cards
3.7 Implement identity an account management controls
No deck description has yet been added by the author.
0  cards
3.8 Implement authentication and authorization solutions.
No deck description has yet been added by the author.
0  cards
3.9 Implement public key infrastructure
No deck description has yet been added by the author.
0  cards
4.1 Use the appropriate tool to assess organizational security
No deck description has yet been added by the author.
0  cards
4.2 The importance of policies, processes, and procedures for incident response.
No deck description has yet been added by the author.
0  cards
4.3. Utilize appropriate data sources to support an investigation. (Incident)
No deck description has yet been added by the author.
0  cards
4.4 Apply mitigation techniques or controls to secure an environment.
No deck description has yet been added by the author.
0  cards
4.5 Explain the key aspects of digital forensics.
No deck description has yet been added by the author.
0  cards
5.1 Compare and contrast various types of controls.
No deck description has yet been added by the author.
0  cards
5.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security.
No deck description has yet been added by the author.
0  cards
5.3 Explain the importance of policies to organizational security..
No deck description has yet been added by the author.
0  cards
5.4 Summarize risk management processes and concepts.
No deck description has yet been added by the author.
0  cards
5.5 Explain privacy and sensitive data concepts in relation to security..
No deck description has yet been added by the author.
0  cards

More about
sec+sy0-601

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Scott Byrams's SEC+SY0-601 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Security + SY0-601
  • 24 decks
  • 258 flashcards
  • 40 learners
Decks: 11 Compare And Contrast Different Types, 12 Given A Scenario Analyze Potential In, 13 Given A Scenario Analyze Potential In, And more!
-Sec+ 601
  • 4 decks
  • 247 flashcards
  • 1 learners
Decks: Certmaster Practice Questions, Domain 3 Questions, Domain 1 Questions, And more!
Study CompTia SY0-601
  • 24 decks
  • 746 flashcards
  • 11 learners
Decks: Must Know Items, Security Acronyms, Ports To Service, And more!
601 Review Questions
  • 29 decks
  • 597 flashcards
  • 2 learners
Decks: Missed Questions, Secure Protocols Questions, Acronyms A, And more!
Make Flashcards