This class was created by Brainscape user Zoubida Regzal. Visit their profile to learn more about the creator.

Decks in this class (35)

1.1 Social engineering attacks
What is phishing,
How to spot it,
How phishing attack are so succes...
26  cards
1.2 Malware & common attacks
What is a malware,
What are the different type of ma...,
How to get a malware
35  cards
1.3 Application attacks
What is privilege escalation,
How to mitigate privilege escalation,
What is xxs cross site scripting
32  cards
1.4 Network attacks
What is a rogue access point,
How to prevent a rogue access point,
What is a wireless evil twins
32  cards
1.5 Threat actors, vectors and intelligence sources
What is a threat,
What is an apt,
Who are the threat actors
8  cards
1.6 Type of vulnerabilities
What is a vulnerability,
What are the different vulnerabil...,
What is a zero day vulnerabiliy
15  cards
1.7 Security assessments techniques
What is threat hunting,
What is intelligence fusion cyber...,
What is vulnerability scanning
13  cards
1.8 Penetration test techniques
What is a penetration testing,
What are the rule of engagement f...,
What is a unknown environment pen...
19  cards
2.1 Configuration management
Why configuration management is i...,
Why is documentation important in...,
What type of documentation is nee...
30  cards
2.2 Cloud & Virtualization
Cloud models what is infrastructu...,
Cloud models what are the benefit...,
Cloud models what is software as ...
21  cards
2.3 Application dev, deployment and automation
Secure deployment what is sandbxing,
Secure deployment how to build an...,
Secure deployment
23  cards
2.4 Authentication & authoriaztion
Authentication methods what is di...,
Authentication methods why direct...,
Authentication methods what are t...
25  cards
2.5 Cybersecurity resilience
Disk redundancy what is redundancy,
Disk redundancy what is geographi...,
Disk redundancy what is multipath...
29  cards
2.6 Security implications of embedded & specialized systems
Embedded system what is an embedd...,
Embedded system what is a soc,
Embedded system what is an fpga
20  cards
2.7 Physical security controls
Physical security controls what i...,
Physical security controls what a...,
Physical security controls why si...
19  cards
2.8 Encryption
Cryptography concepts what is cry...,
Cryptography concepts what is pla...,
Cryptography concepts what is cip...
68  cards
3.1 Implement secure protocols
What is srtp,
What is ntp ntpsec,
What is s mime
17  cards
3.2 Implement host & application security solutions
Endpoint protection what is an en...,
Endpoint protection how to protec...,
Endpoint protection
50  cards
3.3 Implement secure network design
Load balancing what is load balan...,
Load balancing what is one of the...,
Load balancing how load balancer ...
79  cards
3.4 Install & configure wireless security settings
Wireless cryptography why wireles...,
Wireless cryptography how to secu...,
Wireless cryptography why wireles...
26  cards
3.5 Implement secure mobile solutions
Mobile device mgt what is mdm,
Ag2r la mondiale32 avenue emile z...,
Mobile device mgt what is byod in...
27  cards
3.6 Apply cybersecurity solution to the cloud
Cloud security controls what is a...,
Cloud security controls,
Cloud security controls is iam sh...
23  cards
3.7 Implement identity & account management
Identity controls what is an idp,
Identity controls why is an idp c...,
Identity controls what are the st...
19  cards
3.8 Implement authentication and authorization solutions
Authentication management what is...,
Authentication management is pass...,
Authentication management what is...
32  cards
3.9 Implement public key infrastructure
Public key infrastructure what is...,
Public key infrastructure what is...,
Public key infrastructure what is...
27  cards
4.1 Tool to assess organizational security
Reconnaissance tools what is trac...,
Reconnaissance tools what are the...,
Reconnaissance tools
39  cards
4.2 Importance of policies, processes and procedure in Incident response
Incident response process what ar...,
Incident response process,
Incident response process how a c...
13  cards
4.3 Incident, utilize appropriate data sources to support investigation
Vulnerability scan output what a ...,
Vulnerability scan output how to ...,
Siem dashboard what is a siem
18  cards
4.4 Incident, apply mitigation techniques or controls to secure an environment
Endpoint configuration what are t...,
Endpoint configuration why some a...,
Endpoint configuration why os are...
9  cards
4.5 Key aspects of digital forensics
Digital forensics what is digital...,
Digital forensics is there a feam...,
Digital forensics what are the 3 ...
8  cards
5.1 Compare & contrast various types of controls
Security controls what are the 3 ...,
Security controls what is manager...,
Security controls what is operati...
8  cards
5.2 Importance of regulations, standards, frameworks that impact security posture
Security regulation standards wha...,
Security regulation standards wha...,
Security regulation standards wha...
12  cards
5.3 Importance of policies to organizational security
Personnel security what is an aup,
Personnel security why an aup is ...,
Personnel security what is least ...
15  cards
5.4 Risk management processes and concepts
Risk management what is risk mana...,
Risk management how to manage the...,
Risk analysis how to evaluate a risk
15  cards
5.5 Privacy & sensitive data concepts in relation to security
Privacy data breaches what is the...,
Privacy data breaches what conseq...,
Privacy data breaches what is a pia
7  cards

More about
security+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Zoubida Regzal's Security+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Security+ SY0-601
  • 37 decks
  • 832 flashcards
  • 382 learners
Decks: 10 Acronyms, 11 Social Engineering Techniques, 12 Malware Types, And more!
Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Make Flashcards