security+ sy601

This class was created by Brainscape user f z. Visit their profile to learn more about the creator.

By: f z

Decks in this class (29)

1 - 1: Malware
The two components of malware,
What defines a virus,
What defines a worm
41  cards
1 - 2: Understanding Attackers
Differentiating attackers,
Script kiddies,
Hacktivists
26  cards
1 - 3: Threat Intelligence
Threat intelligence,
Open source intelligence,
Email address harvesting
30  cards
1 - 4: Social Engineering Attacks
Social engineering,
Main reasons social engineering i...,
Phishing
15  cards
3 - 1: Encryption
What is cryptography,
What two functions comprise crypt...,
What are algorithms
23  cards
3 - 2: Symmetric Cryptography
Data encryption standard des history,
Data encryption standard des key ...,
3des
16  cards
3 - 3: Asymmetric Cryptography
Asymmetric cryptography,
Rsa,
Rsa key use
11  cards
3 - 4: Key Management
Out of band key exchange,
The diffie hellman key exchange,
Key escrow
10  cards
3 - 5: Public Key Infrastructure
Web of trust,
Problems with web of trust,
Public key infrastructure
34  cards
3 - 6: Cryptanalytic Attacks
Brute force attack,
Keyspace,
Knowledge based attacks
11  cards
3 - 7: Cryptographic Applications
Transport layer security,
Session key,
Ephemeral keys
8  cards
5 - 1: Data Center Protection
Data centers,
Media storage facilities,
Evidence storage
38  cards
5 - 2: Hardware and Data Security
Data lifecycle,
Data destruction,
Data clearing
9  cards
5 - 3: Business Continuity
Business continuity planning,
Business impact assessment,
Bcp in the cloud
19  cards
5 - 4: Disaster Recovery
Disaster recovery,
Disaster types,
Disaster sources
33  cards
7 - 1: Host Security
Security baselines,
Gpo,
Patch management
36  cards
7 - 2: Hardware Security
Encryption,
Hardware security module,
Trusted platform module
16  cards
7 - 3: Configuration Management
Change management,
Request for change ingredients,
Configuration management
8  cards
7 - 4: Embedded Systems Security
Industrial control systems,
Ics deployments,
Why are icss good hacker targets
25  cards
7 - 5: Scripting and Working at the Command Line
Shell environments,
Scripts,
Ssh
13  cards
8 - 1.1: TCP/IP Networking
Tcp ip,
Main roles of ip,
Packets
55  cards
8 - 2: Secure Networking Design
Firewalls,
Three network interfaces of borde...,
First border
37  cards
8 - 3: Network Security Devices
Switches,
Wireless access points,
Switches operate at _____ of the ...
60  cards
8 - 4: Network Security Techniques
Two major objectives,
Perimeter security,
Access control lists
55  cards
8 - 1.2: Key ports
Web servers hyper text transfer p...,
Secure web servers hyper text tra...,
File transfer protocol port
20  cards
9 - 1: Incident Response Programs
Nist special publication 800 61,
Incident response plan,
Incident response plan elements
28  cards
9 - 2: Attack Frameworks
Att ck framework,
Diamond model,
4 points of diamond model
5  cards
9 - 3: Incident Investigation
Syslog,
Syslog components,
Syslog ng
17  cards
9 - 4: Forensic Techniques
Four main types of investigations,
Operational investigations,
Criminal investigations
58  cards

More about
security+ sy601

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study f z's Security+ SY601 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

SY601
  • 9 decks
  • 759 flashcards
  • 17 learners
Decks: Sy601, Sy 51 100, 101 150, And more!
Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Security+ SY601 RC
  • 29 decks
  • 640 flashcards
  • 5 learners
Decks: 1 5 Common Attacks, 1 6 Understanding Vulnerability Types, 1 7 Vulnerability Scanning, And more!
Make Flashcards