Brainscape
Find Flashcards
Discover millions of Flashcards
Browse Brainscape-Certified Flashcards
Learn faster with our catalog of expert certified, pre-made flashcards.
Browse All Flashcards
Browse our full catalog of user-generated and Brainscape-Certified flashcards.
Explore the
Knowledge Genome
of subjects:
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
Make Flashcards
How It Works
Features Overview
The Science of Studying
Educators
Schools & Teachers
Tutors & Resellers
Businesses
Employee Training
Publishers & Resellers
Academy
Academy Homepage
The Science of Studying
Study Tips
Teaching Tips
Employee Training Tips
Language Learning Tips
Test Prep Tips
Log in
My Dashboard
Get Started
Log out
Cyber Security 601
> Proxy Servers > Flashcards
Proxy Servers Flashcards
(0 cards)
Study These Flashcards
Cyber Security 601
flashcards
Decks in class (118)
# Cards
Encryption Overview
8
IPSec & TLS/SSL
7
Securing Storage Devices
7
Endpoint Analysis
7
Securing Wireless Devices
4
SIM Cloning, ID Theft, & Bluetooth Attacks
5
Root of Trust
2
Trusted Firmware
8
Secure Processing
6
Mobile Device Theft
2
Security of Mobile Apps
3
Bring Your Own Device
6
Hardening Mobile Devices
1
Hardening
5
Trusted Operating System
4
Group Policies
6
File Systems & Hard Drives
5
Supply Chain Assessment
5
Root of Trust Supply Chain
1
Hypervisors
4
Threats to VM's
5
Securing VM's
6
Web Browser Security
4
Web Browser Concerns
8
Securing Applications
3
Software Development
12
SDLC Principles (Software Development Life Cycle)
15
Testing Methods (Software)
9
Vulnerabilities & Exploits
4
Buffer Overflows
5
Cross Site Scripting & Cross Site Request Forgery
7
SQL Injection
5
XML Vulnerabilities
7
Race Conditions
3
Design Vulnerabilities
7
The OSI Model
9
Switches
5
Routers
4
Network Zones
4
Jumpbox
5
Network Access Control
4
VLAN's
4
Subnetting
3
Network Address Translation
6
Firewalls
14
Proxy Servers
0
Authentication Summary
7
Access Control Models
6
Best Practices for Access Control
5
Users and Groups
6
Permissions
3
Risk Assesment
7
Qualitative and Quantitative Risk
9
Methodologies and Security Controls
19
Types of Risk
6
Vulnerability Management
4
Penetration Testing
4
Training and Exercises
4
OVAL
1
Vulnerability Assessment Tools
6
Password Analysis Tools
10
Performance Baselining
3
Protocol Analyzers
6
Simple Network Management Protocol (SNMP)
7
Auditing
6
Logging
9
Log Files
5
Security Information and Event Management Systems (SIEM)
2
SYSLOG
10
Security Orchestration Automation and Response
4
Symmetric Algorithms
10
Asymmetric Algorithms
4
Pretty Good Privacy
3
One-Time Pad
2
Cryptography Considerations
4
Hashing
13
Hashing Attacks
7
Public Key Infrastructure
3
Digital Certificates
14
Certificate Authorities
9
Secure/Multipurpose Internet Mail Extensions (S/MIME)
3
More on SSL and TLS
3
Secure Shell (SSH)
4
VPN Protocols
13
Planning for the Worst
2
Redundant Power
8
Backup Power
3
Data Redundancy / Disk Redundancy
10
Network Redundancy
4
Server Redundancy
4
Redundant Sites
4
Data Backup
4
Tape Rotation
6
Disaster Recovery Plan
1
Business Impact Analysis
10
Policies and Procedures
5
Data Classifications
13
Data Ownership
5
PII and PHI
9
Legal Requirements
3
Privacy Technologies
5
Security Policies
4
Vendor Relationships
5
Disposal Policies
6
IT Security Framework
13
Incident Response Procedures
9
Incident Response Planning
9
Investigative Data
10
Forensic Procedures
10
Data Collection Procedures
2
Security Tools Part 1 (Network Tools)
10
Security Tools Part 2 (Network Tools)
7
Security Tools Part 3 (File Manipulation)
6
Security Tools Part 4 (Shells and Scripts)
4
Security Tools Part 5 (Packet Capture)
3
Security Tools Part 6 (Forensics)
5
Security Tools Part 7 (Exploitation)
4
Ports & Protocols
37