ag-Cybersecurity Bootcamp Study Aid

This class was created by Brainscape user Anti Gondu. Visit their profile to learn more about the creator.

Decks in this class (55)

1.1_ Cybersecurity Mindset
Defining Cybersecurity Defining Attack Strategies Website Attacks Server Attacks Database Attacks NIST Cybersecurity Framework
18  cards
1.2_ Surveying Cyberspace
What is the cia triad,
The quality of being able to be u...,
What are some examples of availab...
20  cards
1.3_ Certifications and Security+
What are some jobs that may requi...,
As of december 2019 what was the ...,
How many topics are in the secuir...
33  cards
2.1_The Security Organization - GRC
What are the 5 areas of security ...,
Security operations will interact...,
Security concerns vs business con...
31  cards
2.2_ Risk Management and Threat Modeling
What s the difference between a v...,
A _________ is an aspect of a bus...,
A _________ is an actor that migh...
37  cards
2.3 Governance, Risk, and Compliance III
Codifying and enforcing proper be...,
Enforcing the policies in order t...,
A __________ is a rule that defin...
23  cards
3.1 How Sweet is Terminal
We are used to ______________ wit...,
Using the command line is a criti...,
Virtual machines are programs tha...
23  cards
3.2 Commanding the Command Line
You can use the command ls s to l...,
What does this command do head n ...,
It and security professionals can...
26  cards
3.3 Sticking to the Script
Multiple text processing commands...,
Using text manipulation commands ...,
Sed stands for __________
15  cards
4.1 Introduction to Linux
Over 70 of websites run some kind...,
____________ are special purpose ...,
These command line only machines ...
17  cards
4.2 Access Controls
A _______is a cryptographic funct...,
How do password hashes work,
_________ allows us to change the...
15  cards
4.3 Special Permissions and Managing Services
Linux categorizes files programs ...,
Managing access controls in linux...,
For each of these categories ther...
21  cards
5.1 Backups and tar
There are three different types o...,
The ______ command is a linux uti...,
_______ is the industry standard ...
13  cards
5.2 Cron and Scheduled Jobs
A _________ is a script or comman...,
What is a daemon,
What is cron
20  cards
5.3 Monitoring Log Files
What are the three aspects to pro...,
When we properly manage our logs ...,
Linux stores all log files in a c...
23  cards
6.1 Combining Commands
Compound commands,
The three components of a command,
Compound commands format
28  cards
6.2 Ifs and Lists
Explain this if syntax if thenfi,
Explain this if syntax if 5 gt 8 ...,
Explain this else syntax if thene...
18  cards
7.1 Introduction to Windows
While many it professionals prefe...,
_________ is one of the most impo...,
True or false command prompt uses...
33  cards
7.2 Powershell Scripting
Whats the diffrence between cmd a...,
Powershell in cyber security,
What is powershell
13  cards
7.3 Active Directory Domain Services
What is active directory domain s...,
What is active directory domain s...,
What is the most used authenticat...
4  cards
8.1 Introduction to Networking
What is a computer network,
The ___________ model is a networ...,
Client server model this two way ...
53  cards
8.2 Ports, Protocols, and the OSI Mode
Networks use __________ to ensure...,
Pap is used for ______________,
Smb is a windows based protocol f...
43  cards
8.3 Following Data Through Layers 2, 3, and 4
Both hackers and security pros wi...,
Footprinting can yield what infor...,
Data is routed via switches to a ...
45  cards
9.1 IP and Protocols
What does dhcp stand for and what...,
True or falsedhcp is dynamic beca...,
True or falsedhcp is a layer 7 ap...
33  cards
9.2 Email Networks and Security
True or falsedomain name systems ...,
What is a record,
All the records for a particular ...
28  cards
Networking Review
What does http stand for,
What is the port number for http ...,
What types of services does http ...
37  cards
Networking Review II
Explain in simple terms what is t...,
What type of attack is this,
What is the mac address of the go...
19  cards
10.1 Intro to Cryptography
Define cryptography,
Define plaintext,
Define ciphertext
33  cards
10.2 Asymmetric Encryption and Hashing
What is the disadvantages with sy...,
Gpg is a command line tool used t...,
__________ is a cryptographic met...
16  cards
10.3 Applied Cryptography and Attacks
Encryption can be used to secure ...,
True or falseemails are natively ...,
Programs like _____ and _____ can...
22  cards
11.1 Introduction to Firewalls and Network Security
Security professionals use the co...,
What are the seven basic layers o...,
The _______ is an intelligence dr...
41  cards
11.2 Intrusion Detection, Snort, and Network Security Monitoring
An ______ both analyzes traffic a...,
An ids is like a ______ that read...,
What is the worlds most popular o...
59  cards
11.3 Enterprise Security Management
An intrusion detection system ids...,
Enterprise security monitoring es...,
True or false firewalls and nsms ...
9  cards
12.1 Intro to Cloud Computing
Before the cloud orgs setup netwo...,
Key term complex architecture,
Key term extensive management
14  cards
12.2 Cloud System Management
_________ ________ and ________ar...,
_______ can be thought of as ligh...,
_______ are tools that automatica...
32  cards
12.3 Load Balancing and Redundancy
Career context cloud security ana...,
Career context cloud architects,
Cloud context devsecops
10  cards
13_ Project Week ELK Stack
What does elk stack stand for,
Why is the elk stack so popular,
The elk stack works by storing lo...
7  cards
14.1 HTTP with Session and Cookies
Securing the web requires in dept...,
The client server model is an exc...,
Clients and servers use the _____...
56  cards
14.2 Microservices and Container Security
Components of a typical web app,
Information flows,
Monolith to microservices
33  cards
15.1 Introduction to Web Vulnerabilities and Hardening
Cyber kill chain,
Hybrid kill chain,
Owasp top 10 1
68  cards
15.2 Exploitation and Mitigation
Injections top web vulnerability,
Injections sql,
Injections sqli
33  cards
15.3 Broken Authentication and Session Management
Validation bypass intro,
Validation bypass impact,
Validation bypass detection
18  cards
16.1 Introduction to Pen Testing and Open Source Intelligence
Pen testing intro,
Pen testing the why,
Pentests practitioners
22  cards
16.2 Student Guide: Network Discovery and Vulnerability
Review 5 phases of engagement,
Introduction to port scanning,
Introduction to port scanning 2
29  cards
16.3 Exploiting Vulnerabilities
Understanding shellshock,
Shellshock attackers can perform,
Shellshock vulnerability 1
39  cards
Nmap and Scanning Review Quiz
Which type of hacker is considere...,
What is the main difference betwe...,
Which type of testing takes place...
29  cards
17.1 Introduction to Metasploit
Introduction to heartbleed,
Difference between heartbleed and...,
Cve 2014 0160
18  cards
17.2 Post-Exploitation with Meterpreter
Command and control intro,
C2 definition,
Using ncat what is the command to...
24  cards
17.3 Custom Payloads with msfvenom
Custom payloads review,
Custom payloads why attackers use...,
Custom payload options
10  cards
18.1 Introduction to SIEM
Introduction to continuous monito...,
Explain iscm,
Log logs and more logs
15  cards
18.2 Splunk Searches
Siem continuous monitoring,
Siem welcome to splunk,
Splunk additional capabilities
5  cards
18.3 Splunk Reports and Alerts
Splunk review,
Splunk primary purpose,
Splunk time base search
7  cards
19.1 Splunk Dashboards and Visualizations
Splunk review 1,
Splunk review 2,
Splunk review 3
8  cards
19.2 Splunk Enterprise Security
While siem products such as splun...,
Popular advancements,
Uba
3  cards
21.1 Introduction to Digital Forensics
Forensics professionals,
________ is a field dedicated to ...,
What does computer forensics inve...
9  cards

More about
ag-Cybersecurity Bootcamp Study Aid

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Anti Gondu's ag-Cybersecurity Bootcamp Study Aid flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

ag-AWS Study Deck - SAA
  • 18 decks
  • 1819 flashcards
  • 3 learners
Decks: Chapter 1 Compute Amazon Ec2 Auto Scalin, Chapter 2 Networking Vpc Elb API Gateway, Chapter 3 Storage Amazon Simple Storage, And more!
Cybersecurity Bootcamp Study Aid
  • 55 decks
  • 1358 flashcards
  • 463 learners
Decks: 11 Cybersecurity Mindset, 12 Surveying Cyberspace, 13 Certifications And Security, And more!
Cyber Security
  • 19 decks
  • 2738 flashcards
  • 104 learners
Decks: Security Risk Management Srm, Security Assessment And Testing Ant, Software Development Security Dev, And more!
Cybersecurity
  • 73 decks
  • 1324 flashcards
  • 512 learners
Decks: Threat Model, First Look Into Computer Parts And Tools, Computer Parts And Tools Part 2, And more!
Make Flashcards