This class was created by Brainscape user Eric Lekus. Visit their profile to learn more about the creator.

Decks in this class (22)

Chapter 1 Security Governance Through Principles and Policies
What are the six goals for cobit 1,
What is itil 2,
What is a security policy 3
12  cards
Chapter 2 Personnel Security and Risk Management
What is risk management 1,
What is risk assessment 2,
What is risk response 3
12  cards
Chapter 3 Business Continuity Planning
What are the four steps of busine...,
What is the difference between mt...,
What is the rpo 3
3  cards
Laws, Regulations, and Compliance
What is the comprehensive crime c...,
What is the computer fraud and ab...,
What was the national information...
23  cards
Chapter 5 Protecting the Security of Assets
What are sample data classificati...,
What is data remanence 2,
What is erasing 3
18  cards
Chapter 6 Cryptography and Symmetric Key Algorithms
What is key space 1,
What is kerchoff s principle 2,
What is cryptography cryptoanalys...
32  cards
Chapter 7 PKI and Cryptographic Applications
Describe rsa 1,
Compare different symmetric and a...,
Describe elgamal 3
28  cards
Chapter 8 Principles of Security Models, Design, and Capabilities
What is the difference between su...,
What is privacy by design 2,
What is confinement 3
26  cards
Chapter 9 Security Vulnerabilities, Threats, and Countermeasures
What are the hardware execution t...,
What are the protection rings 2,
What are the process states 3
24  cards
Chapter 10 Physical Security Requirements
What is crime prevention through ...,
Describe wiring closets 2,
Describe how proximity devices wo...
7  cards
Chapter 11 Secure Network Architecture
Describe encapsulation in the osi...,
What does the application layer do 2,
What does the presentation layer ...
61  cards
Chapter 12 Secure Communications and Network Attacks
What is point to point protocol 1,
What are the important eap deriva...,
What is disa 3
22  cards
Chapter 13 Managing Identity and Authentication
What is identification 1,
What is authentication 2,
What is the difference between su...
21  cards
Chapter 14 Controlling and Monitoring Access
What is the difference between pe...,
What are common authorization mec...,
Describe access control models 3
13  cards
Chapter 15 Security Assessment and Testing
What is nist 800 3a 1,
What are security assessments 2,
What are security audits 3
17  cards
Chapter 16 Managing Security Operations
What is the media management life...,
What are the key steps of provisi...,
What are the steps of the change ...
3  cards
Chapter 17 Preventing and Responding to Incidents
What are the steps of the inciden...,
What is a drdos attack 2,
What is a syn flood attack 3
10  cards
Chapter 18 Disaster Recovery Planning
What is the difference between th...,
How do you protect hard drives 2,
How do you protect servers 3
13  cards
Chapter 19 Investigations
What is the electronic discovery ...,
What are the requirements for evi...,
What are the types of evidence 3
6  cards
Chapter 20 Software Development Security
Describe programming languages 1,
What are software libraries 2,
What is an integrated development...
32  cards
Chapter 21 Malicious Code and Application Attacks
What are four common virus propag...,
What are advanced virus tactics 2,
Describe buffer overflows 3
17  cards
Total seminars
What is the mau in a token ring n...,
What is a system account 2,
What is octave 3
124  cards

More about
CISSP

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Eric Lekus's CISSP flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CISSP
  • 43 decks
  • 2470 flashcards
  • 705 learners
Decks: Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, And more!
CISSP
  • 21 decks
  • 865 flashcards
  • 2757 learners
Decks: Cissp Chapter 1, Cissp Glossary, Cissp Domain 1 Access Control, And more!
CISSP Exam
  • 32 decks
  • 1092 flashcards
  • 2669 learners
Decks: Access Control, Telecommunications And Network Security, Information Security Guidelines And Risk, And more!
CISSP
  • 16 decks
  • 2148 flashcards
  • 706 learners
Decks: Security Management Practices, Security Architecture And Models, Access, And more!
Make Flashcards