This class was created by Brainscape user Rachelle Pestanas. Visit their profile to learn more about the creator.

Decks in this class (16)

Lesson 1: Comparing & Contrasting Attacks
Information security 1,
Primary goals or functions of inf...,
Assets 3
63  cards
Lesson 2: Comparing and Contrasting Security Controls
Frameworks 1,
Cybersecurity 2,
Security control 3
27  cards
Lesson 3: Assessing Security Posture with Software Tools
Security assessment frameworks 1,
Vulnerability scanning 2,
Penetration testing pen test acti...
52  cards
Lesson 4: Basic Cryptography Concepts
Plaintext or cleartext 1,
Ciphertext 2,
Cipher 3
75  cards
Lesson 5: Implementing Public Key Infrastructure
Public key infrastructure pki 1,
Digital certificate 2,
Object identifiers oids 3
51  cards
Lesson 6: Implementing Identity and Access Management Controls
Access control system 1,
Subjects 2,
Objects 3
52  cards
Lesson 7: Managing Access Services and Accounts
Authorization 1,
Implicit deny 2,
Least privilege 3
65  cards
Lesson 8: Implementing a Secure Network Architecture
Network architecture weaknesses 1,
Cisco s safe architecture 2,
Safe s places in the network pin 3
67  cards
Lesson 9: Installing and Configuring Security Appliances
Firewall 1,
Packet filtering 2,
Circuit level stateful inspection...
69  cards
Lesson 10: Installing and Configuring Wireless and Physical Access Security
Wireless networking 1,
Service set identifier ssid 2,
Wireless controller 3
69  cards
Lesson 11: Deploying Secure Host, Mobile, and Embedded Systems
Common criteria cc 1,
Trusted os tos 2,
Trusted computing group 3
95  cards
Lesson 12: Implementing Secure Network Access Protocols
Dynamic host configuration protoc...,
Domain name system dns 2,
Dns spoofing 3
33  cards
Lesson 13: Implementing Secure Network Applications
Hypertext transfer protocol http 1,
Http header 2,
Http payload 3
58  cards
Lesson 14: Explaining Risk Management and Disaster Recovery Concepts
Vulnerable business process 1,
Risk management 2,
Phases of risk management 3
74  cards
Lesson 15: Summarizing Secure Application Development Concepts
Software exploitation 1,
Zero day exploit 2,
Input validation attack 3
59  cards
Lesson 16: Explaining Organization Security Concepts
Security posture 1,
Corporate security policy 2,
Standard 3
42  cards

More about
COMPTIA - Sec+ Textbook

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Rachelle Pestanas's COMPTIA - Sec+ Textbook flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Sec+ SY0-701
  • 22 decks
  • 953 flashcards
  • 627 learners
Decks: Comptia Sec Sy0 701 Acronyms V1, Comptia Sec Sy0 701 Acronyms V2, Comptia Sec Sy0 701 Acronyms V3, And more!
Sec+
  • 16 decks
  • 936 flashcards
  • 347 learners
Decks: Ch 1 5, Sec Vista, Ch 6 7 8, And more!
CompTIA A+
  • 28 decks
  • 3865 flashcards
  • 743 learners
Decks: Chapter 1 Mobile Devices Mc, Chapter 1 Mobile Devices, Chapter 1 Mobile Devices Key Terms, And more!
Make Flashcards