This class was created by Brainscape user Rachelle Pestanas.

By:

Decks in this class (16)

Lesson 1: Comparing & Contrasting Attacks
Information security 1,
Primary goals or functions of inf...,
Assets 3
63  cards
Lesson 2: Comparing and Contrasting Security Controls
Frameworks 1,
Cybersecurity 2,
Security control 3
27  cards
Lesson 3: Assessing Security Posture with Software Tools
Security assessment frameworks 1,
Vulnerability scanning 2,
Penetration testing pen test acti...
52  cards
Lesson 4: Basic Cryptography Concepts
Plaintext or cleartext 1,
Ciphertext 2,
Cipher 3
75  cards
Lesson 5: Implementing Public Key Infrastructure
Public key infrastructure pki 1,
Digital certificate 2,
Object identifiers oids 3
51  cards
Lesson 6: Implementing Identity and Access Management Controls
Access control system 1,
Subjects 2,
Objects 3
52  cards
Lesson 7: Managing Access Services and Accounts
Authorization 1,
Implicit deny 2,
Least privilege 3
65  cards
Lesson 8: Implementing a Secure Network Architecture
Network architecture weaknesses 1,
Cisco s safe architecture 2,
Safe s places in the network pin 3
67  cards
Lesson 9: Installing and Configuring Security Appliances
Firewall 1,
Packet filtering 2,
Circuit level stateful inspection...
69  cards
Lesson 10: Installing and Configuring Wireless and Physical Access Security
Wireless networking 1,
Service set identifier ssid 2,
Wireless controller 3
69  cards
Lesson 11: Deploying Secure Host, Mobile, and Embedded Systems
Common criteria cc 1,
Trusted os tos 2,
Trusted computing group 3
95  cards
Lesson 12: Implementing Secure Network Access Protocols
Dynamic host configuration protoc...,
Domain name system dns 2,
Dns spoofing 3
33  cards
Lesson 13: Implementing Secure Network Applications
Hypertext transfer protocol http 1,
Http header 2,
Http payload 3
58  cards
Lesson 14: Explaining Risk Management and Disaster Recovery Concepts
Vulnerable business process 1,
Risk management 2,
Phases of risk management 3
74  cards
Lesson 15: Summarizing Secure Application Development Concepts
Software exploitation 1,
Zero day exploit 2,
Input validation attack 3
59  cards
Lesson 16: Explaining Organization Security Concepts
Security posture 1,
Corporate security policy 2,
Standard 3
42  cards

More about
COMPTIA - Sec+ Textbook

  • School Unspecified
  • Program type Unspecified
  • Course Unspecified
  • Instructor Unspecified
  • Standards Unspecified

The creator of this class did not yet add a description for what is included in this class.

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA A+
  • 7 decks
  • 626 flashcards
  • 433 learners
Decks: 10 Mobile Devices, 20 Networking, 30 Hardware, And more!
Comptia SEC+
  • 27 decks
  • 1865 flashcards
  • 14 learners
Decks: Section 22 Virtualization And Cloud Comp, Section 23 Secure Application Developmen, Section 24 Authentication And Authorizat, And more!
Sec+
  • 30 decks
  • 732 flashcards
  • 117 learners
Decks: 26 50, 51 75, 76 100, And more!
CompTIA A+
  • 28 decks
  • 3865 flashcards
  • 931 learners
Decks: Chapter 1 Mobile Devices Mc, Chapter 1 Mobile Devices, Chapter 1 Mobile Devices Key Terms, And more!