This class was created by Brainscape user Mousa Basaleh. Visit their profile to learn more about the creator.

Decks in this class (21)

Fundamentals of Security
1.1 - Compare and contrast various types of security controls 1.2 - Summarize fundamental security concepts
72  cards
Threat Actors
1.2 - Summarize fundamental security concepts 2.1 - Compare and contrast common threat actors and motivations 2.2 - Explain common threat vectors and attack surfaces
66  cards
Physical Security
1.2 - Summarize fundamental security concepts 2.4 - Analyze indicators of malicious activity
45  cards
Social Engineering
2.2 - Explain common threat vectors and attack surfaces 5.6 - Given a scenario, you must be able to implement security awareness practices
56  cards
Malware
Given a scenario, analyze indicators of malicious activity
71  cards
Data Protection
1.4 - Explain the importance of using appropriate cryptographic solutions 3.3 - Compare and contrast concepts and strategies to protect data 4.2 - Explain the security implications of proper hardware, software, and data asset management 4.4 - Explain security alerting and monitoring concepts and tools 5.1 - Summarize elements of effective security governance
50  cards
Cryptographic Solutions
1.4 - Explain the importance of using appropriate cryptographic solutions 2.3 - Explain various types of vulnerabilities 2.4 - Given a scenario, you must be able to analyze indicators of malicious activity
156  cards
Risk Management
5.2: Explain elements of the risk management process
72  cards
Third-party Vendor Risks
2.2 - Explain common threat vectors and attack surfaces 2.3 - Explain various types of vulnerabilities 5.3 - Explain the processes associated with third-party risk assessment and management
60  cards
Governance and Compliance
5.1 - Summarize elements of effective security governance 5.4 - Summarize elements of effective security compliance
104  cards
Asset and Change Management
1.3 - Explain the importance of change management processes and the impact to security 4.1 - Given a scenario, you must be able to apply common security techniques to computing resources 4.2 - Explain the security implications of proper hardware, software, and data asset management
39  cards
Audits and Assessments
5.5: Explain types and purposes of audits and assessments
39  cards
Cyber Resilience and Redundancy
3.4: Explain the importance of resilience and recovery in security architecture
53  cards
Security Architecture
3.1 - Compare and contrast security implications of different architecture models 4.1 - Given a scenario, apply common security techniques to computing resources
84  cards
Ports
Port 3389,
Port 53,
Port 514
29  cards
Security Infrastructure
- Given a scenario, you must be able to apply security principles to secure enterprise architecture - Given a scenario, you must be able to modify enterprise capabilities to enhance security
134  cards
Book-Notes Section 3
Stix xml oasis html taxii in the ...,
What is threat intelligence,
Gathering data from firewalls and...
18  cards
Identity and Access Management (IAM) Solutions
- Given a scenario, you must be able to analyze indicators of malicious activity - Given a scenario, you must be able to implement and maintain identity and access management
79  cards
Vulnerabilities and Attacks
● 2.2: Explain common threat vectors and attack strategies ● 2.3: Explain various types of vulnerabilities ● 2.4: Given a scenario, you must be able to analyze indicators of malicious activity ● 2.5: Explain the purpose of mitigation techniques used to secure the enterprise ● 4.1: Given a scenario, you must be able to apply common security techniques to computing resources
101  cards
Malicious Activity
2.4: Given a scenario, you must be able to analyze indicators of malicious activity
80  cards
Hardening
Objectives: ● 2.5 - Explain the purpose of mitigation techniques used to secure the enterprise ● 4.1 - Given a scenario, you must be able to apply common security techniques to computing resources ● 4.5 - Given a scenario, you must be able to modify enterprise capabilities to enhance security
60  cards

More about
CompTIA Security +

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Mousa Basaleh's CompTIA Security + flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ (SY0-601)
  • 35 decks
  • 745 flashcards
  • 2135 learners
Decks: Security Overview, Malware, Malware Infections, And more!
CompTIA A+
  • 28 decks
  • 3865 flashcards
  • 685 learners
Decks: Chapter 1 Mobile Devices Mc, Chapter 1 Mobile Devices, Chapter 1 Mobile Devices Key Terms, And more!
Security +
  • 26 decks
  • 1501 flashcards
  • 240 learners
Decks: Deck A, Deck B, Deck C, And more!
Make Flashcards