This class was created by Brainscape user Ben Moore. Visit their profile to learn more about the creator.

Decks in this class (32)

overview of Security
Information security,
Information systems security,
Cia triad
26  cards
Threat Intelligence and Sources
Timeliness,
Relevancy,
Accuracy
13  cards
Attack Frameworks
Kill chain,
Reconnaissance,
Weaponization
11  cards
Malware
Virus,
Boot sector,
Macro
14  cards
Malware Infections'
Exploit technique,
Dropper,
Threat vector
5  cards
1.0 Threats, Attacks and Vulnerabilites
Phishing,
Smishing,
Vishing
62  cards
1.3 Application Attacks
Priviledge escalation,
Cross site scripting,
Injections
26  cards
1.4 Network Attacks
Evil twin,
Rogue access point,
Bluesnarfing
27  cards
1.5 Different threat actors, vectors and intelligence sources
Advanced persistent threat apt,
Insider threat,
State actors
31  cards
1.7 Techniques used in security assessments
Intelligence fusion,
Threat feeds,
Advisorie and bulletins
21  cards
1.6 Various types of vulnerabilities
Zero day,
Weak configurations,
Open permissions
9  cards
1.8 techniques used in penetration testing
Known environment,
Unknown environment,
Partially known environment
19  cards
2.1 security concepts in an enterprise environment
Diagrams,
Baseline configuration,
Standard naming conventions
30  cards
2.2 Virtualization and cloud computing concepts
Infrastructure as a service iaas,
Platform as a service paas,
Software as a service saas
28  cards
2.3 Secure application development, deployment and automation concepts
Orchestration,
Resource orchestration,
Workload orchestration
10  cards
2.4 Authentication and authorization design concepts
0  cards
2.5 Implement cybersecurity resilience
0  cards
2.6 Security implications of embedded and specialized systems
0  cards
2.7 Physical security controls
0  cards
2.8 Cryptography concepts
0  cards
3.1 Secure Protocols
Well known ports,
Registered ports,
Dynamic or private ports
38  cards
Hardening
Categories of updates,
Patch management,
Security template
4  cards
Supply chain assessment
Trusted foundry,
Hardware source authenticity,
Rot
18  cards
Application Security
General security for web browsers,
Lso,
Add ons
3  cards
Secure software development
Black box testing,
White box testing,
Grey box testing
15  cards
Networking
Mac flooding,
Mac spoofing,
Routers
16  cards
Perimeter Security
Circuit level gateway,
Proxy server,
Honeypot
6  cards
Workflow Orchestration
Orchestration,
Ci,
Cd
5  cards
Network Attacks
0  cards
Test Prep
Mou,
Rules of engagement,
Crlf injection
94  cards
Test Prep April 2
Srtp,
Ntpsec,
S mime
127  cards
Test Prep
Directory traversal,
Arp poisoning,
Smurf
11  cards

More about
Security +

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Ben Moore's Security + flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Security +
  • 10 decks
  • 250 flashcards
  • 816 learners
Decks: Practice Test 1, Practice Test 2, Practice Test 3, And more!
Make Flashcards