This class was created by Brainscape user Camden Connell. Visit their profile to learn more about the creator.

Decks in this class (16)

Chapter 1 & 2 Todays Security Professional & CyberSecurity Threat Landscape
1 what is the cia triad of cybers...,
1 what is the dad triad 2,
What differentiates strategic vs ...
7  cards
Chapter 3 Malicious Code
What is the difference between a ...,
What are ransomware iocs 2,
What is ransomware 3
27  cards
Chapter 4 Social Engineering, Physical, and Password Attacks
In social engineering attacks wha...,
In social engineering attacks wha...,
In social engineering attacks wha...
23  cards
Chapter 5 Security Assessment and Testing
What factors determine scan frequ...,
Scan sensitivity 2,
What is credentialed scanning 3
26  cards
Chapter 6 Secure Coding
Software development phases 1,
Code deployment environments 2,
Waterfall software development mo...
48  cards
Chapter 7 Cryptography and the Public Key Infrastructure
Substitution cipher 1,
Transposition cipher 2,
Stenography 3
63  cards
Chapter 8 Identity and Password Management
Identities 1,
Attributes vs traits 2,
Ssh keys 3
45  cards
Chapter 9 Resilience and Physical Security
Redundancy 1,
Redundancy design elements 2,
Load balancer 3
21  cards
Chapter 10 Cloud and Virtualization Security
Describe the differences between ...,
Vertical scaling vs horizontal sc...,
Cloud service model acronyms 3
38  cards
Chapter 11 Endpoint Security
What are endpoints 1,
Boot integrity 1 what are the two...,
Boot integrity begins with the ha...
48  cards
PORT/PROTOCOL
Ftp 1,
Ssh secure shell 2,
Sftp ssh ftp 3
21  cards
NETWORK TOOLS
Tracert traceroute windows linux ...,
Nslookup dig function os compare ...,
Ipconfig ifconfig function os 3
24  cards
Chapter 12 Network Security
What is defense in depth 1,
What is purpose of the osi model 2,
Osi model structure 3
124  cards
Chapter 13 Wireless and Mobile Security
What radio bands does wifi rely on 1,
Wifi security concerns 2,
Wifi standards frequencies 3
54  cards
Chapter 14 Incident Response
What at the 6 steps of the incide...,
Incident response team members 2,
Ir exercises 3
18  cards
Chapter 15-17 Forensics, Policies/Standards/Compliance, Risk Management
Order of volatility 1,
What is dd 2,
What is ftk imager 3
46  cards

More about
Security+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Camden Connell's Security+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security +
  • 43 decks
  • 2139 flashcards
  • 52 learners
Decks: Fundamentals Of Security, Threat Actors, Physical Security, And more!
Security +
  • 26 decks
  • 1501 flashcards
  • 241 learners
Decks: Deck A, Deck B, Deck C, And more!
Make Flashcards