Brainscape
Find Flashcards
Make Flashcards
Why It Works
More
Educators
Businesses
Tutors & resellers
Content partnerships
Academy
About
Educators
Teachers & professors
Content partnerships
Tutors & resellers
Businesses
Employee training
Content partnerships
Tutors & resellers
Academy
About
Log In
Get Started
Brainscape's Knowledge Genome
TM
Browse over 1 million classes created by top students, professors, publishers, and experts.
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
See full index
Practice
> (1) Reverse Engineering of Hardware > Flashcards
(1) Reverse Engineering of Hardware Flashcards
Study These Flashcards
1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
Practice
(89 decks)
(1)CyberSecurity Objectives
(1)Privacy Vs. Security
(1)Evaluating Security Risks
(1)Identify Threats
(1)Identify Vulnerabilities
(1) Controls Review
(1)Secure Network Construction
(1) Firewalls and Securing the Outer Edges of the Network
(1)Common TCP Ports
(1)Segmentation of Networks
(1)Defense Through Deception
(1) Secure Endpoint Management
(1)Penetration Testing
(1) Planning a Pentest
(1) Pentest (Conducting Discovery and execution)
(1)Pentest Review/Alternatives to Pentests
(1)Reverse Engineering
(1) Software/Hardware of Reverse Engineering
(1) Reverse Engineering of Hardware
(1)Efficiency and the improvement of processes
(1)Tools and Tech and their Integrations
(1)Efficiency ideas in Incident Response Processes
(2) Concepts of the Design of Infrastructure
(2)Concepts of Operating Systems
(2) Logging, Logs, and Log Ingestion
(2) Network Architecture
(2) Identity and Access Management
(2) Federated ID Tech
(2) Encryption and the Protection of Important Data
(3) Analyzing Network Events
(3) Common Network Issue Detection
(3) Detecting DoS and DDoS attacks
(3) Host Related Issue Investigation
(3) Malicious processes, malware and software that is not authorized
(3) Operating System Behavior that is not good
(3) Not allowed access, privileges and changes and data theft
(3) Social Engineering Shtuff
(3) Service and App Related Issue Investigations
(3) Tools and Techniques that help figure out Malicious Activity
(3) Common Techniques For Analyis And E-mail Research
(3) Attacks On E-mail And E-mail Security Tools
(3) File Analysis And Sandboxing
(3) Analysis Of User Behavior And Data Formats
(3) Expressions That Are Regular And Grep
(4) Proprietary Intelligence and/Accessing Threat Intelligence
(4) Intelligence Cycle and Threat Intelligence Community
(4) Proactive and Focused Threat Hunting
(4) Indicators Of Compromise And Tools And Techniques Of Threat Hunting
(5) Active Reconnaissance, Mapping, And Discovery
(5) Pings, Port Scans, And Device Fingerprinting
(5) Service/Version ID, Common Tools
(5) DHCP Logs Server Config Files
(5) DND And WhoIs
(6) Regulations and Corporate Rules
(6) Scheduling Scans and Scan Types
(6) Conducting Vulnerability Scans
(6) Remediation Flow
(6) Tools Of Vulnerability Assessments
(7) CVSS Common Vulnerability Scoring System
(7) Scan Result Validity
(7) Vulnerabilities, Overflows, Escalation
(7) Infrastructure and Op Tech
(7) Authentication Failures
(8) Risk and Risk Assessments
(8) Threats and the Compute Environment
(8) Phases in the Dev of Software
(8) DevOPS/SecOps
(8) Securely Coding
(8) Best Practices For Coding
(8) Secure Software Testing
(8) Policies
(8) Standards And Procedures
(8) Guidelines And Exceptions
(9) Security Incident Definitions
(9) Detection And Analysis
(9) Contain, Eradicate, Recover
(9) Incident Response Building
(9) Incident Threat Classification
(9) Impact Scope
(9) Frameworks Of Attack
(10) Indicators Of Compromise Definitions_Concepts
(10) Unusual DNS, IoCs, And Evidence
(11) Isolation, Removal, Identifying Attackers
(11) Data Integrity Validation
(12) Reporting Vulnerabilities
(12) Incident Reporting
(13) Forensic Toolset Building
(13) Cloud, Container, and Virtual Forensics
(13) Acquiring data and imaging systems