This class was created by Brainscape user Camden Connell. Visit their profile to learn more about the creator.

Decks in this class (16)

Chapter 1 & 2 Todays Security Professional & CyberSecurity Threat Landscape
What is the cia triad of cybersec...,
1 what is the dad triad,
Breach impact
7  cards
Chapter 3 Malicious Code
What is the difference between a ...,
What are ransomware iocs,
What is ransomware
27  cards
Chapter 4 Social Engineering, Physical, and Password Attacks
In social engineering attacks wha...,
In social engineering attacks wha...,
In social engineering attacks wha...
23  cards
Chapter 5 Security Assessment and Testing
What factors determine scan frequ...,
Scan sensitivity,
What is credentialed scanning
26  cards
Chapter 6 Secure Coding
Software development phases,
Code deployment environments,
Waterfall software development model
48  cards
Chapter 7 Cryptography and the Public Key Infrastructure
Cipher,
Transposition cipher,
Stenography
63  cards
Chapter 8 Identity and Password Management
Identities,
Attributes vs traits,
Ssh keys
45  cards
Chapter 9 Resilience and Physical Security
Redundancy,
Geographic dispersal of systems,
Separation of servers
21  cards
Chapter 10 Cloud and Virtualization Security
Describe the differences between ...,
Vertical scaling vs horizontal sc...,
Could service model acronyms 1 xa...
38  cards
Chapter 11 Endpoint Security
What are endpoints,
Boot integrity1 what are the two ...,
Boot integrity begins with the ha...
48  cards
PORT/PROTOCOL
Ftp,
Ssh secure shell,
Sftp ssh ftp
21  cards
NETWORK TOOLS
Tracert traceroutewindows linux d...,
Nslookup digcompare contrast,
Ipconfig ifconfigfunction os
24  cards
Chapter 12 Network Security
What is defense in depth,
What is purpose of the osi model,
Osi model structure
124  cards
Chapter 13 Wireless and Mobile Security
What radio bands does wifi rely on,
Wifi security concerns,
Wifi standards frequencies
54  cards
Chapter 14 Incident Response
What at the 6 steps of the incide...,
Incident response team members,
Ir exercises
18  cards
Chapter 15-17 Forensics, Policies/Standards/Compliance, Risk Management
Order of volatility,
What is dd,
What is ftk imager
46  cards

More about
Security+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Camden Connell's Security+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Security +
  • 10 decks
  • 250 flashcards
  • 816 learners
Decks: Practice Test 1, Practice Test 2, Practice Test 3, And more!
Make Flashcards