This class was created by Brainscape user Nick Barber. Visit their profile to learn more about the creator.

Decks in this class (74)

Secure Protocols
What are the versions of tls,
What type of encryption does ssh use,
What type of encryption does ssh use
24  cards
Symmetric vs Asymmetric
What is symmetric encryption,
What are the consideration for sy...,
What is aes encryption
12  cards
Encryption and stenography
What is encryption,
What are the three states of data,
What is stream cipher
9  cards
PKI concepts
What is the certificate authority,
What is the hierarchy of ca s cer...,
What are the two kinds of ca a
15  cards
Keys
What are algorithms,
What are keys,
What are the common key length
10  cards
IPsec
What is ipsec,
Two different common ipsec connec...,
Iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii...
6  cards
Authentication and Authorization
Knowledge based authentications,
Authentication factors something ...,
Authentication factor something y...
11  cards
Authentication methods
What are directory services,
What are tokens,
What are the three types of tokens
8  cards
Biometrics
What are biometric methods,
What are the 3 efficacy rates,
What is false rejection rate
5  cards
Pap and CHAP
What are authentication protocols,
What is password authentication p...,
What is chap
4  cards
EAP and 802.1x
What is eap,
What are the eap fast,
What is eap tls
9  cards
Radius and Tacacs
What is radius remote authenticat...,
Radius components,
What is tacacs
5  cards
Keberos
What is keberos,
Kerberos components,
What is access control
10  cards
Account Management-Account Types
Administrators accounts,
What are standard users,
What are guest account
5  cards
Password Policies
What are password policies,
What are the 4 character types fo...
2  cards
Account polices
What are account policies,
Access polcies define,
What is geofencing
4  cards
Application Security
What is input validation and what...,
What is syntactic validation,
What semantic validation
13  cards
Physical security
What are some physical security,
What are man traps,
What are faraday cage
7  cards
Wireless Security
What are cryptographic protocols wep,
What is wpa,
What is wpa2
13  cards
Secure Data destruction
What are the shredding security l...,
What is pulping,
What is overwriting
14  cards
Hardening
Hardening basics,
Hardening firmware,
Hardening ports and services
7  cards
Mobile Device managment
What is unified endpoint management,
Unified endpoint management examples,
How android is secure
8  cards
Mobile Device management and enforcement
Mobile device connections cellular,
What is internationa mobile subsc...,
Different wifi connections
14  cards
Network segmentation
What is a vlan system,
What is a intranet,
What is a extranet
6  cards
VPNs
Wht is a vpn,
How to implement a vpn,
What is a site to site vpn
10  cards
Proxies
What are proxies,
What is a reverse proxies,
What is the purpose of load balan...
7  cards
Port security
What are broadcast storm,
What is loop prevention,
What is a bridge port data unit g...
6  cards
Firewalls
What is a stateless firewall,
What a stateful firewall,
What is content url filtering in ...
5  cards
Virtualization
What is virtualization,
What are host machines,
What are guest machines
8  cards
Cloud concepts
What is cloud computing,
Cloud service providers,
What is a tentant and multitenant
9  cards
Cloud services
What is software as a service,
What is platform as a service paas,
What is infrastructure as a service
4  cards
Cloud Models
What is a public cloud model,
What is private cloud model,
What is a community cloud
5  cards
Computing Types
What is cloud computing,
What is fog computing,
What is managed service providers
6  cards
Cloud security
Cloud security resource policies ...,
What is service management
2  cards
Hardware redundancy
What is redundancy,
What are the ranges of high avail...,
What is raid
8  cards
Site redundancy
What is a hot site,
What is a cold site,
What is a warm site
3  cards
Non-persistance concepts
What non persistance last known good,
What is non persistance known state,
What is live boot media
3  cards
Backup and Restore
What does backup types mean,
Full backup means,
Differential backup means
6  cards
Network recon
What does route command do,
What does pathping command do,
What does a tracert command do
13  cards
Vulnerability scans
Scan results false positve,
Scan results false negative,
Scan results true positive
8  cards
SIEM and SOAR systems
What does siem stand for,
What does siem do,
What is the sim security informat...
5  cards
Penetration testing
What is penetration testing,
What is white box testing,
What is black box testing
8  cards
Penetesting exercise types
Penetration testing red team exer...,
Read team exercise skills,
Blue team exercises
6  cards
Digital Forensics
What is digital forensics,
What is the right to audit clauses,
What is regulatory and jurusdction
6  cards
Investigative data sources
Where can you find the dat
1  cards
Incident response process
What is a incident,
What is the incident response pro...,
Incident response process ideneti...
7  cards
Incident response plans
What is your incdient response team,
How to plan a incident reponse plan,
Continuity of operations 0 irp
4  cards
Attack frameworks
What is a attack framwwork,
What is mitre att ck,
What is the diamondmdel of intrus...
4  cards
Security Controls
What are security contros,
Security controls categories 3,
Security control types 7
3  cards
Regulations, Standards, and frameworks
What are regulations standard and...,
The basic cis controls 1 20,
Nist csf overview
11  cards
GDPR
What is personal data,
What are controllers and processors,
What are fines and enforcement an...
9  cards
Personal in OSP
Main policies of perosonals in osp,
Policies on personal in osp,
Main polcies of personal in osps
3  cards
OSP- 3rd party risk
What is third party risk,
What are the elements that help u...,
Agreements that are need for thri...
5  cards
data policies
How to classify data,
What is governance,
What is data rentention
3  cards
OSP- other areas
What are credential polices,
What are organization al policies,
Assess management policy
3  cards
Risk managment concepts
What is risk,
What is a threat,
What is a vulnerability
5  cards
Risk Management - Types and strategies
What is the risk assessment process,
What are the risk types,
Strategies to risk management
3  cards
Risk Analysis
Risk analysis vocab,
What is quantitatuve risk assessent,
Sle assest value av exposure ef
5  cards
business impact analysis
What is business continuity bc,
What is disaster recovery,
What is business continutity plan...
14  cards
Privacy and Data Sensitivity Breach and Data types
What are the organizational conse...,
What is the requirement for notif...,
What if in involved phi in the br...
7  cards
Privacy enhancing technologies
What are the privacy enhancing te...,
Privacy enhancing technlogy to be...,
What are the differet masking types
13  cards
Privacy data roles and responsibility
What are the roles and resposibli...,
What is a data owner,
What are the data owner roles
12  cards
Privacy and data sensitivity - other areas
What is data lifecycle,
What are pia,
What is a term of aggreement
4  cards
Social engineering
What is the principle of security,
What is a vulneability,
What is a threat
17  cards
malware
What is malware,
What is a virus,
What is a marco virus
45  cards
Network attack - Layer 2 attack
What are the osi layers,
What is a arp process,
What is arp poisoning
5  cards
DoS and DDoS attacks
What is a denial of service,
What is a denial of service attack,
What is a ddos attack
7  cards
MiTM and MiTB attacks
What is a mitm attacks,
What is a mitb attack
2  cards
Wireless attacks
What is a rouge access point,
What is a evil twin attack,
What is a dissociation attack
11  cards
OSINT
What is threat intelligence,
What is open source intelligence,
Osint tool types
3  cards
THreat actors and vectors
What script kiddies,
What are insider threat,
What is a hacktivist
10  cards
cryptography
What is cryptography,
What is encryption,
Cryptography and security concept...
7  cards
encryption and stenography
What does encryption do,
What is cipher,
What is a stream cipher
5  cards
Hashing
What is hashing,
What is the hashing process,
What is the md5 hashing algorithms
9  cards

More about
Security+ exam

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Nick Barber's Security+ exam flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ Certification Pract...
  • 20 decks
  • 695 flashcards
  • 8 learners
Decks: Networking Basics And Terminology, Introduction To Security Terminology, Security Policies And Standards, And more!
Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
2023 Lieutenants Exam
  • 32 decks
  • 4552 flashcards
  • 24 learners
Decks: 2019 Emergency Medical Services, Respiratory Protection Program, Command Officer Operations, And more!
Make Flashcards