This class was created by Brainscape user Mousa Basaleh. Visit their profile to learn more about the creator.

Decks in this class (37)

Fundamentals of Security
1.1 - Compare and contrast various types of security controls 1.2 - Summarize fundamental security concepts
72  cards
Threat Actors
1.2 - Summarize fundamental security concepts 2.1 - Compare and contrast common threat actors and motivations 2.2 - Explain common threat vectors and attack surfaces
66  cards
Physical Security
1.2 - Summarize fundamental security concepts 2.4 - Analyze indicators of malicious activity
45  cards
Social Engineering
2.2 - Explain common threat vectors and attack surfaces 5.6 - Given a scenario, you must be able to implement security awareness practices
56  cards
Malware
Given a scenario, analyze indicators of malicious activity
71  cards
Data Protection
1.4 - Explain the importance of using appropriate cryptographic solutions 3.3 - Compare and contrast concepts and strategies to protect data 4.2 - Explain the security implications of proper hardware, software, and data asset management 4.4 - Explain security alerting and monitoring concepts and tools 5.1 - Summarize elements of effective security governance
50  cards
Cryptographic Solutions
1.4 - Explain the importance of using appropriate cryptographic solutions 2.3 - Explain various types of vulnerabilities 2.4 - Given a scenario, you must be able to analyze indicators of malicious activity
156  cards
Risk Management
5.2: Explain elements of the risk management process
72  cards
Third-party Vendor Risks
2.2 - Explain common threat vectors and attack surfaces 2.3 - Explain various types of vulnerabilities 5.3 - Explain the processes associated with third-party risk assessment and management
60  cards
Governance and Compliance
5.1 - Summarize elements of effective security governance 5.4 - Summarize elements of effective security compliance
104  cards
Asset and Change Management
1.3 - Explain the importance of change management processes and the impact to security 4.1 - Given a scenario, you must be able to apply common security techniques to computing resources 4.2 - Explain the security implications of proper hardware, software, and data asset management
39  cards
Audits and Assessments
5.5: Explain types and purposes of audits and assessments
39  cards
Cyber Resilience and Redundancy
3.4: Explain the importance of resilience and recovery in security architecture
53  cards
Security Architecture
3.1 - Compare and contrast security implications of different architecture models 4.1 - Given a scenario, apply common security techniques to computing resources
84  cards
Ports
Port 3389 1,
Port 53 2,
Port 514 3
29  cards
Security Infrastructure
- Given a scenario, you must be able to apply security principles to secure enterprise architecture - Given a scenario, you must be able to modify enterprise capabilities to enhance security
134  cards
Book-Notes Section 3
Stix xml oasis html taxii in the ...,
What is threat intelligence 2,
Gathering data from firewalls and...
18  cards
Identity and Access Management (IAM) Solutions
- Given a scenario, you must be able to analyze indicators of malicious activity - Given a scenario, you must be able to implement and maintain identity and access management
79  cards
Vulnerabilities and Attacks
● 2.2: Explain common threat vectors and attack strategies ● 2.3: Explain various types of vulnerabilities ● 2.4: Given a scenario, you must be able to analyze indicators of malicious activity ● 2.5: Explain the purpose of mitigation techniques used to secure the enterprise ● 4.1: Given a scenario, you must be able to apply common security techniques to computing resources
101  cards
Malicious Activity
2.4: Given a scenario, you must be able to analyze indicators of malicious activity
80  cards
Hardening
Objectives: ● 2.5 - Explain the purpose of mitigation techniques used to secure the enterprise ● 4.1 - Given a scenario, you must be able to apply common security techniques to computing resources ● 4.5 - Given a scenario, you must be able to modify enterprise capabilities to enhance security
60  cards
Security Techniques
● 4.1 - Given a scenario, you must be able to apply common security techniques to computing resources ● 4.5 - Given a scenario, you must be able to modify enterprise capabilities to enhance security
64  cards
Vulnerability Management
Objective 4.3: Explain various activities associated with vulnerability management
52  cards
Alerting and Monitoring
Objective 4.4: Explain security alerting and monitoring concepts and tools
76  cards
Incident Response
Objective 4.8: Explain appropriate incident response activities
60  cards
Investigating an Incident
Objective 4.9: Given a scenario, you must be able to use data sources to support an investigation
89  cards
Automation and Orchestration
Objective 4.7: Explain the importance of automation and orchestration related to secure operations
79  cards
Security Awareness
Objective 5.6: Given a scenario, you must be able to implement security awareness practices
37  cards
Book-Notes Section 4
What does the hosts file do 1,
What s pharming attack 2,
Does manipulating dns record the ...
3  cards
Book-Notes Section 5
What s the difference between plu...,
What is a credentialed scan 2,
What s the difference between cre...
17  cards
Exam Prep NOTES
Simple explanation of environment...,
Key risk indicators kris 2,
Example of data management platfo...
11  cards
Book-Notes Section 6
What s unit testing that happens ...,
What is user acceptance testing u...,
What is qa quality assurance in s...
15  cards
Book-Notes Section 7
Difference between out of band an...,
What is a 512 bit block size 2,
What is hmac in simple terms 3
11  cards
Book-Notes Section 8
What are ssh keys in the context ...,
Are ssh keys different from publi...,
Does the server take the private ...
13  cards
Book-Notes Section 9
Difference between incremental an...,
What is deduplication in the cont...,
Main difference between images an...
18  cards
Book-Notes Section 10
What is a serverless computing en...,
What s the difference between clo...,
What s the difference between sdn...
9  cards
Book-Notes Section 11
What is a bootloader 1,
What s the difference between sec...,
Secure boot process step by step 3
10  cards

More about
CompTIA Security +

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Mousa Basaleh's CompTIA Security + flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ (SY0-601)
  • 35 decks
  • 745 flashcards
  • 2143 learners
Decks: Security Overview, Malware, Malware Infections, And more!
CompTIA A+
  • 28 decks
  • 3865 flashcards
  • 728 learners
Decks: Chapter 1 Mobile Devices Mc, Chapter 1 Mobile Devices, Chapter 1 Mobile Devices Key Terms, And more!
Security +
  • 26 decks
  • 1501 flashcards
  • 242 learners
Decks: Deck A, Deck B, Deck C, And more!
Make Flashcards