Cybersecurity Bootcamp Study Aid

This class was created by Brainscape user Ari Feldman. Visit their profile to learn more about the creator.

Decks in this class (55)

1.1_ Cybersecurity Mindset
Defining Cybersecurity Defining Attack Strategies Website Attacks Server Attacks Database Attacks NIST Cybersecurity Framework
18  cards
1.2_ Surveying Cyberspace
What is the cia triad 1,
The quality of being able to be u...,
What are some examples of availab...
20  cards
1.3_ Certifications and Security+
What are some jobs that may requi...,
As of december 2019 what was the ...,
How many topics are in the secuir...
33  cards
2.1_The Security Organization - GRC
What are the 5 areas of security ...,
Security operations will interact...,
Security concerns vs business con...
31  cards
2.2_ Risk Management and Threat Modeling
What s the difference between a v...,
A _________ is an aspect of a bus...,
A _________ is an actor that migh...
37  cards
2.3 Governance, Risk, and Compliance III
Codifying and enforcing proper be...,
Enforcing the policies in order t...,
A __________ is a rule that defin...
23  cards
3.1 How Sweet is Terminal
We are used to ______________ wit...,
Using the command line is a criti...,
Virtual machines are programs tha...
23  cards
3.2 Commanding the Command Line
You can use the command ls s to l...,
What does this command do 2,
It and security professionals can...
26  cards
3.3 Sticking to the Script
Multiple text processing commands...,
Using text manipulation commands ...,
Sed stands for __________ 3
15  cards
4.1 Introduction to Linux
Over 70 of websites run some kind...,
____________ are special purpose ...,
These command line only machines ...
17  cards
4.2 Access Controls
A _______is a cryptographic funct...,
How do password hashes work 2,
_________ allows us to change the...
15  cards
4.3 Special Permissions and Managing Services
Linux categorizes files programs ...,
Managing access controls in linux 2,
For each of these categories ther...
21  cards
5.1 Backups and tar
There are three different types o...,
The _____ command is a linux util...,
_______ is the industry standard ...
13  cards
5.2 Cron and Scheduled Jobs
A _________ is a script or comman...,
What is a daemon 2,
What is cron 3
20  cards
5.3 Monitoring Log Files
What are the three aspects to pro...,
When we properly manage our logs ...,
Linux stores all log files in a c...
23  cards
6.1 Combining Commands
A ________ is several commands th...,
What are the three components of ...,
Compound commands typically follo...
28  cards
6.2 Ifs and Lists
Explain this if syntax 1,
Explain this if syntax 2,
Explain this else syntax 3
18  cards
7.1 Introduction to Windows
While many it professionals prefe...,
_________ is one of the most impo...,
True or false command prompt uses...
33  cards
7.2 Powershell Scripting
What s the diffrence between cmd ...,
Powershell in cyber security 2,
What is powershell 3
13  cards
7.3 Active Directory Domain Services
What is active directory domain s...,
What is active directory domain s...,
What is the most used authenticat...
4  cards
8.1 Introduction to Networking
What is a computer network 1,
The ___________ model is a networ...,
Client server model this two way ...
53  cards
8.2 Ports, Protocols, and the OSI Mode
Networks use __________ to ensure...,
Pap is used for ______________ 2,
Smb is a windows based protocol f...
43  cards
8.3 Following Data Through Layers 2, 3, and 4
Both hackers and security pros wi...,
Footprinting can yield what infor...,
Data is routed via switches to a ...
45  cards
9.1 IP and Protocols
What does dhcp stand for and what...,
True or false dhcp is dynamic bec...,
True or false dhcp is a layer 7 a...
33  cards
9.2 Email Networks and Security
True or false domain name systems...,
What is a record 2,
All the records for a particular ...
28  cards
Networking Review
What does http stand for 1,
What is the port number for http ...,
What types of services does http ...
37  cards
Networking Review II
Explain in simple terms what is t...,
What type of attack is this 2,
What is the mac address of the go...
19  cards
10.1 Intro to Cryptography
Define cryptography 1,
Define 2,
Ciphertext 3
33  cards
10.2 Asymmetric Encryption and Hashing
What is the disadvantages with sy...,
Gpg is a command line tool used t...,
__________ is a cryptographic met...
16  cards
10.3 Applied Cryptography and Attacks
Encryption can be used to secure ...,
True or false emails are natively...,
Programs like ____ and ____ can a...
22  cards
11.1 Introduction to Firewalls and Network Security
Security professionals use the co...,
What are the seven basic layers o...,
The _______ is an intelligence dr...
41  cards
11.2 Intrusion Detection, Snort, and Network Security Monitoring
An ______ both analyzes traffic a...,
An ids is like a ______ that read...,
What is the world s most popular ...
59  cards
11.3 Enterprise Security Management
An intrusion detection system ids...,
Enterprise security monitoring es...,
True or false firewalls and nsms ...
9  cards
12.1 Intro to Cloud Computing
Before the cloud orgs setup netwo...,
Key term complex architecture 2,
Key term extensive management 3
14  cards
12.2 Cloud System Management
________ ______ and _______are ne...,
_______ can be thought of as ligh...,
_______ are tools that automatica...
32  cards
12.3 Load Balancing and Redundancy
_________ and _________ need to u...,
What does a cloud architect do 2,
What is devsecops responsible for 3
10  cards
13_ Project Week ELK Stack
What does elk stack stand for 1,
Why is the elk stack so popular 2,
The elk stack works by storing lo...
7  cards
14.1 HTTP with Session and Cookies
Securing the web requires in dept...,
The client server model is an exc...,
Clients and servers use the _____...
56  cards
14.2 Microservices and Container Security
What are the components of a typi...,
Explain how information flows bet...,
Monolith to microservices what is...
33  cards
15.1 Introduction to Web Vulnerabilities and Hardening
The cyber kill chain is an ______...,
The _______ chain has been adapte...,
The ________ is widely considered...
68  cards
15.2 Exploitation and Mitigation
What is the top web vulnerability...,
What does sql stand for 2,
What does sqli refer to 3
33  cards
15.3 Broken Authentication and Session Management
What is validation bypass 1,
What can attackers do by using va...,
Security code analysis tools and ...
18  cards
16.1 Introduction to Pen Testing and Open Source Intelligence
What is pen testing 1,
Why do organizations hire pentest...,
A penetration test is often refer...
22  cards
16.2 Student Guide: Network Discovery and Vulnerability
What are the 5 phases of engageme...,
______ and ______ are essential t...,
Network discovery and vulnerabili...
29  cards
16.3 Exploiting Vulnerabilities
Shellshock is a _________ vulnera...,
With shellshock attackers can per...,
Shellshock is made possible by a ...
39  cards
Nmap and Scanning Review Quiz
Which type of hacker is considere...,
What is the main difference betwe...,
Which type of testing takes place...
29  cards
17.1 Introduction to Metasploit
Like shellshock _______ was a maj...,
What are the following ways heart...,
How does the cve officially refer...
18  cards
17.2 Post-Exploitation with Meterpreter
After successful exploitation in ...,
C2 is a general term for what 2,
Using ncat what is the command to...
24  cards
17.3 Custom Payloads with msfvenom
What are payloads 1,
What do attackers build custom pa...,
Custom payloads allow customizati...
10  cards
18.1 Introduction to SIEM
Organizations detect attacks agai...,
Explain iscm iscm provides real t...,
While log entries were originally...
15  cards
18.2 Splunk Searches
Organizations use ___________ to ...,
Organizations use _____ that cont...,
Splunk can be used for these addi...
5  cards
18.3 Splunk Reports and Alerts
What are the three primary method...,
What is splunk s primray feature 2,
Splunk uses ______ search 3
7  cards
19.1 Splunk Dashboards and Visualizations
Splunk uses the _______ feature t...,
The eval command is used to _____...,
Designing poor alerts can cause t...
8  cards
19.2 Splunk Enterprise Security
While siem products such as splun...,
The most popular advancements in ...,
______ is a security monitoring t...
3  cards
21.1 Introduction to Digital Forensics
Digital forensics professionals m...,
________ is a field dedicated to ...,
What does computer forensics inve...
9  cards

More about
Cybersecurity Bootcamp Study Aid

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Ari Feldman's Cybersecurity Bootcamp Study Aid flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Coding Bootcamp
  • 30 decks
  • 516 flashcards
  • 115 learners
Decks: Pre Work, Intro To Programming, Algorithm App, And more!
Cyber Security
  • 19 decks
  • 2738 flashcards
  • 121 learners
Decks: Security Risk Management Srm, Security Assessment And Testing Ant, Software Development Security Dev, And more!
*First Aid in Brainscape*
  • 37 decks
  • 5059 flashcards
  • 143 learners
Decks: Aaw Immunology, Aaw Heme Onc, Aaw Respiratory, And more!
Make Flashcards