This class was created by Brainscape user Chad Wilson. Visit their profile to learn more about the creator.

Decks in this class (14)

Chapter 1 Defending Against Cybersecurity Threats
Weakness in a device system appli...,
A force outside an organization t...,
The relationship between threats ...
27  cards
Chapter 2 Reconnaissance and Intelligence Gathering
Syslog severity message immediate...,
Tool designed to gather emails do...,
Netstat flag for linux that shows...
35  cards
Chapter 3 Designing a Vulnerability Management Program
What is the function of health in...,
Governs how financial institution...,
Prescribes specific security cont...
24  cards
Chapter 4 Analyzing Vulnerability Scans
An industry standard for assessin...,
Describes how an attacker would e...,
Cvss access vector metricthe atta...
47  cards
Chapter 5 Building an Incident Response Program
Any observable occurrence on a ne...,
Any event that has negative conse...,
A violation or imminent threat of...
41  cards
Chapter 6 Analyzing Symptoms for Incident Response
Tool developed to monitor lans an...,
Gathers data about availability r...,
A tool that measures the maximum ...
28  cards
Chapter 7 Performing Forensic Analysis
Forensic toolkit design to allow ...,
Forensic toolkit provides the abi...,
Forensic toolkit ensures that dri...
37  cards
Chapter 8 Recovery and Post-Incident Response
Activities designed to isolate th...,
The network is connected to the f...,
The quarantine network connects d...
16  cards
Chapter 9 Policy and Compliance
Contains a series of documents de...,
Information security policy frame...,
High level statements of manageme...
53  cards
Chapter 10 Defense-in-Depth Security Architectures
Means each layer of security adds...,
Name the four design models used ...,
Layered security design provides ...
29  cards
Chapter 11 Identity and Access Management Security
Associated with an identity inclu...,
Create store and manage identity ...,
Provide information about systems...
49  cards
Chapter 12 Software Development Security
What phases appear in most softwa...,
Where initial investigations into...,
Customer input is sought to deter...
47  cards
Chapter 13 Cybersecurity Toolkit
Set of security mitigation capabi...,
Feature to prevent the execution ...,
Helps prevent buffer overflows at...
48  cards
NMAP Cheat Sheet
Tcp syn port scan default,
Tcp connect port scan default wit...,
Udp port scan
32  cards

More about
cysa+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Chad Wilson's CYSA+ flashcards for their Metro State University Denver class now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CySA+
  • 3 decks
  • 595 flashcards
  • 2 learners
Decks: Cysa, Ports, Final Tuning, And more!
CySA+ CS0-002 Test Dump
  • 4 decks
  • 201 flashcards
  • 94 learners
Decks: Part 1, Part 2, Part 3, And more!
CySa+ 002
  • 5 decks
  • 116 flashcards
  • 38 learners
Decks: Threat Vulnerability Management, Compliance Assessment, Incident Response, And more!
CySA+
  • 7 decks
  • 569 flashcards
  • 3 learners
Decks: Jasondion Practice Exam 5, Jasondion Practice Exam 4, Jasondion Practice Exam 3, And more!
Make Flashcards