1/95
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
AAA
Authentication, Authorization, Accounting
MFA
Multi-Factor Authentication
SSO
Single Sign-On
LDAP
Lightweight Directory Access Protocol
SAML
Security Assertion Markup Language
OAuth
Open Authorization
OIDC
OpenID Connect
PAP
Password Authentication Protocol
CHAP
Challenge Handshake Authentication Protocol
TACACS+
Terminal Access Controller Access-Control System Plus
RADIUS
Remote Authentication Dial-In User Service
FIDO
Fast Identity Online
OTP
One-Time Password
HSM
Hardware Security Module
TCP
Transmission Control Protocol
UDP
User Datagram Protocol
IP
Internet Protocol
NAT
Network Address Translation
PAT
Port Address Translation
DNS
Domain Name System
DHCP
Dynamic Host Configuration Protocol
ARP
Address Resolution Protocol
ICMP
Internet Control Message Protocol
SNMP
Simple Network Management Protocol
SMB
Server Message Block
FTP
File Transfer Protocol
SFTP
Secure File Transfer Protocol
TFTP
Trivial File Transfer Protocol
HTTP
Hypertext Transfer Protocol
HTTPS
Hypertext Transfer Protocol Secure
NTP
Network Time Protocol
SSL
Secure Sockets Layer
TLS
Transport Layer Security
IPsec
Internet Protocol Security
ESP
Encapsulating Security Payload
AH
Authentication Header
SSH
Secure Shell
AES
Advanced Encryption Standard
DES
Data Encryption Standard
3DES
Triple DES
RSA
Rivest-Shamir-Adleman
ECC
Elliptic Curve Cryptography
PKI
Public Key Infrastructure
CA
Certificate Authority
CRL
Certificate Revocation List
OCSP
Online Certificate Status Protocol
PFS
Perfect Forward Secrecy
DoS
Denial of Service
DDoS
Distributed Denial of Service
MITM
Man-in-the-Middle
XSS
Cross-Site Scripting
SQLi
SQL Injection
CSRF
Cross-Site Request Forgery
RCE
Remote Code Execution
APT
Advanced Persistent Threat
RAT
Remote Access Trojan
BOT
Botnet Device
C2
Command and Control
Vishing
Voice Phishing
Smishing
SMS Phishing
IDS
Intrusion Detection System
IPS
Intrusion Prevention System
SIEM
Security Information and Event Management
SOAR
Security Orchestration, Automation, and Response
EDR
Endpoint Detection and Response
XDR
Extended Detection and Response
DLP
Data Loss Prevention
CASB
Cloud Access Security Broker
NGFW
Next-Generation Firewall
WAF
Web Application Firewall
NAC
Network Access Control
IaaS
Infrastructure as a Service
PaaS
Platform as a Service
SaaS
Software as a Service
VPC
Virtual Private Cloud
VPN
Virtual Private Network
SDN
Software-Defined Networking
SASE
Secure Access Service Edge
ZTNA
Zero Trust Network Access
CIA
Confidentiality, Integrity, Availability
GRC
Governance, Risk, Compliance
GDPR
General Data Protection Regulation
HIPAA
Health Insurance Portability and Accountability Act
PCI DSS
Payment Card Industry Data Security Standard
SOX
Sarbanes-Oxley Act
AUP
Acceptable Use Policy
SLA
Service Level Agreement
MOU
Memorandum of Understanding
NDA
Non-Disclosure Agreement
BIA
Business Impact Analysis
DRP
Disaster Recovery Plan
BCP
Business Continuity Plan
PUP
Potentially Unwanted Program
DLL
Dynamic Link Library
EXE
Executable File
MSI
Microsoft Installer