CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

CompTIA CySA+ CS0-003 All Acronyms Flashcards

FrontBack
HIDSHost-based Intrusion Detection System
PIIPersonally Identifiable Information
DDoSDistributed Denial of Service
HIPSHost-based Intrusion Prevention System
PHPHypertext Preprocessor
PIDProcess Identifier
SDLCSoftware Development Life Cycle
LFILocal File Inclusion
XXEXML External Entity
URIUniform Resource Identifier
ARPAddress Resolution Protocol
IRIncident Response
OSSTMMOpen Source Security Testing Methodology Manual
APIApplication Programming Interface
ACLAccess Control List
HTTPSHypertext Transfer Protocol Secure
IaaSInfrastructure as a Service
XSSCross-site Scripting
CSRFCross-site Request Forgery
IDSIntrusion Detection System
OSOperating System
APTAdvanced Persistent Threat
CDNContent Delivery Network
CERTComputer Emergency Response Team
BIABusiness Impact Analysis
XDRExtended Detection Response
IPSIntrusion Prevention System
ICMPInternet Control Message Protocol
LANLocal Area Network
RCERemote Code Execution
SaaSSoftware as a Service
TRACETrade Reporting and Compliance Engine
VPNVirtual Private Network
CASBCloud Access Security Broker
CI/CDContinuous Integration and Continuous Delivery
NIDSNetwork-based Intrusion Detection System
IPInternet Protocol
JSONJavaScript Object Notation
NTPNetwork Time Protocol
PKIPublic Key Infrastructure
FTPFile Transfer Protocol
SLAService-level Agreement
COBITControl Objectives for Information and Related Technologies
UEBAUser and Entity Behavior Analytics
PCI DSSPayment Card Industry Data Security Standard
RXSSReflected Cross-site Scripting
ITILInformation Technology Infrastructure Library
SPFSender Policy Framework
VLANVirtual LAN
SOCSecurity Operations Center
CSIRTCybersecurity Incident Response Team
SFTPSecure File Transfer Protocol
MTTRMean Time to Repair
SIEMSecurity Information and Event Management
DNSDomain Name Service
KPIKey Performance Indicator
TCPTransmission Control Protocol
MACMedia Access Control
MOUMemorandum of Understanding
MSFMetasploit Framework
MTTDMean Time to Detect
DKIMDomain Keys Identified Mail
OTOperational Technology
SQLStructured Query Languge
URLUniform Resource Locator
WAFWeb Application Firewall
STIXStructured Threat Information Expression
TLSTransport Layer Security
NACNetwork Access Control
NDANon-disclosure Agreement
FIMFile Integrity Monitoring
SSOSingle Sign-on
CHDCardholder Data
OWASPOpen Web Application Security Project
PAMPrivileged Access Management
GPOGroup Policy Objects
DLPData Loss Prevention
ICSIndustrial Control Systems
ISOInternational Organization for Standardization
GDBGNU Debugger
ITInformation Technology
MSSPManaged Security Service Provider
SCADASupervisory Control and Data Acquisition
HTTPHypertext Transfer Protocol
SAMLSecurity Assertion Markup Language
LDAPSLightweight Directory Access Protocol
POCProof of Concept
SDNSoftware-defined Networking
RFIRemote File Inclusion
ZAPZed Attack Proxy
MFAMultifactor Authentication
NGFWNext-generation Firewall
VMVirtual Machine
CVSSCommon Vulnerability Scoring System
C2Command and Control
LOILetter of Intent
RESTRepresentational State Transfer
SMBServer Message Block
SWGSecure Web Gateway
TTPTactics, Techniques, and Procedures
ZTNAZero Trust Network Access
DoSDenial of Service
DMARCDomain-based Message Authentication, Reporting, and Conformance
TFTPTrivial File Transfer Protocol
WANWide Area Network
CISCenter for Internet Security
DRDisaster Recovery
BCPBusiness Continuity Plan
EDREndpoint Detection and Response
AVAntivirus
IoCIndicators of Compromise
SMTPSimple Mail Transfer Protocol
SLOService-level Objective
SNMPSimple Network Management Protocol
SASESecure Access Secure Edge
SSLSecure Sockets Layer
SSRFServer-side Request Forgery
SOARSecurity Orchestration, Automation, and Response
BCBusiness Continuity
BGPBorder Gateway Protocol
OpenVASOpen Vulnerability Assessment Scanner
PLCProgrammable Logic Controller
XMLExtensible Markup Language
MSPManaged Service Provider
CACertificate Authority
RDPRemote Desktop Protocol
USBUniversal Serial Bus
CVECommon Vulnerabilities and Exposures