CompTIA Study Materials
AWS Study Materials
AWS Certified Developer Associate AWS Certified Developer Associate
AWS Certified Developer Associate DVA-C02
AWS Certified Solutions Architect Associate AWS Certified Solutions Architect Associate
AWS Certified Solutions Architect Associate SAA-C03
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

CompTIA Security+ SY0-701 All Acronyms Flashcards

FrontBack
APAccess Point
COOPContinuity of Operation Planning
COPECorporate Owned, Personally Enabled
HDDHard Disk Drive
S/MIMESecure/Multipurpose Internet Mail Extensions
AAAAuthentication, Authorization, and Accounting
ISPInternet Service Provider
NATNetwork Address Translation
TKIPTemporal Key Integrity Protocol
CERTComputer Emergency Response Team
DBADatabase Administrator
OTAOver the Air
PTZPan-tilt-zoom
SASESecure Access Service Edge
SOAPSimple Object Access Protocol
DSLDigital Subscriber Line
KEKKey Encryption Key
URIUniform Resource Identifier
ARPAddress Resolution Protocol
FIMFile Integrity Management
HIDSHost-based Intrusion Detection System
NACNetwork Access Control
TOTPTime-based One-time Password
VLANVirtual Local Area Network
DKIMDomainKeys Identified Mail
PaaSPlatform as a Service
SNMPSimple Network Management Protocol
UATUser Acceptance Testing
BASHBourne Again Shell
MTBFMean Time Between Failures
PIVPersonal Identity Verification
AuthenticationProtocol
PCIDSS Payment Card Industry Data Security Standard
MD5Message Digest 5
MMSMultimedia Message Service
UDPUser Datagram Protocol
WOWork Order
XSRFCross-site Request Forgery
APIApplication Programming Interface
AVAntivirus
SOCSecurity Operations Center
SSLSecure Sockets Layer
TLSTransport Layer Security
ESPEncapsulated Security Payload
IaaSInfrastructure as a Service
SEHStructured Exception Handler
BIABusiness Impact Analysis
MBRMaster Boot Record
SPFSender Policy Framework
VDEVirtual Desktop Environment
CRCCyclical Redundancy Check
DEPData Execution Prevention
DLLDynamic Link Library
ESNElectronic Serial Number
HOTPHMAC-based One-time Password
IAMIdentity and Access Management
IRCInternet Relay Chat
STIXStructured Threat Information eXchange
PSKPre-shared Key
FTPFile Transfer Protocol
IMInstant Messaging
MTTRMean Time to Recover
SoCSystem on Chip
CIAConfidentiality, Integrity, Availability
DPOData Privacy Officer
DSADigital Signature Algorithm
HTTPSHypertext Transfer Protocol Secure
MSPManaged Service Provider
VLSMVariable Length Subnet Masking
WPAWi-Fi Protected Access
IDSIntrusion Detection System
IKEInternet Key Exchange
OIDObject Identifier
ACLAccess Control List
AHAuthentication Header
XMLExtensible Markup Language
IdPIdentity Provider
SEDSelf-encrypting Drives
ATT&CKAdversarial Tactics, Techniques, and Common Knowledge
EDREndpoint Detection and Response
IRIncident Response
MDMMobile Device Management
WIDSWireless Intrusion Detection System
CARCorrective Action Report
CBCCipher Block Chaining
OSINTOpen-source Intelligence
BPABusiness Partners Agreement
GPUGraphics Processing Unit
IDFIntermediate Distribution Frame
P12PKCS #12
ERPEnterprise Resource Planning
RIPEMDRACE Integrity Primitives Evaluation Message Digest
URLUniversal Resource Locator
WAFWeb Application Firewall
MACMessage Authentication Code
PUPPotentially Unwanted Program
DACDiscretionary Access Control
DoSDenial of Service
PEAPProtected Extensible Authentication Protocol
ASLRAddress Space Layout Randomization
HIPSHost-based Intrusion Prevention System
IoTInternet of Things
MANMetropolitan Area Network
PAPPassword Authentication Protocol
PBKDF2Password-based Key Derivation Function 2
SAMLSecurity Assertions Markup Language
GPSGlobal Positioning System
ICMPInternet Control Message Protocol
RFIDRadio Frequency Identifier
SRTPSecure Real-Time Protocol
SSOSingle Sign-on
CSRCertificate Signing Request
NIPSNetwork-based Intrusion Prevention System
PAMPluggable Authentication Modules
AIArtificial Intelligence
HVACHeating, Ventilation Air Conditioning
POTSPlain Old Telephone Service
TPMTrusted Platform Module
UPSUninterruptable Power Supply
UTMUnified Threat Management
RBACRule-based Access Control
CTMCounter Mode
GCMGalois Counter Mode
NISTNational Institute of Standards & Technology
BYODBring Your Own Device
UAVUnmanned Aerial Vehicle
CVECommon Vulnerability Enumeration
DLPData Loss Prevention
LANLocal Area Network
OAUTHOpen Authorization
SQLStructured Query Language
WTLSWireless TLS
CIOChief Information Officer
UEFIUnified Extensible Firmware Interface
WPSWi-Fi Protected Setup
IPInternet Protocol
MFPMultifunction Printer
P2PPeer to Peer
AES-256Advanced Encryption Standards 256-bit
FDEFull Disk Encryption
GREGeneric Routing Encapsulation
MPLSMulti-protocol Label Switching
MOUMemorandum of Understanding
SANSubject Alternative Name
SMSShort Message Service
OCSPOnline Certificate Status Protocol
CSRFCross-site Request Forgery
ECDSAElliptic Curve Digital Signature Algorithm
SMTPSimple Mail Transfer Protocol
APTAdvanced Persistent Threat
POPPost Office Protocol
AISAutomated Indicator Sharing
L2TPLayer 2 Tunneling Protocol
TGTTicket Granting Ticket
CYODChoose Your Own Device
GDPRGeneral Data Protection Regulation
GPOGroup Policy Object
LEAPLightweight Extensible Authentication Protocol
PKIPublic Key Infrastructure
RDPRemote Desktop Protocol
XSSCross-site Scripting
DMARCDomain Message Authentication Reporting and Conformance
FACLFile System Access Control List
PDUPower Distribution Unit
SHTTPSecure Hypertext Transfer Protocol
WIPSWireless Intrusion Prevention System
AUPAcceptable Use Policy
IaCInfrastructure as Code
IVInitialization Vector
OTOperational Technology
VPNVirtual Private Network
ECCElliptic Curve Cryptography
NGFWNext-generation Firewall
MSAMaster Service Agreement
RC4Rivest Cipher version 4
RTOSReal-time Operating System
TCP/IPTransmission Control Protocol/Internet Protocol
CHAPChallenge Handshake Authentication Protocol
ICSIndustrial Control Systems
ISOInternational Standards Organization
NTPNetwork Time Protocol
RARegistration Authority
ECDHEElliptic Curve Diffie-Hellman Ephemeral
MTUMaximum Transmission Unit
NFCNear Field Communication
CPContingency Planning
DNSDomain Name System
SLAService-level Agreement
DESDigital Encryption Standard
FPGAField Programmable Gate Array
ISSOInformation Systems Security Officer
RPORecovery Point Objective
VTCVideo Teleconferencing
CMSContent Management System
MDFMain Distribution Frame
PEMPrivacy Enhanced Mail
VBAVisual Basic
CAPTCHACompletely Automated Public Turing Test to Tell Computers and Humans Apart
CFBCipher Feedback
PHIPersonal Health Information
VMVirtual Machine
CCMPCounter Mode/CBC-MAC Protocol
SDLCSoftware Development Lifecycle
IEEEInstitute of Electrical and Electronics Engineers
RADIUSRemote Authentication Dial-in User Service
SDKSoftware Development Kit
MaaSMonitoring as a Service
RSARivest, Shamir, & Adleman
TTPTactics, Techniques, and Procedures
PPPPoint-to-Point Protocol
VPCVirtual Private Cloud
CSUChannel Service Unit
PATPort Address Translation
TACACS+Terminal Access Controller Access Control System
AROAnnualized Rate of Occurrence
ECBElectronic Code Book
PGPPretty Good Privacy
CIRTComputer Incident Response Team
EFSEncrypted File System
FRRFalse Rejection Rate
HAHigh Availability
HTMLHypertext Markup Language
PEDPersonal Electronic Device
PIIPersonally Identifiable Information
SDNSoftware-defined Networking
FTPSSecured File Transfer Protocol
PPTPPoint-to-Point Tunneling Protocol
TOCTime-of-check
UTPUnshielded Twisted Pair
ALEAnnualized Loss Expectancy
BIOSBasic Input/Output System
CTOChief Technology Officer
CVSSCommon Vulnerability Scoring System
HTTPHypertext Transfer Protocol
MFDMultifunction Device
NTFSNew Technology File System
SDLMSoftware Development Lifecycle Methodology
CCTVClosed-circuit Television
DHEDiffie-Hellman Ephemeral
NDANon-disclosure Agreement
OSPFOpen Shortest Path First
PFSPerfect Forward Secrecy
SCADASupervisory Control and Data Acquisition
MOAMemorandum of Agreement
SCEPSimple Certificate Enrollment Protocol
BGPBorder Gateway Protocol
LDAPLightweight Directory Access Protocol
NTLMNew Technology LAN Manager
PCAPPacket Capture
SaaSSoftware as a Service
SPIMSpam over Internet Messaging
VDIVirtual Desktop Infrastructure
BCPBusiness Continuity Planning
MLMachine Learning
RTORecovery Time Objective
RTPReal-time Transport Protocol
SSDSolid State Drive
BPDUBridge Protocol Data Unit
MTTFMean Time to Failure
IMAPInternet Message Access Protocol
RACEResearch and Development in Advanced Communications Technologies in Europe
WEPWired Equivalent Privacy
EAPExtensible Authentication Protocol
IoCIndicators of Compromise
KDCKey Distribution Center
SAESimultaneous Authentication of Equals
IRPIncident Response Plan
RAIDRedundant Array of Inexpensive Disks
VoIPVoice over IP
PBXPrivate Branch Exchange
TSIGTransaction Signature
USBOTG USB On the Go
IPSIntrusion Prevention System
MSCHAPMicrosoft Challenge Handshake
CACertificate Authority
PACProxy Auto Configuration
SMTPSSimple Mail Transfer Protocol Secure
SWGSecure Web Gateway
WAPWireless Access Point
GPGGnu Privacy Guard
SD-WANSoftware-defined Wide Area Network
SSHSecure Shell
CSOChief Security Officer
RASRemote Access Server
RTBHRemotely Triggered Black Hole
XDRExtended Detection and Response
NIDSNetwork-based Intrusion Detection System
SIMSubscriber Identity Module
UEMUnified Endpoint Management
DNATDestination Network Address Translation
AESAdvanced Encryption Standard
SELinux Security-enhanced Linux
SHASecure Hashing Algorithm
SFTPSecured File Transfer Protocol
SLESingle Loss Expectancy
CRLCertificate Revocation List
HSMHardware Security Module
RATRemote Access Trojan
HMACHashed Message Authentication Code
RADRapid Application Development
SOARSecurity Orchestration, Automation, Response
MSSPManaged Security Service Provider
DHCPDynamic Host Configuration Protocol
MFAMultifactor Authentication
OVALOpen Vulnerability Assessment Language
SOWStatement of Work
SQLiSQL Injection
TOUTime-of-use
IPSecInternet Protocol Security
CSPCloud Service Provider
DDoSDistributed Denial of Service
PKCSPublic Key Cryptography Standards
DRPDisaster Recovery Plan
IDEAInternational Data Encryption Algorithm
OSOperating System
SIEMSecurity Information and Event Management
TAXIITrusted Automated eXchange of Indicator Information
CASBCloud Access Security Broker
ROIReturn on Investment
SCAPSecurity Content Automation Protocol
XORExclusive Or