CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

CompTIA CySA+ CS0-003 All Acronyms Flashcards

CDNContent Delivery Network
FTPFile Transfer Protocol
MTTDMean Time to Detect
MSFMetasploit Framework
OSOperating System
DMARCDomain-based Message Authentication, Reporting, and Conformance
MACMedia Access Control
SPFSender Policy Framework
IDSIntrusion Detection System
MSPManaged Service Provider
TLSTransport Layer Security
APIApplication Programming Interface
IoCIndicators of Compromise
GDBGNU Debugger
HIPSHost-based Intrusion Prevention System
SDNSoftware-defined Networking
SIEMSecurity Information and Event Management
BCPBusiness Continuity Plan
STIXStructured Threat Information Expression
ACLAccess Control List
PKIPublic Key Infrastructure
ISOInternational Organization for Standardization
IRIncident Response
XSSCross-site Scripting
SAMLSecurity Assertion Markup Language
SWGSecure Web Gateway
ZTNAZero Trust Network Access
HTTPSHypertext Transfer Protocol Secure
C2Command and Control
MFAMultifactor Authentication
COBITControl Objectives for Information and Related Technologies
OSSTMMOpen Source Security Testing Methodology Manual
OWASPOpen Web Application Security Project
UEBAUser and Entity Behavior Analytics
NIDSNetwork-based Intrusion Detection System
OpenVASOpen Vulnerability Assessment Scanner
SQLStructured Query Languge
BGPBorder Gateway Protocol
TRACETrade Reporting and Compliance Engine
NDANon-disclosure Agreement
MTTRMean Time to Repair
NTPNetwork Time Protocol
CI/CDContinuous Integration and Continuous Delivery
CVECommon Vulnerabilities and Exposures
IPSIntrusion Prevention System
SOARSecurity Orchestration, Automation, and Response
ITILInformation Technology Infrastructure Library
ICSIndustrial Control Systems
USBUniversal Serial Bus
DDoSDistributed Denial of Service
VMVirtual Machine
RESTRepresentational State Transfer
SSOSingle Sign-on
HIDSHost-based Intrusion Detection System
IPInternet Protocol
PLCProgrammable Logic Controller
RFIRemote File Inclusion
LOILetter of Intent
NACNetwork Access Control
RDPRemote Desktop Protocol
SLAService-level Agreement
SFTPSecure File Transfer Protocol
CHDCardholder Data
LANLocal Area Network
URLUniform Resource Locator
APTAdvanced Persistent Threat
SCADASupervisory Control and Data Acquisition
ZAPZed Attack Proxy
SOCSecurity Operations Center
XDRExtended Detection Response
CVSSCommon Vulnerability Scoring System
RCERemote Code Execution
TCPTransmission Control Protocol
SMBServer Message Block
PHPHypertext Preprocessor
SSRFServer-side Request Forgery
MOUMemorandum of Understanding
SDLCSoftware Development Life Cycle
CISCenter for Internet Security
IaaSInfrastructure as a Service
XXEXML External Entity
RXSSReflected Cross-site Scripting
URIUniform Resource Identifier
WANWide Area Network
XMLExtensible Markup Language
EDREndpoint Detection and Response
CSRFCross-site Request Forgery
TFTPTrivial File Transfer Protocol
GPOGroup Policy Objects
ARPAddress Resolution Protocol
LFILocal File Inclusion
DKIMDomain Keys Identified Mail
SSLSecure Sockets Layer
PCI DSSPayment Card Industry Data Security Standard
PIDProcess Identifier
SNMPSimple Network Management Protocol
BIABusiness Impact Analysis
PAMPrivileged Access Management
VPNVirtual Private Network
HTTPHypertext Transfer Protocol
ICMPInternet Control Message Protocol
JSONJavaScript Object Notation
ITInformation Technology
WAFWeb Application Firewall
KPIKey Performance Indicator
CACertificate Authority
CASBCloud Access Security Broker
FIMFile Integrity Monitoring
PIIPersonally Identifiable Information
NGFWNext-generation Firewall
DNSDomain Name Service
SaaSSoftware as a Service
TTPTactics, Techniques, and Procedures
CERTComputer Emergency Response Team
LDAPSLightweight Directory Access Protocol
POCProof of Concept
BCBusiness Continuity
MSSPManaged Security Service Provider
DoSDenial of Service
DLPData Loss Prevention
SMTPSimple Mail Transfer Protocol
DRDisaster Recovery
OTOperational Technology
SASESecure Access Secure Edge
SLOService-level Objective
CSIRTCybersecurity Incident Response Team