CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

CompTIA CySA+ CS0-003 All Acronyms Flashcards

FrontBack
NTPNetwork Time Protocol
SFTPSecure File Transfer Protocol
TCPTransmission Control Protocol
C2Command and Control
HTTPHypertext Transfer Protocol
SLAService-level Agreement
VLANVirtual LAN
GPOGroup Policy Objects
IRIncident Response
URLUniform Resource Locator
WAFWeb Application Firewall
CISCenter for Internet Security
XSSCross-site Scripting
AVAntivirus
OpenVASOpen Vulnerability Assessment Scanner
SNMPSimple Network Management Protocol
SSLSecure Sockets Layer
DDoSDistributed Denial of Service
DoSDenial of Service
UEBAUser and Entity Behavior Analytics
IoCIndicators of Compromise
XXEXML External Entity
LOILetter of Intent
NACNetwork Access Control
URIUniform Resource Identifier
SOARSecurity Orchestration, Automation, and Response
APIApplication Programming Interface
HIPSHost-based Intrusion Prevention System
OTOperational Technology
FTPFile Transfer Protocol
ISOInternational Organization for Standardization
RXSSReflected Cross-site Scripting
ZAPZed Attack Proxy
MFAMultifactor Authentication
ACLAccess Control List
KPIKey Performance Indicator
RDPRemote Desktop Protocol
STIXStructured Threat Information Expression
DKIMDomain Keys Identified Mail
POCProof of Concept
MSPManaged Service Provider
HTTPSHypertext Transfer Protocol Secure
FIMFile Integrity Monitoring
OSSTMMOpen Source Security Testing Methodology Manual
SPFSender Policy Framework
OSOperating System
SSOSingle Sign-on
TLSTransport Layer Security
APTAdvanced Persistent Threat
CVECommon Vulnerabilities and Exposures
XDRExtended Detection Response
CACertificate Authority
ICSIndustrial Control Systems
CHDCardholder Data
MOUMemorandum of Understanding
OWASPOpen Web Application Security Project
SIEMSecurity Information and Event Management
PIDProcess Identifier
RESTRepresentational State Transfer
XMLExtensible Markup Language
IDSIntrusion Detection System
VPNVirtual Private Network
DNSDomain Name Service
SDNSoftware-defined Networking
BGPBorder Gateway Protocol
ITILInformation Technology Infrastructure Library
DMARCDomain-based Message Authentication, Reporting, and Conformance
LANLocal Area Network
LFILocal File Inclusion
PCI DSSPayment Card Industry Data Security Standard
PLCProgrammable Logic Controller
CERTComputer Emergency Response Team
PKIPublic Key Infrastructure
MSFMetasploit Framework
PAMPrivileged Access Management
BIABusiness Impact Analysis
SMTPSimple Mail Transfer Protocol
SaaSSoftware as a Service
ARPAddress Resolution Protocol
NIDSNetwork-based Intrusion Detection System
SLOService-level Objective
TTPTactics, Techniques, and Procedures
MACMedia Access Control
MTTRMean Time to Repair
SDLCSoftware Development Life Cycle
CVSSCommon Vulnerability Scoring System
CI/CDContinuous Integration and Continuous Delivery
SAMLSecurity Assertion Markup Language
VMVirtual Machine
SSRFServer-side Request Forgery
CDNContent Delivery Network
PIIPersonally Identifiable Information
MTTDMean Time to Detect
WANWide Area Network
BCPBusiness Continuity Plan
GDBGNU Debugger
COBITControl Objectives for Information and Related Technologies
JSONJavaScript Object Notation
USBUniversal Serial Bus
BCBusiness Continuity
EDREndpoint Detection and Response
IPSIntrusion Prevention System
SQLStructured Query Languge
HIDSHost-based Intrusion Detection System
SWGSecure Web Gateway
LDAPSLightweight Directory Access Protocol
TFTPTrivial File Transfer Protocol
DRDisaster Recovery
NDANon-disclosure Agreement
ICMPInternet Control Message Protocol
SCADASupervisory Control and Data Acquisition
MSSPManaged Security Service Provider
ZTNAZero Trust Network Access
IaaSInfrastructure as a Service
SMBServer Message Block
CASBCloud Access Security Broker
RFIRemote File Inclusion
DLPData Loss Prevention
IPInternet Protocol
CSRFCross-site Request Forgery
ITInformation Technology
NGFWNext-generation Firewall
PHPHypertext Preprocessor
SOCSecurity Operations Center
TRACETrade Reporting and Compliance Engine
CSIRTCybersecurity Incident Response Team
RCERemote Code Execution
SASESecure Access Secure Edge