CyberCertPrep
HomeBookmarksAnalyticsLeaderboardGlossarySettings
Sign In
CyberCertPrep

Disclaimer: This app is an independent study tool. It is not affiliated with or endorsed by EC-Council, ISC², CompTIA, ISACA, or OffSec. All certification names are trademarks of their respective owners.

Platform

PricingLeaderboardAnalyticsBlogGlossary

Resources

Android AppPrivacy PolicyTerms of Service

Contact

support@cybercertprep.comadmin@cybercertprep.com

© 2026 CyberCertPrep. All certification names are trademarks of their respective owners.

50+ Certifications · 99,000+ Questions

Learning Tool

Cybersecurity Glossary

essential terms explained

All (72)Access Control (9)Application Security (5)Cloud Security (5)Cryptography (7)Forensics (4)Fundamentals (10)GRC (9)Network Security (9)Threats & Attacks (14)

Access Control9 terms

Access Control List (ACL)
Authentication
Authorization
Multi-Factor Authentication (MFA)
Single Sign-On (SSO)
Zero Trust
Privilege Escalation
Least Privilege
Role-Based Access Control (RBAC)

Application Security5 terms

OWASP
SAST (Static Application Security Testing)
DAST (Dynamic Application Security Testing)
DevSecOps
CSRF (Cross-Site Request Forgery)

Cloud Security5 terms

Cloud Security
Shared Responsibility Model
CASB (Cloud Access Security Broker)
Container Security
IAM (Identity and Access Management)

Cryptography7 terms

Encryption
Hashing
Public Key Infrastructure (PKI)
Digital Certificate
AES (Advanced Encryption Standard)
TLS (Transport Layer Security)
Digital Signature

Forensics4 terms

Digital Forensics
Chain of Custody
Volatile Memory
Log Analysis

Fundamentals10 terms

CIA Triad
Defense in Depth
Threat Intelligence
Patch Management
EDR (Endpoint Detection and Response)
Honeypot
Sandboxing
Red Team
Blue Team
Purple Team

GRC9 terms

Risk Assessment
Vulnerability Assessment
Penetration Testing
Compliance
NIST Framework
ISO 27001
GDPR
Incident Response
Business Continuity Plan (BCP)

Network Security9 terms

Firewall
VPN (Virtual Private Network)
IDS (Intrusion Detection System)
IPS (Intrusion Prevention System)
DMZ (Demilitarized Zone)
SIEM (Security Information and Event Management)
SOC (Security Operations Center)
Packet Sniffing
Port Scanning

Threats & Attacks14 terms

Malware
Ransomware
Phishing
SQL Injection
Cross-Site Scripting (XSS)
DDoS (Distributed Denial of Service)
Man-in-the-Middle (MITM)
Social Engineering
Zero-Day Exploit
Advanced Persistent Threat (APT)
Brute Force Attack
Buffer Overflow
Rootkit
Spear Phishing