Advanced level
Cybersecurity: Advanced Level
Master key vocabulary with interactive flashcards, audio, and trainer
Word list to learn
Click the icon to hear the pronunciation
threat actor
[θret ˈæktə]
attack vector
[əˈtæk ˈvektə]
attack surface
[əˈtæk ˈsɜːfɪs]
zero-day
[ˈzɪərəʊ deɪ]
vulnerability management
[ˌvʌlnərəˈbɪlɪti ˈmænɪʤmənt]
penetration testing
[ˌpenɪˈtreɪʃn ˈtestɪŋ]
pen test
[pen test]
red team
[red tiːm]
blue team
[bluː tiːm]
purple team
[ˈpɜːpl tiːm]
security operations center
[sɪˈkjʊərɪti ˌɒpəˈreɪʃnz ˈsentə]
lateral movement
[ˈlætərəl ˈmuːvmənt]
privilege escalation
[ˈprɪvɪlɪʤ ˌeskəˈleɪʃn]
persistence
[pəˈsɪstəns]
command and control
[kəˌmɑːnd ən kənˈtrəʊl]
beaconing
[ˈbiːkənɪŋ]
kill chain
[kɪl ʧeɪn]
threat intelligence
[θret ɪnˈtelɪʤəns]
threat hunting
[θret ˈhʌntɪŋ]
incident response plan
[ˈɪnsɪdənt rɪˈspɒns plæn]
forensics
[fəˈrensɪks]
digital evidence
[ˈdɪʤɪtl ˈevɪdəns]
chain of custody
[ʧeɪn əv ˈkʌstədi]
root cause analysis
[ruːt kɔːz əˈnælɪsɪs]
anomaly detection
[əˈnɒməli dɪˈtekʃn]
behavioral analytics
[bɪˈheɪvjərəl ˌænəˈlɪtɪks]
machine learning
[məˈʃiːn ˈlɜːnɪŋ]
false positive
[fɔːls ˈpɒzɪtɪv]
false negative
[fɔːls ˈnegətɪv]
risk appetite
[rɪsk ˈæpɪtaɪt]
risk mitigation
[rɪsk ˌmɪtɪˈgeɪʃn]
business continuity
[ˈbɪznəs ˌkɒntɪˈnjuːɪti]
disaster recovery
[dɪˈzɑːstə rɪˈkʌvəri]
ransomware attack
[ˈrænsəmweə əˈtæk]
denial of service
[dɪˈnaɪəl əv ˈsɜːvɪs]
traffic spike
[ˈtræfɪk spaɪk]
botnet herder
[ˈbɒtnet ˈhɜːdə]
malware analysis
[ˈmælweə əˈnælɪsɪs]
sandboxing
[ˈsænbɒksɪŋ]
reverse engineering
[rɪˈvɜːs ˌendʒɪˈnɪərɪŋ]
obfuscation
[ˌɒbfʌsˈkeɪʃn]
packer
[ˈpækə]
exploit kit
[ɪkˈsplɔɪt kɪt]
drive-by download
[draɪv baɪ ˈdaʊnləʊd]
watering hole
[ˈwɔːtərɪŋ həʊl]
supply chain attack
[səˈplaɪ ʧeɪn əˈtæk]
insider threat
[ɪnˈsaɪdə θret]
data exfiltration
[ˈdeɪtə ˌeksfɪlˈtreɪʃn]
lateral movement tool
[ˈlætərəl ˈmuːvmənt tuːl]
credential stuffing
[krɪˈdenʃl ˈstʌfɪŋ]
password spraying
[ˈpɑːswɜːd ˈspreɪɪŋ]
golden ticket
[ˈgəʊldən ˈtɪkɪt]
domain controller
[dəˈmeɪn kənˈtrəʊlə]
certificate pinning
[səˈtɪfɪkət ˈpɪnɪŋ]
mutual TLS
[ˈmjuːtʃuəl ˌtiː el ˈes]
public key infrastructure
[ˈpʌblɪk kiː ˈɪnfrəˌstrʌkʧə]
key management service
[kiː ˈmænɪʤmənt ˈsɜːvɪs]
hardware security module
[ˈhɑːdweə sɪˈkjʊərɪti ˈmɒdjuːl]
data classification
[ˈdeɪtə ˌklæsɪfɪˈkeɪʃn]
data retention
[ˈdeɪtə rɪˈtenʃn]
data minimization
[ˈdeɪtə ˌmɪnɪmaɪˈzeɪʃn]
secure by design
[sɪˈkjʊə baɪ dɪˈzaɪn]
threat modeling
[θret ˈmɒdlɪŋ]
secure coding
[sɪˈkjʊə ˈkəʊdɪŋ]
code review
[kəʊd rɪˈvjuː]
static analysis
[ˈstætɪk əˈnælɪsɪs]
dynamic analysis
[daɪˈnæmɪk əˈnælɪsɪs]
vulnerability scanning
[ˌvʌlnərəˈbɪlɪti ˈskænɪŋ]
patch management
[pæʧ ˈmænɪʤmənt]
configuration drift
[kənˌfɪgjəˈreɪʃn drɪft]
hardening
[ˈhɑːdənɪŋ]
secure baseline
[sɪˈkjʊə ˈbeɪslaɪn]
policy enforcement
[ˈpɒlɪsi ɪnˈfɔːsmənt]
access review
[ˈækses rɪˈvjuː]
segregation of duties
[ˌsegrɪˈgeɪʃn əv ˈdjuːtiz]
logging retention
[ˈlɒgɪŋ rɪˈtenʃn]
security telemetry
[sɪˈkjʊərɪti təˈlemətri]
endpoint protection
[ˈendpɔɪnt prəˈtekʃn]
endpoint detection and response
[ˈendpɔɪnt dɪˈtekʃn ənd rɪˈspɒns]
network forensics
[ˈnetwɜːk fəˈrensɪks]
memory dump
[ˈmeməri dʌmp]
log correlation
[lɒg ˌkɒrəˈleɪʃn]
threat scoring
[θret ˈskɔːrɪŋ]
security posture
[sɪˈkjʊərɪti ˈpɒsʧə]
attack simulation
[əˈtæk ˌsɪmjʊˈleɪʃn]
breach notification
[briːʧ ˌnəʊtɪfɪˈkeɪʃn]
regulatory compliance
[ˈregjʊlətəri kəmˈplaɪəns]
security awareness
[sɪˈkjʊərɪti əˈweənəs]
tabletop exercise
[ˈteɪbltɒp ˈeksəsaɪz]
playbook
[ˈpleɪbʊk]
post-incident review
[pəʊst ˈɪnsɪdənt rɪˈvjuː]
continuous monitoring
[kənˈtɪnjuəs ˈmɒnɪtərɪŋ]
Frequently Asked Questions
It includes investigation terminology, monitoring vocabulary, risk-management language, and professional abbreviations such as SOC, EDR, and SIEM.
Build a glossary with short examples and review it together with real cases, reports, or incident summaries.
Mini-incident exercises and CVE breakdowns work especially well: describe the attack vector, impact, and defense measures in short structured points.