Intermediate level
Cybersecurity: Intermediate Level
Master key vocabulary with interactive flashcards, audio, and trainer
Word list to learn
Click the icon to hear the pronunciation
authentication
[ɔːˌθentɪˈkeɪʃn]
authorization
[ˌɔːθəraɪˈzeɪʃn]
encryption
[ɪnˈkrɪpʃn]
decrypt
[diːˈkrɪpt]
encrypted
[ɪnˈkrɪptɪd]
passphrase
[ˈpɑːsfreɪz]
password manager
[ˈpɑːswɜːd ˈmænɪʤə]
two-factor authentication
[tuː ˈfæktə ɔːˌθentɪˈkeɪʃn]
one-time password
[wʌn taɪm ˈpɑːswɜːd]
biometric
[ˌbaɪəˈmetrɪk]
fingerprint
[ˈfɪŋgəprɪnt]
face recognition
[feɪs ˌrekəgˈnɪʃn]
session
[ˈseʃn]
token
[ˈtəʊkən]
certificate
[səˈtɪfɪkət]
vulnerability
[ˌvʌlnərəˈbɪlɪti]
exploit
[ɪkˈsplɔɪt]
breach
[briːʧ]
data leak
[ˈdeɪtə liːk]
patch
[pæʧ]
security update
[sɪˈkjʊərɪti ˈʌpdeɪt]
firewall rule
[ˈfaɪəwɔːl ruːl]
access control
[ˈækses kənˈtrəʊl]
permissions
[pəˈmɪʃənz]
administrator
[ədˈmɪnɪstreɪtə]
privilege
[ˈprɪvɪlɪʤ]
least privilege
[liːst ˈprɪvɪlɪʤ]
audit
[ˈɔːdɪt]
log
[lɒg]
logging
[ˈlɒgɪŋ]
incident
[ˈɪnsɪdənt]
response
[rɪˈspɒns]
backup copy
[ˈbækʌp ˈkɒpi]
restore point
[rɪˈstɔː pɔɪnt]
recovery
[rɪˈkʌvəri]
phishing email
[ˈfɪʃɪŋ ˈiːmeɪl]
spear phishing
[spɪə ˈfɪʃɪŋ]
social engineering
[ˈsəʊʃl ˌendʒɪˈnɪərɪŋ]
malware infection
[ˈmælweə ɪnˈfekʃn]
ransomware
[ˈrænsəmweə]
spyware
[ˈspaɪweə]
adware
[ˈædweə]
trojan
[ˈtrəʊʤən]
worm
[wɜːm]
botnet
[ˈbɒtnet]
suspicious link
[səˈspɪʃəs lɪŋk]
malicious
[məˈlɪʃəs]
integrity
[ɪnˈtegrɪti]
availability
[əˌveɪləˈbɪlɪti]
confidentiality
[ˌkɒnfɪˌdenʃiˈælɪti]
secure connection
[sɪˈkjʊə kəˈnekʃn]
proxy
[ˈprɒksi]
router
[ˈruːtə]
Wi-Fi
[ˈwaɪ faɪ]
public Wi-Fi
[ˈpʌblɪk ˈwaɪ faɪ]
network segment
[ˈnetwɜːk ˈsegmənt]
intrusion
[ɪnˈtruːʒn]
detection
[dɪˈtekʃn]
monitoring
[ˈmɒnɪtərɪŋ]
sandbox
[ˈsænbɒks]
quarantine
[ˈkwɒrəntiːn]
whitelist
[ˈwaɪtlɪst]
blacklist
[ˈblæklɪst]
update policy
[ˈʌpdeɪt ˈpɒlɪsi]
compliance
[kəmˈplaɪəns]
risk assessment
[rɪsk əˈsesmənt]
security policy
[sɪˈkjʊərɪti ˈpɒlɪsi]
password reset
[ˈpɑːswɜːd ˈriːset]
account lockout
[əˈkaʊnt ˈlɒkaʊt]
brute force
[bruːt fɔːs]
dictionary attack
[ˈdɪkʃənəri əˈtæk]
rate limit
[reɪt ˈlɪmɪt]
secure storage
[sɪˈkjʊə ˈstɔːrɪʤ]
encryption key
[ɪnˈkrɪpʃn kiː]
key rotation
[kiː rəʊˈteɪʃn]
secret
[ˈsiːkrɪt]
API key
[ˌeɪ piː ˈaɪ kiː]
access token
[ˈækses ˈtəʊkən]
session cookie
[ˈseʃn ˈkʊki]
zero trust
[ˈzɪərəʊ trʌst]
device management
[dɪˈvaɪs ˈmænɪʤmənt]
mobile device
[ˈməʊbaɪl dɪˈvaɪs]
remote access
[rɪˈməʊt ˈækses]
secure wipe
[sɪˈkjʊə waɪp]
data loss
[ˈdeɪtə lɒs]
privacy settings
[ˈprɪvəsi ˈsetɪŋz]
incident report
[ˈɪnsɪdənt rɪˈpɔːt]
Frequently Asked Questions
It covers authentication, encryption, access management, as well as common threats and incident response.
Read instructions, highlight terms from the list, and retell the steps in English. That helps the vocabulary stick much faster.
A good target is 12 to 15 words per session, with review every other day and short phrases for each vocabulary block.