The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Point-To-Point Tunneling Protocol (PPTP)
Point-To-Point Tunneling Protocol (PPTP): Point-to-Point Tunneling Protocol (PPTP) is an older VPN protocol used to implement virtual private networks, offering encapsulation of PPP packets over IP for the creation of a VPN over a TCP/IP-based network. While it has been widely deployed, it's considered less secure than other VPN protocols due to known vulnerabilities and is, therefore, less recommended for use in sensitive communications.
- PPPoE (Point-to-Point Protocol over Ethernet)
PPPoE (Point-to-Point Protocol over Ethernet): A network protocol that encapsulates PPP frames inside Ethernet frames. It combines the point-to-point and Ethernet network technologies, enabling a single, direct connection between users and the internet service provider. With built-in security and error detection features, PPPoE is often used in both home and corporate internet connections.
- PRINCE2 (Projects in a Controlled Environment)
PRINCE2 (Projects in a Controlled Environment): PRINCE2 (Projects in a Controlled Environment) is a widely recognized process-based approach for effective project management. It is built upon seven principles, themes, and processes that guide the planning, execution, and closure of projects. PRINCE2 is used across various sectors, ensuring that project delivery is consistent, controlled, and aligned with specified objectives.
- Private Branch Exchange (PBX)
Private Branch Exchange (PBX): A private telephone network used within an organization that allows users to communicate internally and externally. Modern PBX systems can integrate with VoIP and provide advanced features like call forwarding, voicemail, and conference calling.
- Program Evaluation and Review Technique (PERT)
Program Evaluation and Review Technique (PERT): A project management methodology that uses a network diagram to visualize the dependencies and interdependencies of tasks within a project. It is used to estimate the duration of a project and identify potential bottlenecks. Examples include PERT diagrams for software development projects, construction projects, and event planning projects.
- Protected Extensible Authentication Protocol (PEAP)
Protected Extensible Authentication Protocol (PEAP): Protected Extensible Authentication Protocol (PEAP) is an authentication protocol that encapsulates Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel. It is used to enhance the security of wireless networks and VPNs by ensuring that client credentials are transmitted securely over potentially vulnerable or untrusted networks.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access