Learn Application And Network Attacks
Study Application And Network Attacks using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Top Application And Network Attacks Flashcards Ranked by Quality
-
CISSP - Certified Information Systems Security Professional
CISSP - Certified Information Systems Security Professional
By: Abran Tapia
504 Cards –20 Decks –99 LearnersSample Decks: 1 - Security Governance, 2 - Personnel Security and Risk Management, 3 - Business Continuity PlanningShow Class -
Pentest+
Pentest+
By: Zoubida Regzal
442 Cards –15 Decks –1 LearnerSample Decks: 1 Planning & scoping, 2.1 Information gathering & Vulnerability scanning: passive reconnaissance, 2.2.1 Information gathering & Vulnerability scanning: active reconnaissance/ scanning & reconShow Class -
Comptia Security+
Comptia Security+
By: Cristi Náme
169 Cards –8 Decks –1 LearnerSample Decks: Attack Types, Application Attacks, Network AttacksShow Class -
Higher Computing
Higher Computing
By: Jack Leslie
376 Cards –17 Decks –53 LearnersSample Decks: Computer Systems: Chapter 1 (Data Representation), Computer Systems: Chapter 2 (Computer Structure), Computer Systems: Chapter 3 (Peripherals)Show Class -
Comptia Security + SY0-601
Comptia Security + SY0-601
By: Kerry Gambrel
329 Cards –12 Decks –11 LearnersSample Decks: Chapter 1 Threats, Attacks, and Vulnerabilities, Chapter 2 Type of Attack Indicators, Chapter 3 Application Attack IndicatorsShow Class -
CompTIA Sec+ Cert Exam (501)
CompTIA Sec+ Cert Exam (501)
By: Raaay Shell
1,091 Cards –15 Decks –10 LearnersSample Decks: Lesson 1: Comparing and Contrasting Attacks, Lesson 2: Comparing and Contrasting Security Controls, Lesson 3: Assessing Security Posture with Software ToolsShow Class -
Comptia SEC+
Comptia SEC+
By: Shawn Mosby
1,865 Cards –27 Decks –5 LearnersSample Decks: Section 2.2 Virtualization and Cloud Computing Concepts, Section 2.3 Secure Application development, deployment, and automation concepts, Section 2.4 Authentication and Authorization Design conceptsShow Class -
ethical hacking
ethical hacking
By: Barbara Workman
222 Cards –13 Decks –61 LearnersSample Decks: Information Security Fundamentals, Ethical Hacking Fundamentals, Information Security Threats and Vulnerability AssessmentShow Class -
CISSP Power Notes
CISSP Power Notes
By: Dola Sang
1,367 Cards –14 Decks –4 LearnersSample Decks: Chapter 6- Cryptography and Symmetric Key Algorithms, Chapter 7: PKI and Cryptographic Applications, Chapter 8- Security Models, Design and CapabilitiesShow Class -
COMPTIA - Sec+ Textbook
COMPTIA - Sec+ Textbook
By: Rachelle Pestanas
951 Cards –16 Decks –22 LearnersSample Decks: Lesson 1: Comparing & Contrasting Attacks, Lesson 2: Comparing and Contrasting Security Controls, Lesson 3: Assessing Security Posture with Software ToolsShow Class -
CISSP OSG
CISSP OSG
By: Sad Summertron
477 Cards –19 Decks –41 LearnersSample Decks: Chapter 3: Business Continuity Planning, Chapter 4: Laws, Regulations, and Compliance, Chapter 5: Protecting Security of AssetsShow Class -
CEH Exam Guide 3rd Ed, for CEH Exam v9
CEH Exam Guide 3rd Ed, for CEH Exam v9
By: Stephen Holden
545 Cards –17 Decks –41 LearnersSample Decks: Chapter 1 - Essential Knowledge (Introduction to Ethical Hacking), Chapter 2 - Reconnaissance (Footprinting and Reconnaissance), Chapter 3 - Scanning and Enumeration (Scanning Networks)Show Class -
Security+
Security+
By: Sean Shirley
807 Cards –41 Decks –1 LearnerSample Decks: Basics and fundamentals, General Security threats, Generally Mitigating ThreatsShow Class -
CompTIA Sec+
CompTIA Sec+
By: James Camp
377 Cards –29 Decks –5 LearnersSample Decks: Social Engineering Techniques, Types of Attacks/Malware, Application AttacksShow Class -
Security+
Security+
By: Taimoor Fayyaz
583 Cards –22 Decks –1 LearnerSample Decks: Ports, Basics, MalwareShow Class -
CompTIA Security+ SY0-501 - Based on Objectives
CompTIA Security+ SY0-501 - Based on Objectives
By: Tánh Phạm
887 Cards –45 Decks –490 LearnersSample Decks: 1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks.Show Class -
(5) Comptia Security + SY0-601
(5) Comptia Security + SY0-601
By: Maciej Węgrzynowski
329 Cards –12 Decks –5 LearnersSample Decks: Chapter 1 Threats, Attacks, and Vulnerabilities, Chapter 2 Type of Attack Indicators, Chapter 3 Application Attack IndicatorsShow Class -
Comptia network +
Comptia network +
By: Fareedah James
609 Cards –26 Decks –8 LearnersSample Decks: 1.1 Explain the purposes and uses of ports and protocols., 1.2 Explain devices, applications, protocols and services at their appropriate OSI layers., 1.3 Explain the concepts and characteristics of routing and switching.Show Class -
CompTIA A+ Core 2 (220-1102)
CompTIA A+ Core 2 (220-1102)
By: John Vargas
1,065 Cards –49 Decks –6 LearnersSample Decks: Operating System 3 revision, Security, Software and Trouble ShootingShow Class -
(2) Comptia Security + SY0-601
(2) Comptia Security + SY0-601
By: Maciej Węgrzynowski
329 Cards –12 Decks –4 LearnersSample Decks: Chapter 1 Threats, Attacks, and Vulnerabilities, Chapter 2 Type of Attack Indicators, Chapter 3 Application Attack IndicatorsShow Class -
C178 - Security+ SYO-601
C178 - Security+ SYO-601
By: Jonathan Maner
635 Cards –30 Decks –4 LearnersSample Decks: Section 1: Security Overview, Section 2: Malware, Section 3: Malware InfectionsShow Class -
Security 601
Security 601
By: Marlon M
385 Cards –16 Decks –1 LearnerSample Decks: 1.1 Social Engineering Techniques, 1.2 Malware Types, 1.3 Application AttacksShow Class -
Security+
Security+
By: Angelina Hart
1,371 Cards –10 Decks –1 LearnerSample Decks: Security+ Practice Tests 1-5, Security+ Practice Tests 6-10, Udemy Sections 1-3: Overview, Malware, and Malware InfectionsShow Class -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
1,670 Cards –41 Decks –3 LearnersSample Decks: Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack TypesShow Class -
Security+ Concepts
Security+ Concepts
By: erik hogberg
393 Cards –9 Decks –1 LearnerSample Decks: Cryptography & PKI, Network & Protocols, Threats, Attacks & VulnerabilitiesShow Class -
Security
Security
By: Vitor R
260 Cards –17 Decks –6 LearnersSample Decks: Exam questions, 1 - Introduction, 2 - Physical LinkShow Class -
TCM Security - Practical Ethical Hacking
TCM Security - Practical Ethical Hacking
By: Marcelo Aiache
147 Cards –14 Decks –1 LearnerSample Decks: Networking Refresher Section Quiz, Introduction to Linux, Stages of Ethical HackingShow Class -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
546 Cards –35 Decks –16 LearnersSample Decks: 1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacksShow Class -
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
By: Alex valentine
412 Cards –29 Decks –5 LearnersSample Decks: Malware and Indicators of Compromise, Attacks, Threat ActorsShow Class -
PenTest+
PenTest+
By: Laurence Toje
232 Cards –12 Decks –1 LearnerSample Decks: Penetration Testing, Planning and Scoping Penetration Tests, Information GatheringShow Class