Learn Application Security
Study Application Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
ICT
ICT
By: Noah Fenton
Networks, Network security, Effects of using ICT9Decks414Flashcards7Learners -
CYBR 158
CYBR 158
By: Lateefat Alimi
MOD 7 - Physical Security, MOD 1 - Security Concepts and Governance, MOD 8 - Midterm16Decks378Flashcards1Learner -
CFA Level 1 LOS
CFA Level 1 LOS
By: Anjy Alli
(6) Quantitative Methods: TMV (Kyle Created), (7) Quantitative Methods: Statistical Concepts and Market Returns (Kyle Created), (7) Statistical Concepts and Market Returns46Decks1,163Flashcards2Learners -
CIS101
CIS101
By: Professor Stryker
Chapter 01: Introduction to the World of Computers, Chapter 02: The System Unit: Processing and Memory, Chapter 03: Storage17Decks694Flashcards120Learners -
TM129: Networking
TM129: Networking
By: patrick macpherson
Module 1: Communications in a connected world, Module 2: Online Connections, Module 4: Build a simple network19Decks834Flashcards7Learners -
SOCIAL SECURITY DISABILITY
SOCIAL SECURITY DISABILITY
By: Frederick Ford
EDPNA EXAM QUESTIONS, SOCIAL SECURITY RULINGS, MEDICAL-VOCATIONAL-GUIDELINES (THE GRIDS) Generally22Decks624Flashcards3Learners -
Security+ SY0-601 Mike Chapple
Security+ SY0-601 Mike Chapple
By: Nick Z
Chapter 01 - Todays Security Professional, Chapter 02: Cyber Security Landscape, End of Chapter Questions11Decks510Flashcards4Learners -
* AWS Certified Solutions Architect - Associate
* AWS Certified Solutions Architect - Associate
By: Jana Dohman
Introduction, IAM & AWS CLI, EC2 Fundamentals28Decks879Flashcards7Learners -
Cisco DevNet Associates
Cisco DevNet Associates
By: Kerry Gambrel
Software Development - Software Design, Version Control, Coding Basics10Decks250Flashcards10Learners -
Security + SY0-601
Security + SY0-601
By: Alket Shabani
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. Given a scenario, analyze potential indicators associated with network attacks.24Decks258Flashcards39Learners -
Certified application developer CAD
Certified application developer CAD
By: Merry Tameh
Multiple questions, Securing Applications Against Access from Other Applications, Importing Data16Decks267Flashcards2Learners -
fit1047
fit1047
By: prathna t
Motherboard, Booting, OS12Decks200Flashcards3Learners -
Comptia Security + Mike myers course
Comptia Security + Mike myers course
By: Kerry Gambrel
Chapter 1 Risk Management, Chapter 2 Cyrptography, Chapter 3 Identity and Account management12Decks760Flashcards1Learner -
Network+
Network+
By: Emmanuel Barber-Thomas
Lesson 2: Deploying Ethernet Cabling, Lesson 3: Deploying Ethernet Switching, Lesson 4: Troubleshooting Ethernet Networks19Decks1,043Flashcards2Learners -
SalesForce
SalesForce
By: Emily McCrady
Setup and Objects, Security and Data Management, Applications, Activities and Mobile17Decks496Flashcards15Learners -
AWS Architect Associate
AWS Architect Associate
By: David Geneve
Management and Migration, Storage Solutions, Storage Security & Resiliency14Decks159Flashcards1Learner -
Security +
Security +
By: Jon-Paul Brune
Chapter 2 - Monitoring & Diagnosing Networks, Chapter 1 - Measuring & Weighing Risk, Chapter 3 - Understanding Devices & Infrastructure12Decks397Flashcards13Learners -
ccsp exam
ccsp exam
By: Robbert Van Der Pol
Cloud Application Security, Flashcards2Decks42Flashcards13Learners -
Network Technology
Network Technology
By: Jaspreet Matharu
Chapter 1, Chapter 2, Cisco Questions14Decks514Flashcards1Learner -
Amazon Web Services (Whitepaper)
Amazon Web Services (Whitepaper)
By: Bari Ryczek
*Cloud Computing Models*, *Cloud Computing Deployment Models*, *AWS Services & Application Access*29Decks274Flashcards6Learners -
GCP Developer
GCP Developer
By: Maria A
Kubernetes & GKE, Security and Identity, GCP Basics12Decks166Flashcards1Learner -
Civil Litigation
Civil Litigation
By: Meg Cox
General Matters (Syllabus 1)., Limitation (Syllabus 2), Pre-action Conduct (Syllabus 3).24Decks1,228Flashcards63Learners -
Principles of Computer Networks
Principles of Computer Networks
By: Kristofer Fonagy
Chapter 1 - Network Models, Chaper 2 - Cabling and Topology, Chapter 3 - Ethernet Basics12Decks321Flashcards53Learners -
Security+ GCGH Chapter 7, Protecting Against Advanced Attacks
Security+ GCGH Chapter 7, Protecting Against Advanced Attacks
By: StuffOffYouStuff .
Comparing Common Attacks, Summarizing Secure Coding, Identifying Application Attacks3Decks60Flashcards1Learner -
Comptia Security + SY0-601
Comptia Security + SY0-601
By: Kerry Gambrel
Chapter 1 Threats, Attacks, and Vulnerabilities, Chapter 2 Type of Attack Indicators, Chapter 3 Application Attack Indicators12Decks329Flashcards11Learners -
Aye Dub S Ess AA Exam
Aye Dub S Ess AA Exam
By: Savvy Davis
Advanced VPC Networking, VPC Basics, AWS Fundamentals16Decks546Flashcards1Learner -
Computer Information Systems 5620
Computer Information Systems 5620
By: Yvette Amaral
Chapter 1: Information Systems in Global Business Today, Chapter 2: Global E-business and Collaboration, Chapter 3: Information Systems, Organzations, and Strategy14Decks624Flashcards728Learners -
DTDDB 2021 SEM <3
DTDDB 2021 SEM <3
By: Julie Nielsen
Introduction to computational thinking, What is an Information System: Digital Technologies in a Global Society, How Businesses Use Digital Technologies11Decks235Flashcards8Learners -
AWS Arc Associate
AWS Arc Associate
By: Tammy Walters
Arc VPN, Network Connectivity Options, Security and Monitoring24Decks390Flashcards1Learner -
BTM 200
BTM 200
By: Komal Patel
BTM 200 FINAL, Unit 1 – Computer and Information Ethics, Unit 2 – Computer parts8Decks276Flashcards1Learner