Learn Computer Forensics
Study Computer Forensics using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Top Computer Forensics Flashcards Ranked by Quality
-
CompTIA Security+ Certification Practice Exams, Third Edition (Exam SY0-501)
CompTIA Security+ Certification Practice Exams, Third Edition (Exam SY0-501)
By: Alex valentine
695 Cards –20 Decks –5 LearnersSample Decks: Networking Basics and Terminology, Introduction to Security Terminology, Security Policies and StandardsShow Class -
Security+ SY0-601
Security+ SY0-601
By: David Wartman
832 Cards –37 Decks –358 LearnersSample Decks: 1.0 Acronyms, 1.1 Social Engineering Techniques, 1.2 Malware TypesShow Class -
Technology
Technology
By: Robert B
342 Cards –3 Decks –4 LearnersSample Decks: ITN276 - Computer Forensics - Midterm Exam - Review, ITN107 - Personal Computer and Troubleshooting - Midterm Exam - Review, ITN101 - Intro to Network Concepts - Exam 1 - ReviewShow Class -
(6) CompTia Security+ SY0-601 Definitions
(6) CompTia Security+ SY0-601 Definitions
By: Maciej Węgrzynowski
1,691 Cards –47 Decks –26 LearnersSample Decks: 1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application AttacksShow Class -
Sec+
Sec+
By: Zach Harvey
577 Cards –37 Decks –3 LearnersSample Decks: Ports and protocols, Social Engineering, Attack typesShow Class -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
722 Cards –35 Decks –11 LearnersSample Decks: 1.1 Social Engineering, 1.2 Attack Types, 1.3 Application AttacksShow Class -
Information Security
Information Security
By: Hanan Timraz
152 Cards –13 Decks –6 LearnersSample Decks: General Security Concepts, Cryptography, Key ManagementShow Class -
Comptia
Comptia
By: Russell Davis
1,194 Cards –35 Decks –16 LearnersSample Decks: Social Engineering, Determine type of attack via indicators, Application AttacksShow Class -
C178 - Security+ SYO-601
C178 - Security+ SYO-601
By: Jonathan Maner
635 Cards –30 Decks –4 LearnersSample Decks: Section 1: Security Overview, Section 2: Malware, Section 3: Malware InfectionsShow Class -
Comptia SEC+
Comptia SEC+
By: Shawn Mosby
1,865 Cards –27 Decks –5 LearnersSample Decks: Section 2.2 Virtualization and Cloud Computing Concepts, Section 2.3 Secure Application development, deployment, and automation concepts, Section 2.4 Authentication and Authorization Design conceptsShow Class -
Digital Evidence, computer Crime.
Digital Evidence, computer Crime.
By: Makponse Yamonche
61 Cards –5 Decks –7 LearnersSample Decks: Chapter 1: Foundations of Digital Forensics, Language of Computer Crime Investigation, Chapter 3 : Digital Evidence in the CoutroomShow Class -
ECC CCE
ECC CCE
By: Kamil Gierach-Pacanek
120 Cards –4 Decks –1 LearnerSample Decks: Data Security, Network Monitoring, Analysis and Troubleshooting, Incident ResponseShow Class -
CompTIA Sec+
CompTIA Sec+
By: James Camp
377 Cards –29 Decks –5 LearnersSample Decks: Social Engineering Techniques, Types of Attacks/Malware, Application AttacksShow Class -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
1,670 Cards –41 Decks –3 LearnersSample Decks: Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack TypesShow Class -
CCSP
CCSP
By: Brian White
171 Cards –42 Decks –74 LearnersSample Decks: Module 1: Understanding Cloud Computing Concepts, Module 2: Architectural Design and Reference Requirements, Module 3: Understanding Concepts relevant to Cloud ComputingShow Class -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
546 Cards –35 Decks –16 LearnersSample Decks: 1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacksShow Class -
Security
Security
By: elvis sanchez
662 Cards –40 Decks –1 LearnerSample Decks: 1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks.Show Class -
Sec+
Sec+
By: GiGi C.
387 Cards –38 Decks –1 LearnerSample Decks: 1.1 social engineering techniques, 1.2 analyze potential indicators to determine the type of attack, 1.3 potential indicators associated with application attacksShow Class -
USNA Cyber
USNA Cyber
By: Kris Medina
240 Cards –30 Decks –4 LearnersSample Decks: Cyber Domain & Pillars of Cyber Security, Risk, Computer ArchitectureShow Class -
Security+
Security+
By: Bradley Wright
143 Cards –19 Decks –2 LearnersSample Decks: Networking Basics & Terms, Intro to Security Terms, Security Policies & StandardsShow Class -
COMP41590_AdvancedComputerForensics
COMP41590_AdvancedComputerForensics
By: Michael Prozee
81 Cards –4 Decks –1 LearnerSample Decks: Lecture 1 + 2 Intro / Computer Forensics Review, Lecture 3 - Windows File System Layout, Lecture 4 - GUID (Globally Unique IdentifierShow Class -
SEC+
SEC+
By: Kevin Watke
65 Cards –31 Decks –2 LearnersSample Decks: 1.5: Threat Actors and Vectors, 1.6: Vulnerabilities, 1.7: Security AssessmentsShow Class