Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Domain 5: Information Asset Protection
Domain 5: Information Asset Protection
By: Makponse Yamonche
1-Information Security Management, 1.1 : Privacy and third Party Management, 1.2: Security Incident Management17Decks270Flashcards4Learners -
Computer science
Computer science
By: B Weston 10
CPU components, MEMORY, Images10Decks72Flashcards1Learner -
cyber
cyber
By: Denis T
Malware en Aanvalstypes, Cyber rollen en CIA, stakeholders, assets, threat definities7Decks95Flashcards1Learner -
dte
dte
By: Annie Grant
Protocols, Australian Privacy Policy, network cable18Decks119Flashcards1Learner -
ITN 260
ITN 260
By: Joe Schmoe
Chapter 1 - introduction To Security, Chapter 15 - Risk Mitigation, Chapter 8 - Wireless Network Security15Decks567Flashcards2Learners -
Cyber Security
Cyber Security
By: Aiden Beck
Risk Management, Internet Of Things, Pen Testing19Decks86Flashcards2Learners -
IMT4113 Technology
IMT4113 Technology
By: Lars Veggeland
Intro, Cryptology: intro, Cryptology: Symmetric15Decks94Flashcards8Learners -
Cyber Security
Cyber Security
By: NS CodeWriter
Terms, Malware, General7Decks67Flashcards3Learners -
Security+
Security+
By: Kevin Zheng
Encryption Algorithms, Certificate Formats, Ports26Decks242Flashcards1Learner -
CompTIA Security+ SY0-501
CompTIA Security+ SY0-501
By: L PUA
Glossary of Terms Page 1, Glossary of Terms Page 2, Glossary of Terms Page 3134Decks913Flashcards5Learners -
COMPUTER SCIENCE REVAMPED IGCSE
COMPUTER SCIENCE REVAMPED IGCSE
By: Unknown Unknown
Sensors, ASCII and Unicode, Protocols and DNS20Decks123Flashcards3Learners -
CompTIA Security+ (SY0-501)
CompTIA Security+ (SY0-501)
By: Doops Zero
Malware, Sample Quiz Questions, Understanding Attackers3Decks63Flashcards1Learner -
Security+
Security+
By: Paul Rosario
Acronyms, Chapter 1 - Mastering Security Basics, Chapter 2 - Understanding Identity and Access Management5Decks492Flashcards2Learners -
A Computer Science : Unit 1
A Computer Science : Unit 1
By: ww ww
1.1.1 Architecture Introduction, 1.1.2 Von Neumann Architecture, 1.1.3 Factors affecting CPU performance26Decks253Flashcards2Learners -
IT 2020
IT 2020
By: Harvey Mills
Data Collection Methods, Malware, Threats to Data9Decks67Flashcards2Learners -
Core 2
Core 2
By: Bridget M
2.3 Malware Detection, Removal and Prevention, 2.4 Social Engineering, 1.8 Operating System Types5Decks87Flashcards1Learner -
Computing - Organised
Computing - Organised
By: Zayd IMRAN
Computer Systems - Translators, Data Representation - Logic Gates, Data Representation - Units22Decks361Flashcards1Learner -
CEH
CEH
By: Alex Santiago
MOD 16 - Hacking Wireless, MOD 17 - Hacking Mobile Platforms, MOD 18 - Iot and OT Hacking13Decks164Flashcards1Learner -
COSC362
COSC362
By: Hayley Krippner
Lecture 1: Course introduction, Lecture 2: Course overview (key definitions), [TODO] Lecture 3: Number Theory and Finite Fields -- Discrete Mathematics (basic number theory, modular arithmetic, groups and fields, boolean algebra)21Decks1,305Flashcards3Learners -
computer science
computer science
By: Stan PRICHARD
ASCII Unicode, computer protocols, network transfer10Decks60Flashcards2Learners -
Kierra Security
Kierra Security
By: Kierra Stephens
Ports, Access Controls, Cryptography6Decks85Flashcards2Learners -
professionalism in practice
professionalism in practice
By: Somto Azubuike
professional responsibilities, system development lifecycle, requirements and requirements engineering16Decks199Flashcards1Learner -
Security + 601
Security + 601
By: Carlos Rosado
Attacks, Threats, Vulnerabilities, Malware Variants, Types of Attacks18Decks265Flashcards1Learner -
Core 2
Core 2
By: Andrew Boos-Hartig
Acronyms, Steps For malware removal2Decks225Flashcards1Learner -
Security +
Security +
By: Blayne Ehrenzeller
Social Engineering and Security Fundamentals, Malware, Password Attacks16Decks195Flashcards1Learner -
Networking 2
Networking 2
By: Clay Casassa
Malware, Folders, and Printers, Misc, Computer Management18Decks111Flashcards10Learners -
QRS A+ Core 2
QRS A+ Core 2
By: Elizabeth Perez
3.0 Software Troubleshooting QRS, 4.0 Operational Proceedures, 1.1 Compare and contrast common operating system types and their purposes.24Decks640Flashcards47Learners -
CompTIA A+ Core 2
CompTIA A+ Core 2
By: Birdman Jetson
1.1 Identify Basic Features of Microsoft Windows Editions, 1.2 Microsoft Command Line Tool, 1.3 Use Features & Tools of Microsoft Windows 10 Operating System (OS)35Decks506Flashcards3Learners -
Y7 revision
Y7 revision
By: Adam Knowlton
Science Biology orginisation, Science Biology reproduction, Science chemistry matter21Decks197Flashcards2Learners -
IS4560 HACKING AND COUNTERMEASURES
IS4560 HACKING AND COUNTERMEASURES
By: Barbara Crable
IS4560 CH 1 "Evolution of Hacking", IS4560 CH 2 TCP/IP Review, IS4560 CH 3 Cryptographic Concepts15Decks160Flashcards24Learners