Learn Offensive Security
Study Offensive Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(23)
Decks
Flashcards
Learners
-
Software-security
Software-security
By: lucas capellino
Software Vulnerabilities, Offensive Security, secure programming6Decks65Flashcards16Learners -
CRIMINAL INVESTIGATIONS
CRIMINAL INVESTIGATIONS
By: Devon Delacerda
Fundamentals of criminal investigations, Crime Science, Notes, Documenting and Reporting, Processing the Crime Scene19Decks673Flashcards13Learners -
MCCC
MCCC
By: Ben Talbot
Entrance Exam, Fundamentals, IBCT Offense10Decks216Flashcards7Learners -
French Military Vocabulary
French Military Vocabulary
By: David Bradley
Reconnaissance & Security Operations, Offensive Operations, Defensive Operations12Decks132Flashcards22Learners -
BWS
BWS
By: Sarah Markley
Security Operations, Reconnaissance Operations, Offensive Operations3Decks68Flashcards1Learner -
Security+
Security+
By: Gary Hartzell
Threats, Offensive Security, Cloud10Decks90Flashcards1Learner -
TryHackMe.com
TryHackMe.com
By: Laurits Søgaard
Pre Security, Pre Security Linux, Pre Security Windows6Decks265Flashcards1Learner -
CrimLaw2
CrimLaw2
By: Kringkring Vistal
Crimes Against National Security and The Law Of Nations, Crimes against the fundamental laws of the state, Codal provisions21Decks686Flashcards2Learners -
army study guide
army study guide
By: Wayne Hollis
NCO HISTORY, Unit History, ADP 1 / ADRP 1 - The Army36Decks531Flashcards364Learners -
BWS
BWS
By: William Kilson
Offensive Operations, Security Operations, Aviation Mission Planning5Decks64Flashcards3Learners -
H MH Conflict in Euro
H MH Conflict in Euro
By: dnmsd kdnsd
1. Dictatorships in Germany and Italy, 1. The League of Nations and collapse of collective security: Abyssinia, the Spanish Civil War, 1. Britain, France and the policy of appeasement: an assessment15Decks440Flashcards192Learners -
Cyber security Introductory RG flashcards
Cyber security Introductory RG flashcards
By: aaron nehus
.01 RG Vocab introduction to cyber security, .02 RG Vocab Information Security & Risk Management, .03 RG Vocab network security8Decks292Flashcards1Learner -
CRIM II
CRIM II
By: Ron Rico Oandasán
TITLE I. Crimes Against National Security and the Law of Nations, TITLE II. Crimes against the Fundamental Laws of the State, TITLE III. Crimes against Public Order18Decks643Flashcards6Learners -
army study guide WAMC
army study guide WAMC
By: Donald Moore-Allen
NCO HISTORY, ADP 1 / ADRP 1 - The Army, Chain of Command and NCO Support Channel55Decks1,076Flashcards48Learners -
CS-239
CS-239
By: kv Biju
Threat Modelling & Analysis, Threat Analysis and Risk Assessment, Software Liability and Economics9Decks90Flashcards1Learner -
Exam V
Exam V
By: Brian Martin
ATFP, COIN, Intro to Urban Operations9Decks111Flashcards2Learners -
Penetration Testing
Penetration Testing
By: Dalton Forbes
12/4/2022 Base Engineering Model, 12/7/2022 THM - Content Discovery, Subdomain Enumeration, 12/9/2022 - THM Auth Bypass, Logic Flaw, Cookies, IDOR13Decks109Flashcards4Learners -
Exam 5
Exam 5
By: duran sword
PERSONNEL RECORDS, MARINE CORPS AWARDS, FITNESS REPORTS8Decks101Flashcards1Learner -
Criminal Law II
Criminal Law II
By: Eyre Austero
Crime Against The Fundamental Law of the State, Crimes Against National Security and the Law of Nations, Crimes Against Public Order - Rebellion, Sedition, and Disloyalty9Decks48Flashcards1Learner -
2015 Army Study Guide
2015 Army Study Guide
By: Julian Joseph
ADP 1 / ADRP 1 - The Army, ADP 1-02 / ADRP 1-02 - Operational Terms and Military Symbols, ADP 2-0 / ADRP 2-0 - Intelligence63Decks272Flashcards27Learners -
Introduction to Cyber Security Notes
Introduction to Cyber Security Notes
By: Unknown Unknown
Introduction to Offensive Security, Introduction to Defensive Security, Introduction to Cyber Security3Decks23Flashcards1Learner -
Military Law 1013
Military Law 1013
By: J B
UCMJ, MCM, other sources of Military law, Participants of Military Justice System, who is subject to UCMJ, dangers of UCI, how are legal services provided14Decks27Flashcards2Learners -
CipherTechs
CipherTechs
By: Nicholas Leask
Governance, Risk & Compliance, Offensive Security Services, Defensive & Managed Services5Decks25Flashcards1Learner