ethical hacking

This class was created by Brainscape user Barbara Workman. Visit their profile to learn more about the creator.

Decks in this class (13)

Information Security Fundamentals
The assurance that the systems re...,
Identify the element of informati...,
Ruby a hacker visited her target ...
10  cards
Ethical Hacking Fundamentals
John a security specialist was re...,
Identify the reason why organizat...,
Reasons why organizations recruit...
11  cards
Information Security Threats and Vulnerability Assessment
Jack a professional hacker was re...,
Elon a disgruntled employee with ...,
Sam recently joined as a network ...
10  cards
Password Cracking Techniques and Countermeasures
Which of the following protocols ...,
Which of the following protocols ...,
Which of the following is a defau...
10  cards
Social Engineering Techniques and Countermeasures
John a threat actor called up joh...,
Don a professional hacker telepho...,
In which of the following social ...
10  cards
Network Level Attacks and Countermeasures
Which of the following protocols ...,
George a professional hacker targ...,
Which of the following countermea...
10  cards
Web Application Attacks and Countermeasures
Edward a professional hacker targ...,
Which of the following countermea...,
Which of the following layers of ...
10  cards
Wireless Attacks and Countermeasures
Which of the following terms desc...,
Which of the following components...,
Smith a network administrator was...
10  cards
Mobile Attacks and Countermeasures
Which of the following mobile ris...,
Identify the network based attack...,
Which of the following protocols ...
11  cards
IoT and OT Attacks and Countermeasures
Bob has recently installed smart ...,
Joseph a professional hacker targ...,
Don a professional hacker targete...
10  cards
Cloud Computing Threats and Countermeasures
Which of the following cloud depl...,
Identify the cloud deployment mod...,
Given below are the list of tiers...
10  cards
Penetration Testing Fundamentals
Identify the activity that focuse...,
Ginita a penetration tester has r...,
Freddy a penetration tester plans...
10  cards
Ethical Hacking as a Whole
Mark a professional hacker target...,
Identify the type of attack vecto...,
Identify the insider attack where...
100  cards

More about
ethical hacking

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Barbara Workman's ethical hacking flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CEH - Certified Ethical Hacker
  • 13 decks
  • 391 flashcards
  • 29 learners
Decks: 15 Sql Injection, 16 Hacking Wireless Networks, 17 Hacking Mobile Platforms, And more!
Certified Ethical Hacker (CEH)
  • 16 decks
  • 82 flashcards
  • 71 learners
Decks: Introduction To Ethical Hacking Ethics A, Footprinting And Social Engineering, Scanning And Enumeration, And more!
Ethical Hacking
  • 1 decks
  • 18 flashcards
  • 4 learners
Decks: Ethical Hacking, And more!
Make Flashcards