Learn Application Security
Study Application Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CISSP OSG
CISSP OSG
By: Sad Summertron
Chapter 3: Business Continuity Planning, Chapter 4: Laws, Regulations, and Compliance, Chapter 5: Protecting Security of Assets ...19Decks477Flashcards43Learners -
CS 6250 - OMSCS (Exam 3)
CS 6250 - OMSCS (Exam 3)
By: David Hanks
Lesson 9 - Internet Security, Lesson 10 - Internet Surveillance and Censorship, Lesson 11: Applications (Video) ...4Decks112Flashcards162Learners -
Software security
Software security
By: E Mi
Information security, concepts and principles, OWASP part 1, OWASP part 2 ...16Decks600Flashcards2Learners -
CISSP Power Notes
CISSP Power Notes
By: Dola Sang
Chapter 6- Cryptography and Symmetric Key Algorithms, Chapter 7: PKI and Cryptographic Applications, Chapter 8- Security Models, Design and Capabilities ...14Decks1,367Flashcards4Learners -
SSCP
SSCP
By: Lucas Persell
Domain 1 - Access Controls, Domain 2 - Security Operations, SSCP Glossary of Terms ...8Decks1,060Flashcards63Learners -
DION 1102
DION 1102
By: Evie Desmarais
Operating System Types, Windows, Linux ...33Decks531Flashcards1Learner -
CompTIA Security+
CompTIA Security+
By: Salewa Aderonmu
Lesson 7 - Questions, Lesson 8 - Questions, Lesson 9 - Questions ...28Decks1,104Flashcards9Learners -
SFDC Advanced Admin
SFDC Advanced Admin
By: Laura Derby
Content Management: 3%, Sales Cloud Applications: 10%, Service Cloud Applications: 10% ...5Decks978Flashcards11Learners -
IS3440 LINUX SECURITY
IS3440 LINUX SECURITY
By: Barbara Crable
IS3440 CHAP 1 SECURITY THREATS TO LINUX, IS3440 CHAP 2 BASIC COMPONENTS OF LINUX SECURITY, IS3440 CHAP 3 BASIC SECURITY: FACILITIES THROUGH THE BOOT PROCESS ...15Decks616Flashcards107Learners -
Security + Messer
Security + Messer
By: Blayne Ehrenzeller
1.1 - Social Engineering, 1.2 - Attack Types, 1.3 - Application Attacks ...24Decks622Flashcards1Learner -
Security+
Security+
By: Sean Shirley
Basics and fundamentals, General Security threats, Generally Mitigating Threats ...41Decks807Flashcards1Learner -
Cogito Fundamentals - EPIC
Cogito Fundamentals - EPIC
By: Ryan Curran
Class overview, Shortcuts and Help, Security ...7Decks193Flashcards73Learners -
Sec+ 601 Practice Questions
Sec+ 601 Practice Questions
By: Kris G
Lesson 1: Comparing Security Roles and Security Controls, Lesson 2: Explaining Threat Actors and Threat Intelligence, Lesson 3: Performing Security Assessments ...21Decks305Flashcards124Learners -
Design/Architecture
Design/Architecture
By: Vlad Hilko
Refactoring, Code Smells, Design Patterns ...14Decks333Flashcards9Learners -
network A+
network A+
By: Mark Scribner
Chapter 1, Chapter 1 - Sheet1, Chapter 2 ...22Decks1,900Flashcards66Learners -
Security+
Security+
By: Taimoor Fayyaz
Ports, Basics, Malware ...22Decks583Flashcards1Learner -
CCSP 2023
CCSP 2023
By: keegz Whodis?
CCSP Cert Prep 1 - Cloud Concepts Linked, CCSP Domain 1: Cloud Concepts, Architecture Mike Chappel 3rdEdition, CCSP Domain 2: Architecture and Design ...54Decks3,389Flashcards28Learners -
Next Gig
Next Gig
By: Jamila Duckett
Security Primer, Cloud Concepts, Architecture and Design, Cloud Data Security ...17Decks883Flashcards1Learner -
Info Security
Info Security
By: Aleysha Mullen
Chapter 8 - Network Security, Chapter 9 - Operating System Security, Chapter 2 - Identification and Authentication ...8Decks172Flashcards107Learners -
PSP
PSP
By: Dave Myers
Physical Security Assessment, Application, Design, and Integration of Physical Security Systems, Implementation of Physical Security Measures3Decks377Flashcards4Learners -
CEH v11 Revision
CEH v11 Revision
By: A Red
Essential Knowledge, Security in Cloud Computing, Linux ...15Decks558Flashcards31Learners -
Cybersecurity
Cybersecurity
By: Laurin Tidwell
Overview, Cynersecurity Concepts, Security Architecture Principles ...4Decks174Flashcards45Learners -
Sem 1-AHEAD_Cyber_Security
Sem 1-AHEAD_Cyber_Security
By: Hemant Kumar
Python Modules Types, Python Methods, Memory & Learning ...27Decks585Flashcards3Learners -
A Cloud Guru - AWS
A Cloud Guru - AWS
By: Srinivasan J
IAM, Infra, S3 ...11Decks682Flashcards4Learners -
CS4203: Computer Security
CS4203: Computer Security
By: Seamus Bonner
Introduction, Cryptography, Hashing ...19Decks522Flashcards14Learners -
Information Systems Security
Information Systems Security
By: Vanessa Larivei
Intro, Cryptography, Authentication ...8Decks434Flashcards1Learner -
CCSK v4
CCSK v4
By: wyt hat
Domain 1 - Cloud Computing Concepts and Architectures, Domain 2 - Governance and Enterprise Risk Management, Domain 3 - Legal Issues, Contracts and E-discovery ...11Decks238Flashcards357Learners -
OCP Java SE 17 (1Z0-829)
OCP Java SE 17 (1Z0-829)
By: Andrei Suslov
Chapter 1, Chapter 2, Chapter 3 ...21Decks970Flashcards191Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...35Decks546Flashcards19Learners -
Digital Technology - S1
Digital Technology - S1
By: Euan Ford
Data Portability, Spreadsheets, Digital Data ...14Decks380Flashcards4Learners