Learn Computer Forensic
Study Computer Forensic using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(27)
Decks
Flashcards
Learners
-
Analytical Chemistry
Analytical Chemistry
By: Gaby Illston-Baggs
Forensic Toxicology, Analytical Chemistry, Sample collection, storage and preparation...20Decks448Flashcards5Learners -
CS414 - Digital Forensics
CS414 - Digital Forensics
By: Caroline Mckinlay
Week 1 - Further Overview, Week 1 - The Place of Digital Forensics, Week 1 - The Investigative Process...30Decks316Flashcards21Learners -
Technology
Technology
By: Robert B
ITN276 - Computer Forensics - Midterm Exam - Review, ITN107 - Personal Computer and Troubleshooting - Midterm Exam - Review, ITN101 - Intro to Network Concepts - Exam 1 - Review3Decks342Flashcards5Learners -
Security+ SY0-601
Security+ SY0-601
By: David Wartman
1.0 Acronyms, 1.1 Social Engineering Techniques, 1.2 Malware Types...37Decks832Flashcards398Learners -
Forensics
Forensics
By: Raine Nadon
Chapter 1, Chapter 2, Chapter 3...14Decks205Flashcards4Learners -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
1.1 Social Engineering, 1.2 Attack Types, 1.3 Application Attacks...35Decks722Flashcards36Learners -
Sec+
Sec+
By: Zach Harvey
Ports and protocols, Social Engineering, Attack types...37Decks577Flashcards3Learners -
(6) CompTia Security+ SY0-601 Definitions
(6) CompTia Security+ SY0-601 Definitions
By: Maciej Węgrzynowski
1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application Attacks...47Decks1,691Flashcards32Learners -
Security Knowledge Bank
Security Knowledge Bank
By: Amie Gray
Abbreviations, Attack Mitigations, Whats that Attack...23Decks875Flashcards14Learners -
CCT
CCT
By: Casey Wilfling
01 - InfoSec Threats, 02 - Information Security Attacks, 03 - Information Security Fundamentals...22Decks291Flashcards3Learners -
Information Security
Information Security
By: Hanan Timraz
General Security Concepts, Cryptography, Key Management...13Decks152Flashcards6Learners -
C178 - Security+ SYO-601
C178 - Security+ SYO-601
By: Jonathan Maner
Section 1: Security Overview, Section 2: Malware, Section 3: Malware Infections...30Decks635Flashcards6Learners -
Comptia
Comptia
By: Russell Davis
Social Engineering, Determine type of attack via indicators, Application Attacks...35Decks1,194Flashcards27Learners -
Comptia SEC+
Comptia SEC+
By: Shawn Mosby
Section 2.2 Virtualization and Cloud Computing Concepts, Section 2.3 Secure Application development, deployment, and automation concepts, Section 2.4 Authentication and Authorization Design concepts...27Decks1,865Flashcards12Learners -
Digital Evidence, computer Crime.
Digital Evidence, computer Crime.
By: Makponse Yamonche
Chapter 1: Foundations of Digital Forensics, Language of Computer Crime Investigation, Chapter 3 : Digital Evidence in the Coutroom...5Decks61Flashcards7Learners -
CompTIA Sec+
CompTIA Sec+
By: James Camp
Social Engineering Techniques, Types of Attacks/Malware, Application Attacks...29Decks377Flashcards5Learners -
ECC CCE
ECC CCE
By: Kamil Gierach-Pacanek
Data Security, Network Monitoring, Analysis and Troubleshooting, Incident Response...4Decks126Flashcards1Learner -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types...41Decks1,670Flashcards24Learners -
COMP41660 Live Data Forensics
COMP41660 Live Data Forensics
By: Sunshine Stars
Week 1 - What Is LDF, Week 1 - Introduction to LDF, Week 2 - LDF Documentation & Reporting...15Decks182Flashcards7Learners -
CCSP
CCSP
By: Brian White
Module 1: Understanding Cloud Computing Concepts, Module 2: Architectural Design and Reference Requirements, Module 3: Understanding Concepts relevant to Cloud Computing...42Decks171Flashcards74Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks...35Decks546Flashcards19Learners -
CySA+
CySA+
By: Brandon R
Cryptography, Managing Risk, Public Key Infrastructure...28Decks234Flashcards3Learners -
Sec+
Sec+
By: GiGi C.
1.1 social engineering techniques, 1.2 analyze potential indicators to determine the type of attack, 1.3 potential indicators associated with application attacks...38Decks387Flashcards1Learner -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks....40Decks663Flashcards1Learner -
Security+
Security+
By: Bradley Wright
Networking Basics & Terms, Intro to Security Terms, Security Policies & Standards...19Decks143Flashcards2Learners -
USNA Cyber
USNA Cyber
By: Kris Medina
Cyber Domain & Pillars of Cyber Security, Risk, Computer Architecture...30Decks240Flashcards5Learners -
SEC+
SEC+
By: Kevin Watke
1.5: Threat Actors and Vectors, 1.6: Vulnerabilities, 1.7: Security Assessments...31Decks65Flashcards2Learners