Learn Computer Forensics
Study Computer Forensics using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CompTia Security+ SY0-601 Definitions
CompTia Security+ SY0-601 Definitions
By: Kiki's Kastle
1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application Attacks ...47Decks1,691Flashcards841Learners -
Forensics S2
Forensics S2
By: Maria Fajardo
Unit 9- Hair and Fibers, Unit 10- Impression, unit 11-blood spatter and serology ...8Decks270Flashcards1Learner -
Analytical Chemistry
Analytical Chemistry
By: Sophie Taylor
Forensic Toxicology, Analytical chemistry, Sample collection, storage and preparation ...17Decks514Flashcards23Learners -
CSBC Discord S+
CSBC Discord S+
By: Dane Andreasen
Networking Basics and Terminology (1), Networking Basics and Terminology (2), Introduction to Security Terminology ...26Decks658Flashcards35Learners -
A+ Certification
A+ Certification
By: Tasha Crichlow
Computer Computents, Classes, Protocol And Ports ...14Decks164Flashcards4Learners -
Analytical Chemistry
Analytical Chemistry
By: Gaby Illston-Baggs
Forensic Toxicology, Analytical Chemistry, Sample collection, storage and preparation ...20Decks448Flashcards6Learners -
Forensics
Forensics
By: Raine Nadon
Chapter 1, Chapter 2, Chapter 3 ...14Decks205Flashcards4Learners -
CS414 - Digital Forensics
CS414 - Digital Forensics
By: Caroline Mckinlay
Week 1 - Further Overview, Week 1 - The Place of Digital Forensics, Week 1 - The Investigative Process ...30Decks316Flashcards20Learners -
Technology
Technology
By: Robert B
ITN276 - Computer Forensics - Midterm Exam - Review, ITN107 - Personal Computer and Troubleshooting - Midterm Exam - Review, ITN101 - Intro to Network Concepts - Exam 1 - Review3Decks342Flashcards5Learners -
Security+ SY0-601
Security+ SY0-601
By: David Wartman
1.0 Acronyms, 1.1 Social Engineering Techniques, 1.2 Malware Types ...37Decks832Flashcards398Learners -
(6) CompTia Security+ SY0-601 Definitions
(6) CompTia Security+ SY0-601 Definitions
By: Maciej Węgrzynowski
1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application Attacks ...47Decks1,691Flashcards32Learners -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
1.1 Social Engineering, 1.2 Attack Types, 1.3 Application Attacks ...35Decks722Flashcards34Learners -
CCT
CCT
By: Casey Wilfling
01 - InfoSec Threats, 02 - Information Security Attacks, 03 - Information Security Fundamentals ...22Decks291Flashcards3Learners -
Sec+
Sec+
By: Zach Harvey
Ports and protocols, Social Engineering, Attack types ...37Decks577Flashcards3Learners -
Information Security
Information Security
By: Hanan Timraz
General Security Concepts, Cryptography, Key Management ...13Decks152Flashcards6Learners -
Paleogenetics
Paleogenetics
By: Lina Håkansson
Intro to aDNA and paleoecology, Quartenary climate history and dating methods, Megafaunal extinctions, refugia and phylogeography ...13Decks448Flashcards1Learner -
Security Knowledge Bank
Security Knowledge Bank
By: Amie Gray
Abbreviations, Attack Mitigations, Whats that Attack ...23Decks875Flashcards13Learners -
Comptia
Comptia
By: Russell Davis
Social Engineering, Determine type of attack via indicators, Application Attacks ...35Decks1,194Flashcards26Learners -
C178 - Security+ SYO-601
C178 - Security+ SYO-601
By: Jonathan Maner
Section 1: Security Overview, Section 2: Malware, Section 3: Malware Infections ...30Decks635Flashcards6Learners -
Digital Evidence, computer Crime.
Digital Evidence, computer Crime.
By: Makponse Yamonche
Chapter 1: Foundations of Digital Forensics, Language of Computer Crime Investigation, Chapter 3 : Digital Evidence in the Coutroom ...5Decks61Flashcards7Learners -
Comptia SEC+
Comptia SEC+
By: Shawn Mosby
Section 2.2 Virtualization and Cloud Computing Concepts, Section 2.3 Secure Application development, deployment, and automation concepts, Section 2.4 Authentication and Authorization Design concepts ...27Decks1,865Flashcards12Learners -
CompTIA Sec+
CompTIA Sec+
By: James Camp
Social Engineering Techniques, Types of Attacks/Malware, Application Attacks ...29Decks377Flashcards5Learners -
ECC CCE
ECC CCE
By: Kamil Gierach-Pacanek
Data Security, Network Monitoring, Analysis and Troubleshooting, Incident Response ...4Decks126Flashcards1Learner -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types ...41Decks1,670Flashcards21Learners -
COMP41660 Live Data Forensics
COMP41660 Live Data Forensics
By: Sunshine Stars
Week 1 - What Is LDF, Week 1 - Introduction to LDF, Week 2 - LDF Documentation & Reporting ...15Decks182Flashcards7Learners -
CCSP
CCSP
By: Brian White
Module 1: Understanding Cloud Computing Concepts, Module 2: Architectural Design and Reference Requirements, Module 3: Understanding Concepts relevant to Cloud Computing ...42Decks171Flashcards74Learners -
CyberSecurity
CyberSecurity
By: Yarnell Dixon
Designing your Cybersecurity Infrastructure Week 1, Designing your Cybersecurity Infrastructure Week 2, Designing your Cybersecurity Infrastructure Week 3 ...36Decks360Flashcards1Learner -
CySA+
CySA+
By: Brandon R
Cryptography, Managing Risk, Public Key Infrastructure ...28Decks234Flashcards3Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...35Decks546Flashcards19Learners -
Sec+
Sec+
By: GiGi C.
1.1 social engineering techniques, 1.2 analyze potential indicators to determine the type of attack, 1.3 potential indicators associated with application attacks ...38Decks387Flashcards1Learner