Study Cryptography
Interested in solving codes? Or are you already studying Cryptography? Learn how to convert ordinary plain text into coded or unintelligible text & vice-versa.
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
ZZZ CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide
ZZZ CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide
By: Red Matter
Chapter 1 Cybersecurity Fundamentals, Chapter 1 Cybersecurity Fundamentals Definitions, Chapter 2 Cryptography ...12Decks292Flashcards9Learners -
computer science
computer science
By: Henna Hussain
python, cryptography, binary3Decks28Flashcards1Learner -
Security+
Security+
By: Karin Mayville
Acronyms, 1 - Today's Security Professional, 2 - Cybersecurity Threat Landscape ...19Decks487Flashcards13Learners -
CompTIA Sec+ SY0-501
CompTIA Sec+ SY0-501
By: cheyanne duk
Chapter 1 - Security Basics ., Chapter 2 - Understanding Identity & Access Management ., Threats, Attacks & Vulnerabilities . ...9Decks931Flashcards7Learners -
Introduction to IT Security
Introduction to IT Security
By: Mathias Unknown
Goals and Principles - What Is Security, Goals and Principles - Privacy, Goals and Principles - Design Principles for Secure Systems ...11Decks127Flashcards26Learners -
Security+
Security+
By: Richard Romick
Chapter 3: Cryptography, Common Ports, Chapter 4: Network Connectivity ...9Decks388Flashcards1Learner -
CISSP
CISSP
By: Mark Sigsbee
Access Control - Domain 1, Telecommunications - Domain 2, Software Development Security - Domain 4 ...7Decks725Flashcards11Learners -
SEC 401 - Security Essentials
SEC 401 - Security Essentials
By: m a
Day 1 - Network Security Essentials, Day 2 - Defense-in-Depth and Attacks, Day 3 - Threat Management ...6Decks170Flashcards25Learners -
CS
CS
By: Khudeja Begum
Basic Security Concepts, Cyber Actors, CALC #1 ...25Decks294Flashcards1Learner -
CS110 (discrete) 7:30-9am m-tue
CS110 (discrete) 7:30-9am m-tue
By: NOVY MAR QUILLOSA
Graph Theory in Discrete Mathematics, Number Theory in Discrete Mathematics, Probability and Statistics in Computing ...4Decks47Flashcards1Learner -
Software security
Software security
By: E Mi
Information security, concepts and principles, OWASP part 1, OWASP part 2 ...16Decks600Flashcards4Learners -
CyberSecurity
CyberSecurity
By: Rakim Allah
Chapter 11, Chapter 12, Chapter 13 ...21Decks831Flashcards127Learners -
CSBC Discord S+
CSBC Discord S+
By: Dane Andreasen
Networking Basics and Terminology (1), Networking Basics and Terminology (2), Introduction to Security Terminology ...26Decks658Flashcards35Learners -
COMP 156 Computer Concepts
COMP 156 Computer Concepts
By: G M
What's In A Computer? (Week 2), Binary + Representation of Info (Week 3), Hexidecimal, CPU, and the Toy Computer (Week 4) ...12Decks381Flashcards39Learners -
Computer Security
Computer Security
By: Pall Magnusson
Computer security and malware, Network security, Operating system security ...7Decks73Flashcards1Learner -
Sécurité informatique
Sécurité informatique
By: Charlie de Lanauze
Chapitre 1 : Histoire des codes secrets, Chapitre 2 : La confidentialité dans un système de cryptographie à clés privées, Chapitre 3 : L'intégrité à partir de clés secrètes ...6Decks70Flashcards1Learner -
Sec
Sec
By: Gian Carlo Francisco
Quiz 1, Quiz 2, L4 - Operating System Security ...18Decks310Flashcards12Learners -
2_Security+ Study Guide book
2_Security+ Study Guide book
By: Rebecca Speirs
1 Today's Security Professional, 2 Cybersecurity Threat Landscape, 3 Malicious Code ...17Decks2,463Flashcards1Learner -
Security+ Concepts
Security+ Concepts
By: erik hogberg
Cryptography & PKI, Network & Protocols, Threats, Attacks & Vulnerabilities ...9Decks393Flashcards1Learner -
Security and Programming Paradigms
Security and Programming Paradigms
By: Ab Up
Security Basics, Programming Paradigm basics, Input threats ...16Decks226Flashcards1Learner -
CISSP Study
CISSP Study
By: Logan Ninefingers
Security and Risk Management, Asset Security, Security Engineering ...13Decks572Flashcards6Learners -
CS6035 IIS
CS6035 IIS
By: Carol Cheung
Cryptography Intro, Symmetric Encryption, Public Key Cryptography ...8Decks90Flashcards6Learners -
CompTIA Security+
CompTIA Security+
By: Rene Vargas
Chapter 2 - Monitoring Networks, Chapter 1 - Measuring and Weighing Risk, Chapter 3 - Understanding Devices and infrastructure ...12Decks292Flashcards51Learners -
Principles of Data and Cybersecurity
Principles of Data and Cybersecurity
By: mary p
Chapter 5 - Networks and Telecommunications, Chapter 6 - Access Controls, Chapter 7 - Cryptography ...6Decks221Flashcards1Learner -
csc2031
csc2031
By: Alex Freeman
Security Basics, Input Threats & Validation, Handling errors ...17Decks188Flashcards5Learners -
Living in the IT Era
Living in the IT Era
By: Jan Wilhelm Sy
Chapter 0: Introduction to LITE, Chapter 2: Computer COmponents, Chapter 2.1: Computer Components P2 ...9Decks230Flashcards1Learner -
CSE 5473 Midterm
CSE 5473 Midterm
By: Josh Barbee
Network Security Basics, Classical Ciphers, Cipher Modes ...8Decks232Flashcards2Learners -
Part II
Part II
By: Steven Mai
Linear Analysis, Rep Theory, Galois Theory ...8Decks193Flashcards1Learner -
CSF Finals
CSF Finals
By: Justin Ooi
Cryptography, Access Control, Steganography ...13Decks161Flashcards1Learner -
Information Security
Information Security
By: Akila Weeratunga
Introduction, Intro to Cryptography, Hash functions and MAC ...6Decks55Flashcards4Learners
-
Entrance Exams
-
Professional Certifications
-
Foreign Languages
-
Science
-
English
-
Humanities & Social Studies
-
Mathematics
-
Medical & Nursing
-
Vocations
-
Law
-
Health & Fitness
-
Business & Finance
-
Technology & Engineering
-
Food & Beverage
-
Fine Arts
-
Random Knowledge
-
AWS Certifications
-
Architecture
-
Biotechnology
-
Computer Programming
-
Computer Science
-
Engineering
-
Graphic Design
-
Information Security
-
Information Technology
-
Management Information Systems
-
Technology Certifications