Learn Digital Forensic
Study Digital Forensic using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Top Digital Forensic Flashcards Ranked by Quality
-
CCT-121
CCT-121
By: Joshua Tharrington
313 Cards –15 Decks –2 LearnersSample Decks: Cengage Chapter 1 - Understanding the Digital Forensics Profession and Operations, Cengage Chapter 2 - The Investigator's Office and Laboratory, Cengage Chapter 3 - Data AcquisitionShow Class -
Investigation
Investigation
By: Avery Parker
344 Cards –10 Decks –1 LearnerSample Decks: Collecting Evidence, Data Analysis And Reporting Tools….2 Answers Missing, Digital ForensicsShow Class -
Security + 601
Security + 601
By: Sean Suga
854 Cards –13 Decks –19 LearnersSample Decks: Security+ 601 Acronyms, Lesson 3: Performing Security Assessments, Lesson 4: Identifying Social Engineering and MalwareShow Class -
Cyber Security Fundamentals
Cyber Security Fundamentals
By: kai heng Loh
168 Cards –11 Decks –9 LearnersSample Decks: 1. Introduction to Cyber Security, 2. Access Control, 3. SteganographyShow Class -
Security+
Security+
By: Karin Mayville
487 Cards –19 Decks –5 LearnersSample Decks: Acronyms, 1 - Today's Security Professional, 2 - Cybersecurity Threat LandscapeShow Class -
Study CompTia SY0-601
Study CompTia SY0-601
By: J Klug
746 Cards –24 Decks –11 LearnersSample Decks: Must know Items, Security+ Acronyms, Ports to ServiceShow Class -
Security+ SY0-601
Security+ SY0-601
By: David Wartman
832 Cards –37 Decks –358 LearnersSample Decks: 1.0 Acronyms, 1.1 Social Engineering Techniques, 1.2 Malware TypesShow Class -
Digital Evidence, computer Crime.
Digital Evidence, computer Crime.
By: Makponse Yamonche
61 Cards –5 Decks –7 LearnersSample Decks: Chapter 1: Foundations of Digital Forensics, Language of Computer Crime Investigation, Chapter 3 : Digital Evidence in the CoutroomShow Class -
CS449 Exam 2
CS449 Exam 2
By: Geno Brown
74 Cards –6 Decks –1 LearnerSample Decks: The Discipline of Internet Forensics, Bruce Schneier on Future Digital Threats, A Protocol Layer Survey of Network SecurityShow Class -
Security+
Security+
By: Gary Hartzell
90 Cards –10 Decks –1 LearnerSample Decks: Threats, Offensive Security, CloudShow Class -
(6) CompTia Security+ SY0-601 Definitions
(6) CompTia Security+ SY0-601 Definitions
By: Maciej Węgrzynowski
1,691 Cards –47 Decks –26 LearnersSample Decks: 1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application AttacksShow Class -
UOFG_CYBER_SECURITY
UOFG_CYBER_SECURITY
By: michal wozniak
236 Cards –18 Decks –1 LearnerSample Decks: Lecture 1 - Introduction, Lecture 2 - Networks, Lecture 3 - Access Control BasicsShow Class -
Computer Forensics
Computer Forensics
By: Anna Speigner
219 Cards –19 Decks –16 LearnersSample Decks: Book One-Chapter One, Book One-Chapter Two, Book One-Chapter ThreeShow Class -
Sec+
Sec+
By: Zach Harvey
577 Cards –37 Decks –3 LearnersSample Decks: Ports and protocols, Social Engineering, Attack typesShow Class -
Security+ 601
Security+ 601
By: Will Schmidt
921 Cards –18 Decks –4 LearnersSample Decks: Sec+ Chapter 01: Today's Security Professional, Sec+ Chapter 02: Cybersecurity Threat Landscape, Sec+ Chapter 03: Malicious CodeShow Class -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
722 Cards –35 Decks –11 LearnersSample Decks: 1.1 Social Engineering, 1.2 Attack Types, 1.3 Application AttacksShow Class -
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
By: Alex valentine
412 Cards –29 Decks –5 LearnersSample Decks: Malware and Indicators of Compromise, Attacks, Threat ActorsShow Class -
Security+
Security+
By: Jonathan Russial
545 Cards –19 Decks –1 LearnerSample Decks: Chapter 1 - General Concepts, Chapter 2 - Threat Landscape, Chapter 3 - Malicious CodeShow Class -
Comptia
Comptia
By: Russell Davis
1,194 Cards –35 Decks –16 LearnersSample Decks: Social Engineering, Determine type of attack via indicators, Application AttacksShow Class -
Comptia SEC+
Comptia SEC+
By: Shawn Mosby
1,865 Cards –27 Decks –5 LearnersSample Decks: Section 2.2 Virtualization and Cloud Computing Concepts, Section 2.3 Secure Application development, deployment, and automation concepts, Section 2.4 Authentication and Authorization Design conceptsShow Class -
Sec+ 601 Practice Questions
Sec+ 601 Practice Questions
By: Kris G
305 Cards –21 Decks –107 LearnersSample Decks: Lesson 1: Comparing Security Roles and Security Controls, Lesson 2: Explaining Threat Actors and Threat Intelligence, Lesson 3: Performing Security AssessmentsShow Class -
CSF
CSF
By: Maria Beatriz Martins
58 Cards –8 Decks –1 LearnerSample Decks: 1-Overview, 2 - Legal framework, 3 - Digital Investigation ProcessShow Class -
Security+
Security+
By: Zoubida Regzal
859 Cards –35 Decks –2 LearnersSample Decks: 1.1 Social engineering attacks, 1.2 Malware & common attacks, 1.3 Application attacksShow Class -
Cyber
Cyber
By: Skylar Melis
53 Cards –13 Decks –2 LearnersSample Decks: Types of Hackers, Ethical Hacking vs. Penetration Testing vs. Auditing, Common Hacking MethodologiesShow Class -
CASP+
CASP+
By: Odin Boseth
172 Cards –26 Decks –1 LearnerSample Decks: Section 2: Data Considerations, Section 3: Risk Management, Section 4: Policies and FrameworksShow Class -
Guide to Computer Forensics and Investigations: Fifth Edition
Guide to Computer Forensics and Investigations: Fifth Edition
By: Cynthia Anan
45 Cards –4 Decks –6 LearnersSample Decks: Chapter 5: Working with Windows and CLI Systems, Chapter 6: Current Digital Forensics Tools, Chapter 7: Linux and Macintosh File SystemsShow Class -
CompTIA Sec+
CompTIA Sec+
By: James Camp
377 Cards –29 Decks –5 LearnersSample Decks: Social Engineering Techniques, Types of Attacks/Malware, Application AttacksShow Class -
Certified Cyber Forensic Professional
Certified Cyber Forensic Professional
By: Keith Beastrom
50 Cards –6 Decks –3 LearnersSample Decks: Domain 1 - Legal And Ethical Principles, Domain 2 - Investigations, Domain 3 - Forensic ScienceShow Class -
Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations
By: Clayton Littell
27 Cards –1 Decks –3 LearnersSample Decks: Understanding the Digital Forensics Profession and InvestigationsShow Class -
Forensics720
Forensics720
By: Makponse Yamonche
30 Cards –1 Decks –2 LearnersSample Decks: Digital ForensicsShow Class -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
1,670 Cards –41 Decks –3 LearnersSample Decks: Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack TypesShow Class -
USNA Cyber
USNA Cyber
By: Kris Medina
240 Cards –30 Decks –4 LearnersSample Decks: Cyber Domain & Pillars of Cyber Security, Risk, Computer ArchitectureShow Class -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
546 Cards –35 Decks –16 LearnersSample Decks: 1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacksShow Class -
Forensic IT
Forensic IT
By: Sophie Taylor
101 Cards –7 Decks –1 LearnerSample Decks: Digital crimes and digital aided crimes, ACPO and legislation, ethicsShow Class -
Security + SY0-601
Security + SY0-601
By: Alket Shabani
258 Cards –24 Decks –39 LearnersSample Decks: 1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. Given a scenario, analyze potential indicators associated with network attacks.Show Class -
CySA+ 2023
CySA+ 2023
By: Thomas Hollinghurst
209 Cards –15 Decks –3 LearnersSample Decks: 1A. Identify Security Control Types obj 5.3, 1B. Importance of Threat Data and Intelligence obj 1.1, 1.2, 2A. Threats and Threat Actor TypesShow Class -
Security
Security
By: elvis sanchez
662 Cards –40 Decks –1 LearnerSample Decks: 1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks.Show Class -
Sec+
Sec+
By: GiGi C.
387 Cards –38 Decks –1 LearnerSample Decks: 1.1 social engineering techniques, 1.2 analyze potential indicators to determine the type of attack, 1.3 potential indicators associated with application attacksShow Class -
4.0 - Operations and Incident Response
4.0 - Operations and Incident Response
By: Melissa Andrews
122 Cards –5 Decks –1 LearnerSample Decks: 4.1 Operations and Incident Response (IR), 4.2 IR Policies, Processes, and Procedures, 4.3 Data Sources for InvestationShow Class -
CSC2004: Cyber Security Fundamentals
CSC2004: Cyber Security Fundamentals
By: Jun Xian Lim
56 Cards –11 Decks –2 LearnersSample Decks: Summary: Lecture 13, Intro to Cryptography & Asymmetric Cryptography: Lecture 1, Access Control: Lecture 2Show Class -
Security+ Continuation
Security+ Continuation
By: Wisdom Eke
463 Cards –15 Decks –1 LearnerSample Decks: 3.5 Given a scenario, implement secure mobile solutions., 3.6 Given a Scenario, apply Cybersecurity Solutions to the cloud, 3.7 Given a Scenarior, Implement Identity and account management controlsShow Class -
CISSP - Domain 7
CISSP - Domain 7
By: Floyd Mayfield
75 Cards –15 Decks –1 LearnerSample Decks: BCP (Business Continuity Plan), Incident Management 8 step lifecycle, Key TermsShow Class -
4.0 Operations and Incident Response
4.0 Operations and Incident Response
By: E. Slate
25 Cards –5 Decks –2 LearnersSample Decks: 4.1 Organizational Security, 4.2 Policies / Processes Incident Response, 4.3 Incident InvestigationShow Class -
SOC Analyst HackTheBox Academy Path
SOC Analyst HackTheBox Academy Path
By: Kelly Martin
58 Cards –1 Decks –1 LearnerSample Decks: Introduction to Digital ForensicsShow Class -
Infosec
Infosec
By: Xeroxis Labz
21 Cards –3 Decks –1 LearnerSample Decks: CEH, Digital Forensics, CryptographyShow Class -
SEC+
SEC+
By: Kevin Watke
65 Cards –31 Decks –2 LearnersSample Decks: 1.5: Threat Actors and Vectors, 1.6: Vulnerabilities, 1.7: Security AssessmentsShow Class -
Percepio Security +
Percepio Security +
By: Beth Hosek
38 Cards –12 Decks –1 LearnerSample Decks: Social Engineering Techniques & Other Attack Types, Implementing Identity and Account Management & AAA Solutions, Physical Security ControlsShow Class -
Sec+ -> 4.0 Operations and Incident Response (16%)
Sec+ -> 4.0 Operations and Incident Response (16%)
By: Isabelle S
40 Cards –5 Decks –1 LearnerSample Decks: 4.1 - Given a scenario, use the appropriate tool to assess organizational security., 4.2 - Summarize the importance of policies, processes, and procedures for incident response., 4.3 - Given an incident, utilize appropriate data sources to support an investigation.Show Class -
CipherTechs
CipherTechs
By: Nicholas Leask
25 Cards –5 Decks –1 LearnerSample Decks: Governance, Risk & Compliance, Offensive Security Services, Defensive & Managed ServicesShow Class -
Security+
Security+
By: Anne Leach
66 Cards –29 Decks –1 LearnerSample Decks: 1. Malware and IOC, 2. Attacks, 3. Threat ActorsShow Class