Learn Digital Forensic
Study Digital Forensic using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Security+
Security+
By: Karin Mayville
Acronyms, 1 - Today's Security Professional, 2 - Cybersecurity Threat Landscape...19Decks487Flashcards13Learners -
CompTia Security+ SY0-601 Definitions
CompTia Security+ SY0-601 Definitions
By: Kiki's Kastle
1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application Attacks...47Decks1,691Flashcards841Learners -
2_Security+ Study Guide book
2_Security+ Study Guide book
By: Rebecca Speirs
1 Today's Security Professional, 2 Cybersecurity Threat Landscape, 3 Malicious Code...17Decks2,463Flashcards1Learner -
CCT-121
CCT-121
By: Joshua Tharrington
Cengage Chapter 1 - Understanding the Digital Forensics Profession and Operations, Cengage Chapter 2 - The Investigator's Office and Laboratory, Cengage Chapter 3 - Data Acquisition...15Decks313Flashcards3Learners -
Study CompTia SY0-601
Study CompTia SY0-601
By: J Klug
Must know Items, Security+ Acronyms, Ports to Service...24Decks746Flashcards12Learners -
UOFG_CYBER_SECURITY
UOFG_CYBER_SECURITY
By: michal wozniak
Lecture 1 - Introduction, Lecture 2 - Networks, Lecture 3 - Access Control Basics...18Decks236Flashcards1Learner -
CyberOPS
CyberOPS
By: Chris Northrup
Module 1, Module 2, Module 3...20Decks473Flashcards13Learners -
Digital Evidence, computer Crime.
Digital Evidence, computer Crime.
By: Makponse Yamonche
Chapter 1: Foundations of Digital Forensics, Language of Computer Crime Investigation, Chapter 3 : Digital Evidence in the Coutroom...5Decks61Flashcards7Learners -
Security+ SY0-601
Security+ SY0-601
By: David Wartman
1.0 Acronyms, 1.1 Social Engineering Techniques, 1.2 Malware Types...37Decks832Flashcards398Learners -
Wall prep
Wall prep
By: Lhasa Odessa
CSS Attacks, Directory Commands, Frye vs Daubert...11Decks270Flashcards1Learner -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
1.1 Social Engineering, 1.2 Attack Types, 1.3 Application Attacks...35Decks722Flashcards36Learners -
FSC300
FSC300
By: Emily Love
Photography: Intro, History, Basic Camera Function, Photography: Digital, Lenses and Exposure, Fingerprint History and Pioneers...11Decks461Flashcards1Learner -
Sec+
Sec+
By: Zach Harvey
Ports and protocols, Social Engineering, Attack types...37Decks577Flashcards3Learners -
(6) CompTia Security+ SY0-601 Definitions
(6) CompTia Security+ SY0-601 Definitions
By: Maciej Węgrzynowski
1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application Attacks...47Decks1,691Flashcards32Learners -
Computer Forensics
Computer Forensics
By: Anna Speigner
Book One-Chapter One, Book One-Chapter Two, Book One-Chapter Three...19Decks219Flashcards20Learners -
CS449 Exam 2
CS449 Exam 2
By: Geno Brown
The Discipline of Internet Forensics, Bruce Schneier on Future Digital Threats, A Protocol Layer Survey of Network Security...6Decks74Flashcards1Learner -
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
By: Alex valentine
Malware and Indicators of Compromise, Attacks, Threat Actors...29Decks412Flashcards6Learners -
Comptia
Comptia
By: Russell Davis
Social Engineering, Determine type of attack via indicators, Application Attacks...35Decks1,194Flashcards27Learners -
Security+ 601
Security+ 601
By: Will Schmidt
Sec+ Chapter 01: Today's Security Professional, Sec+ Chapter 02: Cybersecurity Threat Landscape, Sec+ Chapter 03: Malicious Code...18Decks921Flashcards4Learners -
Sec+ 601 Practice Questions
Sec+ 601 Practice Questions
By: Kris G
Lesson 1: Comparing Security Roles and Security Controls, Lesson 2: Explaining Threat Actors and Threat Intelligence, Lesson 3: Performing Security Assessments...21Decks305Flashcards154Learners -
Security+
Security+
By: Jonathan Russial
Chapter 1 - General Concepts, Chapter 2 - Threat Landscape, Chapter 3 - Malicious Code...20Decks650Flashcards2Learners -
CPCI
CPCI
By: Village Fitness
Intro Into Criminal Investigations, Case Management, Documenting Investigations...27Decks330Flashcards2Learners -
Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations
By: Clayton Littell
Understanding the Digital Forensics Profession and Investigations1Decks27Flashcards3Learners -
Security+
Security+
By: Gary Hartzell
Threats, Offensive Security, Cloud...10Decks90Flashcards2Learners -
Comptia SEC+
Comptia SEC+
By: Shawn Mosby
Section 2.2 Virtualization and Cloud Computing Concepts, Section 2.3 Secure Application development, deployment, and automation concepts, Section 2.4 Authentication and Authorization Design concepts...27Decks1,865Flashcards12Learners -
4.0 - Operations and Incident Response
4.0 - Operations and Incident Response
By: Melissa Andrews
4.1 Operations and Incident Response (IR), 4.2 IR Policies, Processes, and Procedures, 4.3 Data Sources for Investation...5Decks122Flashcards2Learners -
Security+
Security+
By: Zoubida Regzal
1.1 Social engineering attacks, 1.2 Malware & common attacks, 1.3 Application attacks...35Decks859Flashcards7Learners -
Guide to Computer Forensics and Investigations: Fifth Edition
Guide to Computer Forensics and Investigations: Fifth Edition
By: Cynthia Anan
Chapter 5: Working with Windows and CLI Systems, Chapter 6: Current Digital Forensics Tools, Chapter 7: Linux and Macintosh File Systems...4Decks45Flashcards6Learners -
CompTIA Sec+
CompTIA Sec+
By: James Camp
Social Engineering Techniques, Types of Attacks/Malware, Application Attacks...29Decks377Flashcards5Learners -
Cyber
Cyber
By: Skylar Melis
Types of Hackers, Ethical Hacking vs. Penetration Testing vs. Auditing, Common Hacking Methodologies...13Decks53Flashcards2Learners