Learn Digital Forensic
Study Digital Forensic using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(29)
Decks
Flashcards
Learners
-
Certified Cyber Forensic Professional
Certified Cyber Forensic Professional
By: Keith Beastrom
Domain 1 - Legal And Ethical Principles, Domain 2 - Investigations, Domain 3 - Forensic Science...6Decks50Flashcards3Learners -
CASP+
CASP+
By: Odin Boseth
Section 2: Data Considerations, Section 3: Risk Management, Section 4: Policies and Frameworks...26Decks172Flashcards1Learner -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types...41Decks1,670Flashcards24Learners -
COMP41660 Live Data Forensics
COMP41660 Live Data Forensics
By: Sunshine Stars
Week 1 - What Is LDF, Week 1 - Introduction to LDF, Week 2 - LDF Documentation & Reporting...15Decks182Flashcards7Learners -
Forensics720
Forensics720
By: Makponse Yamonche
Digital Forensics1Decks30Flashcards2Learners -
Operations and Incident Response
Operations and Incident Response
By: Chauncey Taylor
Secure Baselines, Securing wireless and mobile, Wireless Security settings...18Decks86Flashcards1Learner -
Forensic IT
Forensic IT
By: Sophie Taylor
Digital crimes and digital aided crimes, ACPO and legislation, ethics...7Decks101Flashcards1Learner -
CSF
CSF
By: Maria Beatriz Martins
1-Overview, 2 - Legal framework, 3 - Digital Investigation Process...8Decks58Flashcards2Learners -
Major Investigations
Major Investigations
By: Joana Gaspar
Intell, Evaluating intell, The value of intelligence and recap of models/ processes...9Decks138Flashcards1Learner -
CySA+ 2023
CySA+ 2023
By: Thomas Hollinghurst
1A. Identify Security Control Types obj 5.3, 1B. Importance of Threat Data and Intelligence obj 1.1, 1.2, 2A. Threats and Threat Actor Types...15Decks209Flashcards4Learners -
CISSP - Domain 7
CISSP - Domain 7
By: Floyd Mayfield
BCP (Business Continuity Plan), Incident Management 8 step lifecycle, Key Terms...15Decks75Flashcards2Learners -
USNA Cyber
USNA Cyber
By: Kris Medina
Cyber Domain & Pillars of Cyber Security, Risk, Computer Architecture...30Decks240Flashcards5Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks...35Decks546Flashcards19Learners -
Security + SY0-601
Security + SY0-601
By: Alket Shabani
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. Given a scenario, analyze potential indicators associated with network attacks....24Decks258Flashcards41Learners -
CySA+
CySA+
By: Brandon R
Cryptography, Managing Risk, Public Key Infrastructure...28Decks234Flashcards3Learners -
CSC2004: Cyber Security Fundamentals
CSC2004: Cyber Security Fundamentals
By: Jun Xian Lim
Summary: Lecture 13, Intro to Cryptography & Asymmetric Cryptography: Lecture 1, Access Control: Lecture 2...11Decks56Flashcards2Learners -
Sec+
Sec+
By: GiGi C.
1.1 social engineering techniques, 1.2 analyze potential indicators to determine the type of attack, 1.3 potential indicators associated with application attacks...38Decks387Flashcards1Learner -
Security+ Continuation
Security+ Continuation
By: Wisdom Eke
3.5 Given a scenario, implement secure mobile solutions., 3.6 Given a Scenario, apply Cybersecurity Solutions to the cloud, 3.7 Given a Scenarior, Implement Identity and account management controls...15Decks463Flashcards1Learner -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks....40Decks663Flashcards1Learner -
SOC Analyst HackTheBox Academy Path
SOC Analyst HackTheBox Academy Path
By: Kelly Martin
Introduction to Digital Forensics1Decks58Flashcards1Learner -
4.0 Operations and Incident Response
4.0 Operations and Incident Response
By: E. Slate
4.1 Organizational Security, 4.2 Policies / Processes Incident Response, 4.3 Incident Investigation...5Decks25Flashcards2Learners -
Criminology
Criminology
By: Chloe Wren
W2: Green Criminology, W2: Understanding Crime, W3: Digital Forensics3Decks34Flashcards1Learner -
Infosec
Infosec
By: Xeroxis Labz
CEH, Digital Forensics, Cryptography3Decks21Flashcards1Learner -
Incident Response
Incident Response
By: Jonathan Nuqui
Incident Response Process, Threat Hunting, Root Cause Analysis...6Decks43Flashcards1Learner -
SEC+
SEC+
By: Kevin Watke
1.5: Threat Actors and Vectors, 1.6: Vulnerabilities, 1.7: Security Assessments...31Decks65Flashcards2Learners -
Percepio Security +
Percepio Security +
By: Beth Hosek
Social Engineering Techniques & Other Attack Types, Implementing Identity and Account Management & AAA Solutions, Physical Security Controls...12Decks38Flashcards1Learner -
CipherTechs
CipherTechs
By: Nicholas Leask
Governance, Risk & Compliance, Offensive Security Services, Defensive & Managed Services...5Decks25Flashcards1Learner -
Sec+ -> 4.0 Operations and Incident Response (16%)
Sec+ -> 4.0 Operations and Incident Response (16%)
By: Isabelle S
4.1 - Given a scenario, use the appropriate tool to assess organizational security., 4.2 - Summarize the importance of policies, processes, and procedures for incident response., 4.3 - Given an incident, utilize appropriate data sources to support an investigation....5Decks41Flashcards1Learner -
Security+
Security+
By: Anne Leach
1. Malware and IOC, 2. Attacks, 3. Threat Actors...29Decks66Flashcards1Learner