Learn Digital Forensics
Study Digital Forensics using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
UOFG_CYBER_SECURITY
UOFG_CYBER_SECURITY
By: michal wozniak
Lecture 1 - Introduction, Lecture 2 - Networks, Lecture 3 - Access Control Basics ...18Decks236Flashcards1Learner -
(6) CompTia Security+ SY0-601 Definitions
(6) CompTia Security+ SY0-601 Definitions
By: Maciej Węgrzynowski
1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application Attacks ...47Decks1,691Flashcards29Learners -
Sec+
Sec+
By: Zach Harvey
Ports and protocols, Social Engineering, Attack types ...37Decks577Flashcards3Learners -
CS449 Exam 2
CS449 Exam 2
By: Geno Brown
The Discipline of Internet Forensics, Bruce Schneier on Future Digital Threats, A Protocol Layer Survey of Network Security ...6Decks74Flashcards1Learner -
Computer Forensics
Computer Forensics
By: Anna Speigner
Book One-Chapter One, Book One-Chapter Two, Book One-Chapter Three ...19Decks219Flashcards18Learners -
Security+
Security+
By: Gary Hartzell
Threats, Offensive Security, Cloud ...10Decks90Flashcards1Learner -
Wall prep
Wall prep
By: Lhasa Odessa
CSS Attacks, Directory Commands, Frye vs Daubert ...11Decks270Flashcards1Learner -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
1.1 Social Engineering, 1.2 Attack Types, 1.3 Application Attacks ...35Decks722Flashcards18Learners -
Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations
By: Clayton Littell
Understanding the Digital Forensics Profession and Investigations1Decks27Flashcards4Learners -
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
By: Alex valentine
Malware and Indicators of Compromise, Attacks, Threat Actors ...29Decks412Flashcards5Learners -
Digital Class
Digital Class
By: Leigh-Ann Hood
Image Acquisition, Digital images and point processing, Photo forgery ...16Decks134Flashcards1Learner -
Security+ 601
Security+ 601
By: Will Schmidt
Sec+ Chapter 01: Today's Security Professional, Sec+ Chapter 02: Cybersecurity Threat Landscape, Sec+ Chapter 03: Malicious Code ...18Decks921Flashcards4Learners -
Comptia
Comptia
By: Russell Davis
Social Engineering, Determine type of attack via indicators, Application Attacks ...35Decks1,194Flashcards22Learners -
Sec+ 601 Practice Questions
Sec+ 601 Practice Questions
By: Kris G
Lesson 1: Comparing Security Roles and Security Controls, Lesson 2: Explaining Threat Actors and Threat Intelligence, Lesson 3: Performing Security Assessments ...21Decks305Flashcards124Learners -
Security+
Security+
By: Jonathan Russial
Chapter 1 - General Concepts, Chapter 2 - Threat Landscape, Chapter 3 - Malicious Code ...19Decks621Flashcards1Learner -
CyberOPS
CyberOPS
By: Chris Northrup
Module 1, Module 2, Module 3 ...20Decks473Flashcards1Learner -
Comptia SEC+
Comptia SEC+
By: Shawn Mosby
Section 2.2 Virtualization and Cloud Computing Concepts, Section 2.3 Secure Application development, deployment, and automation concepts, Section 2.4 Authentication and Authorization Design concepts ...27Decks1,865Flashcards11Learners -
Guide to Computer Forensics and Investigations: Fifth Edition
Guide to Computer Forensics and Investigations: Fifth Edition
By: Cynthia Anan
Chapter 5: Working with Windows and CLI Systems, Chapter 6: Current Digital Forensics Tools, Chapter 7: Linux and Macintosh File Systems ...4Decks45Flashcards6Learners -
Cyber
Cyber
By: Skylar Melis
Types of Hackers, Ethical Hacking vs. Penetration Testing vs. Auditing, Common Hacking Methodologies ...13Decks53Flashcards2Learners -
4.0 - Operations and Incident Response
4.0 - Operations and Incident Response
By: Melissa Andrews
4.1 Operations and Incident Response (IR), 4.2 IR Policies, Processes, and Procedures, 4.3 Data Sources for Investation ...5Decks122Flashcards2Learners -
CompTIA Sec+
CompTIA Sec+
By: James Camp
Social Engineering Techniques, Types of Attacks/Malware, Application Attacks ...29Decks377Flashcards5Learners -
Security+
Security+
By: Zoubida Regzal
1.1 Social engineering attacks, 1.2 Malware & common attacks, 1.3 Application attacks ...35Decks859Flashcards6Learners -
CASP+
CASP+
By: Odin Boseth
Section 2: Data Considerations, Section 3: Risk Management, Section 4: Policies and Frameworks ...26Decks172Flashcards1Learner -
Certified Cyber Forensic Professional
Certified Cyber Forensic Professional
By: Keith Beastrom
Domain 1 - Legal And Ethical Principles, Domain 2 - Investigations, Domain 3 - Forensic Science ...6Decks50Flashcards3Learners -
CSF
CSF
By: Maria Beatriz Martins
1-Overview, 2 - Legal framework, 3 - Digital Investigation Process ...8Decks58Flashcards2Learners -
Forensics720
Forensics720
By: Makponse Yamonche
Digital Forensics1Decks30Flashcards2Learners -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types ...41Decks1,670Flashcards5Learners -
Forensic IT
Forensic IT
By: Sophie Taylor
Digital crimes and digital aided crimes, ACPO and legislation, ethics ...7Decks101Flashcards1Learner -
CySA+ 2023
CySA+ 2023
By: Thomas Hollinghurst
1A. Identify Security Control Types obj 5.3, 1B. Importance of Threat Data and Intelligence obj 1.1, 1.2, 2A. Threats and Threat Actor Types ...15Decks209Flashcards4Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...35Decks546Flashcards19Learners