Learn Digital Forensics
Study Digital Forensics using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Sec+
Sec+
By: Zach Harvey
Ports and protocols, Social Engineering, Attack types ...37Decks577Flashcards3Learners -
UOFG_CYBER_SECURITY
UOFG_CYBER_SECURITY
By: michal wozniak
Lecture 1 - Introduction, Lecture 2 - Networks, Lecture 3 - Access Control Basics ...18Decks236Flashcards1Learner -
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
By: Alex valentine
Malware and Indicators of Compromise, Attacks, Threat Actors ...29Decks412Flashcards6Learners -
Security+
Security+
By: Gary Hartzell
Threats, Offensive Security, Cloud ...10Decks90Flashcards1Learner -
Raj CompTIA Security+ Flashcards
Raj CompTIA Security+ Flashcards
By: Raj Jagannathan
12A - Incident Response (Analysis), 12B - Digital Forensics (Acquisition), 12C - Data Sources (Application and Endpoint logs) ...9Decks137Flashcards1Learner -
Sec+ 601 Practice Questions
Sec+ 601 Practice Questions
By: Kris G
Lesson 1: Comparing Security Roles and Security Controls, Lesson 2: Explaining Threat Actors and Threat Intelligence, Lesson 3: Performing Security Assessments ...21Decks305Flashcards150Learners -
Comptia
Comptia
By: Russell Davis
Social Engineering, Determine type of attack via indicators, Application Attacks ...35Decks1,194Flashcards27Learners -
Security+ 601
Security+ 601
By: Will Schmidt
Sec+ Chapter 01: Today's Security Professional, Sec+ Chapter 02: Cybersecurity Threat Landscape, Sec+ Chapter 03: Malicious Code ...18Decks921Flashcards4Learners -
Security+
Security+
By: Jonathan Russial
Chapter 1 - General Concepts, Chapter 2 - Threat Landscape, Chapter 3 - Malicious Code ...20Decks650Flashcards1Learner -
CPCI
CPCI
By: Village Fitness
Intro Into Criminal Investigations, Case Management, Documenting Investigations ...27Decks330Flashcards2Learners -
Intro to Crime Scene Investigation
Intro to Crime Scene Investigation
By: Heleyna Godfrey
Roles Responsibilities and Myths, Searching and Collection, Glass and Physical Evidence ...15Decks148Flashcards1Learner -
Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations
By: Clayton Littell
Understanding the Digital Forensics Profession and Investigations1Decks27Flashcards3Learners -
Cyber
Cyber
By: Skylar Melis
Types of Hackers, Ethical Hacking vs. Penetration Testing vs. Auditing, Common Hacking Methodologies ...13Decks53Flashcards2Learners -
Comptia SEC+
Comptia SEC+
By: Shawn Mosby
Section 2.2 Virtualization and Cloud Computing Concepts, Section 2.3 Secure Application development, deployment, and automation concepts, Section 2.4 Authentication and Authorization Design concepts ...27Decks1,865Flashcards12Learners -
CompTIA Sec+
CompTIA Sec+
By: James Camp
Social Engineering Techniques, Types of Attacks/Malware, Application Attacks ...29Decks377Flashcards5Learners -
Guide to Computer Forensics and Investigations: Fifth Edition
Guide to Computer Forensics and Investigations: Fifth Edition
By: Cynthia Anan
Chapter 5: Working with Windows and CLI Systems, Chapter 6: Current Digital Forensics Tools, Chapter 7: Linux and Macintosh File Systems ...4Decks45Flashcards6Learners -
Security+
Security+
By: Zoubida Regzal
1.1 Social engineering attacks, 1.2 Malware & common attacks, 1.3 Application attacks ...35Decks859Flashcards6Learners -
CASP+
CASP+
By: Odin Boseth
Section 2: Data Considerations, Section 3: Risk Management, Section 4: Policies and Frameworks ...26Decks172Flashcards1Learner -
4.0 - Operations and Incident Response
4.0 - Operations and Incident Response
By: Melissa Andrews
4.1 Operations and Incident Response (IR), 4.2 IR Policies, Processes, and Procedures, 4.3 Data Sources for Investation ...5Decks122Flashcards2Learners -
Certified Cyber Forensic Professional
Certified Cyber Forensic Professional
By: Keith Beastrom
Domain 1 - Legal And Ethical Principles, Domain 2 - Investigations, Domain 3 - Forensic Science ...6Decks50Flashcards3Learners -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types ...41Decks1,670Flashcards17Learners -
COMP41660 Live Data Forensics
COMP41660 Live Data Forensics
By: Sunshine Stars
Week 1 - What Is LDF, Week 1 - Introduction to LDF, Week 2 - LDF Documentation & Reporting ...15Decks182Flashcards5Learners -
HNC Cyber Graded Unit
HNC Cyber Graded Unit
By: William Pearce
Overview Flashcards, Networking Flashcards, Ethical Hacking Flashcards ...5Decks123Flashcards1Learner -
Operations and Incident Response
Operations and Incident Response
By: Chauncey Taylor
Secure Baselines, Securing wireless and mobile, Wireless Security settings ...18Decks86Flashcards1Learner -
Forensics720
Forensics720
By: Makponse Yamonche
Digital Forensics1Decks30Flashcards2Learners -
CompTIA Sec+
CompTIA Sec+
By: James Groth
GCGA Ch. 1 Mastering Security Basics, GCGA Ch.2 Understanding Identity and Access Management, GCGA Ch. 3 Exploring Network Technologies and Tools ...19Decks469Flashcards1Learner -
CSF
CSF
By: Maria Beatriz Martins
1-Overview, 2 - Legal framework, 3 - Digital Investigation Process ...8Decks58Flashcards2Learners -
Security Advanced
Security Advanced
By: Abdul A
Security Management, 03 - Threat Modeling, 04 Incident Response ...5Decks82Flashcards1Learner -
Security + SY0-601
Security + SY0-601
By: Alket Shabani
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. Given a scenario, analyze potential indicators associated with network attacks. ...24Decks258Flashcards41Learners -
Major Investigations
Major Investigations
By: Joana Gaspar
Intell, Evaluating intell, The value of intelligence and recap of models/ processes ...9Decks138Flashcards1Learner