Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Crypto & Security
Crypto & Security
By: Sven Dukker
Classical Systems, Defining Security, Block Ciphers8Decks182Flashcards1Learner -
ICT
ICT
By: Unknown Unknown
1.1.1 - structure and function of the processor, 1.1.2 - types of processor, 1.2.4 - types of programming language14Decks212Flashcards1Learner -
AWS Data Specialty
AWS Data Specialty
By: Edson Andrade
AWS Data Collections, AWS Data Storage, AWS Data Processing20Decks961Flashcards2Learners -
CND
CND
By: Clark Graves
Port Scanners, Packet Analysis 1, Packet Analysis 210Decks241Flashcards2Learners -
* AWS Certified Solutions Architect - Associate
* AWS Certified Solutions Architect - Associate
By: Jana Dohman
Introduction, IAM & AWS CLI, EC2 Fundamentals28Decks879Flashcards7Learners -
Data Security
Data Security
By: Tatiana Marin
CH-7 Industrial Espionage, CH-6 Techniques Used by Hackers, CH-5 Malware5Decks143Flashcards1Learner -
Unit 1 | Section D | Protecting Data
Unit 1 | Section D | Protecting Data
By: Luke Zizka
T1 | Threats to Data, T2 | Impact of threats to data, Information and Systems, T3 | Protecting Data6Decks125Flashcards1Learner -
OCR A LEVEL COMPUTER SCIENCE
OCR A LEVEL COMPUTER SCIENCE
By: Zack Walsh
1.1.1 Structure and function of the processor, 1.1.2 Types of processor, 1.1.3 Input, output and storage20Decks333Flashcards6Learners -
Computer Science
Computer Science
By: Fiachra Bohan
1.1.1 Structure and Function of the Processor, 1.1.2 Types of Processor, 1.1.3 Input Output devices12Decks295Flashcards3Learners -
Computer science - Security and ethics
Computer science - Security and ethics
By: Bosun Gonza
Computer ethics, Security issues, SSL and TLS protocols7Decks58Flashcards2Learners -
601 Review Questions
601 Review Questions
By: L PUA
Missed Questions, Secure Protocols Questions, Acronyms "A"29Decks597Flashcards2Learners -
GATECH
GATECH
By: Blake Wills
GDB, OS Midterm Review, PThreads13Decks194Flashcards2Learners -
ag-AWS Developer Associate
ag-AWS Developer Associate
By: Anti Gondu
Network and VPC, EBS, EFS And Storage Gateway, Network And VPC COPY29Decks899Flashcards1Learner -
Security+
Security+
By: Kevin Zheng
Encryption Algorithms, Certificate Formats, Ports26Decks242Flashcards1Learner -
6035 supplement
6035 supplement
By: Phillip Son
P2L5 Intro to Cryptography, P2L6 Symmetric Encryption, Public Key crypto6Decks96Flashcards4Learners -
Cyber security
Cyber security
By: lewis harris
cybersecurity keywords, Encryption and keys, Unit Revision3Decks55Flashcards3Learners -
Security+ SY601 RC
Security+ SY601 RC
By: Roman Cano
1: 5 Common Attacks, 1: 6 Understanding Vulnerability Types, 1: 7 Vulnerability Scanning29Decks640Flashcards5Learners -
CompTia A+ Software Part 2
CompTia A+ Software Part 2
By: Jacob McFarland
Networking, Network Hardware, Ethernet32Decks304Flashcards22Learners -
Computing
Computing
By: JuStAloT OfJiBbErRiSh
SLR1.2 part 2, SLR1.3 types of networks, SLR1.3 factors that affect performance in networks23Decks292Flashcards2Learners -
cs ocr p1
cs ocr p1
By: MG G
1.1.1 Structure and function of the processor, 1.1.2 Types of processor, 1.1.3 Input, output and storage11Decks97Flashcards2Learners -
Ports and Protocols
Ports and Protocols
By: Nigel Lim
Ports and Protocols, Types of Hackers, Threats to VMS13Decks86Flashcards1Learner -
Computer Security
Computer Security
By: Ben Shef
1. Network security: Networking Principles, 2. Network security: ARP, TCP/IP and its vulnerabilities, 3. Cryptography: introduction18Decks267Flashcards26Learners -
Computer Science A Level
Computer Science A Level
By: Daniel Javeed
1. Number Systems, 2. Truth Tables and Logic Gates, 3. Boolean Algebra18Decks134Flashcards26Learners -
GCSE Computing
GCSE Computing
By: Harry Brown
Purpose of the CPU, Common CPU Components, Von-Neumann Architecture12Decks132Flashcards6Learners -
AWS SAA
AWS SAA
By: Roberto Battaglia
Region and Zones, EC2, Storage18Decks213Flashcards1Learner -
CND
CND
By: Alex Bachman
PORT SCANNING PEs, Packet Analysis 1 PEs, Packet Analysis 2 PEs11Decks288Flashcards4Learners -
Computer Science
Computer Science
By: Kurtis HALLETT
Number Systems, Units of information, Representing sound13Decks157Flashcards2Learners -
IS3440 LINUX SECURITY
IS3440 LINUX SECURITY
By: Barbara Crable
IS3440 CHAP 1 SECURITY THREATS TO LINUX, IS3440 CHAP 2 BASIC COMPONENTS OF LINUX SECURITY, IS3440 CHAP 3 BASIC SECURITY: FACILITIES THROUGH THE BOOT PROCESS15Decks616Flashcards107Learners -
Network+
Network+
By: Michael Small
802.11 Standards, Protocols and Ports, Copper Cable Standards15Decks140Flashcards1Learner -
ADC
ADC
By: Asela Prasanna
Flow Control, Congestion Control, Encryption and Decryption3Decks25Flashcards1Learner