Learn It Security
Study It Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Cambridge Tech IT Unit 2
Cambridge Tech IT Unit 2
By: Skye Drinkwater
1.1 Holders Of Information, 1.2 Types Of Information Storage Media, 1.3 Types Of Information Access And Storage Devices ...29Decks253Flashcards9Learners -
A level History: Stuart Britain
A level History: Stuart Britain
By: nancy ♡
The political nation and the social basis of power, James I: character, court and his favourites, James I: the finances of the Crown and attempts at reform ...26Decks1,437Flashcards26Learners -
Biology
Biology
By: Nahid Amini
Exchange Surfaces, 1.1 Cells, 1.2 Chromosome, Genome and Migration ...97Decks1,146Flashcards1Learner -
BEC
BEC
By: Virginia Sealock
Capital Budgeting, Working Capital: Inventory and Short-Term Financing, IT Software, Data, and Contingency Planning ...6Decks156Flashcards1Learner -
ICT
ICT
By: Cameron Pye
IT Security, Computer essentials2Decks188Flashcards1Learner -
A LEVEL HISTORY - STUARTS
A LEVEL HISTORY - STUARTS
By: Toby Holton
2. James I and Charles I: character, court and favourites, 3. Crown finances: weakness and attempts at reform, 4. Religion and religious divisions 1603 - 29 ...22Decks398Flashcards19Learners -
CompTIA Exams
CompTIA Exams
By: KENNEDY WALKER
IT Concepts and Terminology, Infrastructure, Applications and Software ...19Decks464Flashcards1Learner -
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH)
By: Christoph Todd
Common Terms, Zero Day Attack, Miscellaneous Computer Processes (stuff I find and look up along the way) ...66Decks320Flashcards6Learners -
Corporations
Corporations
By: user delete
FACT PATTERN 1: ORGANIZATION OF A CORPORATION- WHAT DOES IT TAKE TO FORM A CORPORATION?, FACT PATTERN 1: ORGANIZATION OF A CORPORATION- LEGAL SIGNIFICANCE OF FORMATION OF CORPORATION, FACT PATTERN 1: ORGANIZATION OF A CORPORATION- FACT PATTERN 1: ORGANIZATION OF A CORPORATION- DE FACTO CORPORATION AND CORPORATION BY ESTOPPEL ...19Decks397Flashcards17Learners -
IT theory
IT theory
By: a a
Gr10 1.1 - Thinking for Computers, Gr 10 2.1 Basic concepts of computing, Gr 10 2.2 Basic concepts of hardware ...40Decks448Flashcards5Learners -
CompTIA Security + (SY0-701)
CompTIA Security + (SY0-701)
By: Amreek Paul
Section 2.5 Threats and Vulnerabilities, Section 2.6 Confidentiality, Section 2.7 Integrity ...238Decks1,693Flashcards16Learners -
Google Cybersecurity Certificate
Google Cybersecurity Certificate
By: Eric Chapin
Foundations of Cybersecurity, Play It Safe: Manage Security Risks, Connect and Protect: Networks and Network Security ...4Decks179Flashcards1Learner -
CS-239
CS-239
By: kv Biju
Threat Modelling & Analysis, Threat Analysis and Risk Assessment, Software Liability and Economics ...9Decks91Flashcards1Learner -
Google Cybersecurity
Google Cybersecurity
By: Fabien Sacco
Foundations of Cybersecurity, Play It Safe: Manage Security Risks, Connect and Protect: Networks and Network Security ...4Decks102Flashcards1Learner -
ICT-Unit 2
ICT-Unit 2
By: Aaron Mensah
Holders of information, Types of information storage media, Types of information access and storage devices ...31Decks223Flashcards3Learners -
Hitsory A level Edexcel Topic 3 control of the people through the FDJ
Hitsory A level Edexcel Topic 3 control of the people through the FDJ
By: amia augsburger
Control of the young people via FDJ, The ministry of state security (stasi) its methods and activities, propaganda and censorship ...9Decks179Flashcards2Learners -
Most Highly Tested Topics
Most Highly Tested Topics
By: Elisabeth Jones
Torts MEE and Trickies, Crim Pro, Con Law - Essay Blurbs ...23Decks329Flashcards3Learners -
Redmill AF4
Redmill AF4
By: Simon Adams
CAPM, Efficient Frontier, Multi Factor Models ...42Decks1,082Flashcards2Learners -
DATA Protecttion
DATA Protecttion
By: Agniia Sarycheva
UNIT 1 FOUNDATIONS OF DATA PROTECTION, UNIT 2 DATA PROTECTION REQUIREMENTS ACCORDING TO GDPR, UNIT 3 DATA PROTECTION IN SPECIFIC APPLICATION AREAS ...6Decks113Flashcards1Learner -
Geography IGCSE
Geography IGCSE
By: Arlo Pickford Remove
2.1 Coastal landforms, 2.2 Coastal ecosystems, 2.3 Coastal management ...17Decks167Flashcards3Learners -
History - Labour 1964-70
History - Labour 1964-70
By: Tom Redhouse
Definitions for Britain from 1964-70, Definitions for Welfare Expansion Organisations, Political Developments: Reasons for Labour winning the 1964 Election and 1966 Election results ...39Decks611Flashcards1Learner -
COMPTIA A+ 220-1101 [Core 1]
COMPTIA A+ 220-1101 [Core 1]
By: Bilal Durrani
IT Fundamentals, 1.1 Physical Privacy & Security, 1.2 Display Components ...128Decks1,111Flashcards105Learners -
Nutrition
Nutrition
By: 00Akayuki .
Ch.1 Introduction Of Food And Nutrition, Ch.2, Ch.3 ...8Decks140Flashcards2Learners -
IT L3
IT L3
By: Ishverpal Toor
Network Classifications, Server Types, Input and Output Devices ...29Decks228Flashcards4Learners -
History
History
By: IRON Man
terms and definitions, Important people and events, Russian revolution Romanov dynasty and issues that led to it's downfall ...14Decks135Flashcards2Learners -
Hieu Audit Chap 3
Hieu Audit Chap 3
By: Hieu Nguyen
III. Inrernal Control: Transaction Cycles - Specific Transaction Cycles, III. Inrernal Control: Transaction Cycles - Revenue/Receipts - Sales, III. Inrernal Control: Transaction Cycles - Revenues/Receipts - Cash ...36Decks312Flashcards7Learners -
Cloud infrastructure and services v3
Cloud infrastructure and services v3
By: Abdoulaye MAIGA
Driving Digital transformation through cloud, Cloud reference architecture, Application ...10Decks65Flashcards1Learner -
INFO SYSTEMS (Drews)
INFO SYSTEMS (Drews)
By: Mats Beckmann
Chapter 1: Information Systems in Global Businesses Today, Chapter 2: Global E-business and Collaboration, Chapter 3: IS, Organizations and Strategy ...12Decks195Flashcards1Learner -
Security + Certification -Mike Meyers
Security + Certification -Mike Meyers
By: IT Consultant Allen
Chapter 1 Risk Management, Chapter 2 Cryptography, Chapter 3 Identity and Access Management ...11Decks36Flashcards4Learners -
AAI - IT- UNIT 2
AAI - IT- UNIT 2
By: Sehar Hussain
LO1 - 1.1 Holders Of Infrmation, LO1 - 1.2 Types Of Information Storage Media, LO1 - 1.3 Types Of Information Access And Storage Devices ...15Decks120Flashcards1Learner