Learn Linux Security
Study Linux Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
LPIC-1 KnowledgeAreas
LPIC-1 KnowledgeAreas
By: R L
101 System Architecture KA, 102 Linux Installation and Package Management KA, 103 GNU and Unix Commands KA...10Decks240Flashcards4Learners -
CompTIA A+ CORE 2
CompTIA A+ CORE 2
By: Jared Oliver
Mobile Operating Systems, Windows OS, Installation Requirements...30Decks306Flashcards4Learners -
CE222 Operating Systems
CE222 Operating Systems
By: Julian Forrester
Lecture 1 - Basics, Lecture 2 - Linux through the shell, Lecture 3 - Function and Structure...14Decks264Flashcards32Learners -
Cybersecurity
Cybersecurity
By: Kaidyn Haun
Addresses & Hardware, Exploits & Attacks, Miscellaneous Terms...8Decks134Flashcards1Learner -
7CCSMSEN Security Engineering
7CCSMSEN Security Engineering
By: Shen R
Introduction, Notes on C, Intro To 32 Bit x86 Assembly...9Decks79Flashcards4Learners -
A+ Core 2, 220-1102
A+ Core 2, 220-1102
By: Rushby Craig
Boot and Installation Methods, Mobile Operating Systems, Windows OS...39Decks385Flashcards2Learners -
CSCI262
CSCI262
By: sarah amina
authentication: salting & bloom filter, linux basic security, access control...10Decks146Flashcards1Learner -
Introduction To Linux
Introduction To Linux
By: Tsang Anthony
Basic Linux Fundamentals, Common Linux Command, Linking Files...9Decks90Flashcards3Learners -
Intro to Information Security
Intro to Information Security
By: Noel Mora
Intro to IS, IT APPLICATIONS, IT APPLICATIONS PART 2...11Decks195Flashcards5Learners -
Mobile and Operating Systems
Mobile and Operating Systems
By: Matthew Jones
Windows, Linux, Android...11Decks111Flashcards3Learners -
Leenix
Leenix
By: 0 0
section 7 - IO redirection, piping, regex, archiving, searching, extraction, Exercise - interview skills, Linux Filesystem...12Decks183Flashcards1Learner -
Linux+
Linux+
By: Ryan Tupa
Chapter 1 Exploring Linux Commands, Chapter 2 Managing Software, Chapter 3...9Decks244Flashcards8Learners -
005
005
By: Harold Quang
Ports, E01: Linux Fundamentals & Architecture PE, E02: Linux Internals PE...7Decks180Flashcards1Learner -
SEC 160 Security Administration
SEC 160 Security Administration
By: Rachman Walker
Module 1 - The Danger, Module 2 - Fighters In The War Against Cybercrime, Module 3 - The Windows Operating System...18Decks494Flashcards1Learner -
CompTIA Linux+
CompTIA Linux+
By: Josef Mengele
Chapter 1: Exploring Linux Command Line, Chapter 2: Managing Software, Chapter 3: Configuring Hardware...10Decks127Flashcards17Learners -
CompTIA A+ 1102
CompTIA A+ 1102
By: Alejandro Legaspi
Lesson 6A Managing Linux, Lesson 6B Managing macOS, Lesson 8A Configure Workstation Security...6Decks179Flashcards3Learners -
Cybersecurity Cert
Cybersecurity Cert
By: Christina Uviovo
Common cybersecurity terminology, Core skills for cybersecurity professionals, Glossary terms from module 1...20Decks271Flashcards3Learners -
SANS Security Essential Bootcamp Style
SANS Security Essential Bootcamp Style
By: David Mills
Day 5: Windows Security, Day 6: Linux Security Essentials2Decks141Flashcards3Learners -
Chapter 42(1101) Linux Commands
Chapter 42(1101) Linux Commands
By: Lance Dunn
Basic Linux Commands, Domain 1.0 32-bit Vs 64 -bit OS, Chapter 23 Windows 7 Resource Requirements...6Decks69Flashcards1Learner -
CompTIA: A+ C2 (110-1102)
CompTIA: A+ C2 (110-1102)
By: Rachael Carling
1.5: Windows Settings, 2.2: Wireless Security, ~ 1.2: Given a scenario, use the appropriate Microsoft command-line tool...11Decks168Flashcards1Learner -
A+ 902
A+ 902
By: Z H
Windows Vista, Windows 7, Windows 8 and 8.1...60Decks459Flashcards15Learners -
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH)
By: Jeff Corbett
Introduction to Ethical Hacking, Ethics, and Legality, Footprinting and Social Engineering, Scanning and Enumeration...16Decks82Flashcards74Learners -
A+
A+
By: Laura Hendrix
Conversions and Binary, CPU, Cooling Systems...27Decks1,014Flashcards1Learner -
Cyber security Introductory RG flashcards
Cyber security Introductory RG flashcards
By: aaron nehus
.01 RG Vocab introduction to cyber security, .02 RG Vocab Information Security & Risk Management, .03 RG Vocab network security...8Decks292Flashcards1Learner -
NPDESI
NPDESI
By: Timo-Juhani Karjalainen
Intro to Network Programmability, Linux Primer for Network Engineers, Linux Networking...21Decks414Flashcards1Learner -
IT Knowledge Study 2024
IT Knowledge Study 2024
By: jsn ML
Regex, HTTP Status Codes, Common Ports...6Decks152Flashcards1Learner -
Kaplan 902 Practice Exam by Objective
Kaplan 902 Practice Exam by Objective
By: Sue-Ann Welch
Windows Operating Systems: Compare and contrast various features and requirements of Microsoft Operating Systems (Vista, 7, 8, 8.1), Windows Operating Systems: Given a scenario, install Windows PC operating systems using appropriate methods, Windows Operating Systems: Given a scenario, apply appropriate Microsoft command line tools...30Decks369Flashcards4Learners -
Network+
Network+
By: Joseph Callaghan
CySA+, Linux OS Details: File System Structure, Ports...22Decks796Flashcards1Learner -
Google Cybersecurity Quizes
Google Cybersecurity Quizes
By: Ho Sun Choe
(1) Foundations of Cybersecurity, (2) Play It Safe: Manage Security Risks, (3) Connect and Protect: Networks and Network Security...8Decks520Flashcards1Learner -
Ethical Hacking
Ethical Hacking
By: Jose N FESTIN
EH-01-P1: Introduction, 2: Network Scanning, 3. MITM Attacks...9Decks102Flashcards2Learners