Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(50)
Decks
Flashcards
Learners
-
Sec+
Sec+
By: Derrick Gubson
Ports to memorize, Network threats, Authentication20Decks533Flashcards1Learner -
IT Theory
IT Theory
By: Marco Ciatelo
Digital Divide, Expert Systems, eSecurity 1 - Personal Data4Decks111Flashcards1Learner -
Informática
Informática
By: Guilherme Oliveira
Introdução, Hardware, Linux15Decks173Flashcards2Learners -
CompTIA Security+
CompTIA Security+
By: John Giordano
Basics and Fundamentals, Threat Intelligence and Sources, Threat Hunting9Decks133Flashcards1Learner -
IntroSec
IntroSec
By: Elsa N
SB 3: Security Basics, SB 4: A Language for Security, SB 5: Policy Languages and Policy Types23Decks188Flashcards1Learner -
CompTIA Security +
CompTIA Security +
By: C Cessaro
Section 1 Risk Management, Section 2: Cryptography, Section 4: Tools of the Trade15Decks418Flashcards2Learners -
Stuff I Don't Know 1012
Stuff I Don't Know 1012
By: Sam Stone
Malware Removal Steps, Windows 10 Minimum Requirements, Windows 11 Minimum Requirements21Decks146Flashcards1Learner -
Security+
Security+
By: Hayley Smith
Social Engineering Techniques, Types of Malware &Their Indicators, Acronyms5Decks61Flashcards1Learner -
Sec+ 601 Practice Questions
Sec+ 601 Practice Questions
By: Kris G
Lesson 1: Comparing Security Roles and Security Controls, Lesson 2: Explaining Threat Actors and Threat Intelligence, Lesson 3: Performing Security Assessments21Decks305Flashcards107Learners -
Comptia A+ Core 2
Comptia A+ Core 2
By: Sr Leigh
Operating systems overview( Comptia Objective 1.1), An Overview Of Windows 7( Comptia Objective 1.2), An Overview of Windows 8 and 8.1(Comptia Objective 1.2)57Decks647Flashcards7Learners -
CompTIA Security+
CompTIA Security+
By: Nathan O'Neal
Overview of Security, Malware, Malware Infections31Decks33Flashcards1Learner -
Comptia A+
Comptia A+
By: Jose Mercedes
CPU'S, Memory pin sizes, M.2 keying characteristics34Decks456Flashcards3Learners -
CS 130
CS 130
By: Rohan Binu
Fundamental Concepts, Computer Security Basicis, Malware and Passwords13Decks154Flashcards1Learner -
CompTIA Sec+ Practice (501)
CompTIA Sec+ Practice (501)
By: Raaay Shell
1.5 Explain vulnerability scanning concepts, 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks14Decks442Flashcards77Learners -
SecEng
SecEng
By: Jonas Mayer
Introduction and Fundamentals, Security Principles, Security, Usability, Psychology20Decks205Flashcards1Learner -
Security+
Security+
By: Zoubida Regzal
1.1 Social engineering attacks, 1.2 Malware & common attacks, 1.3 Application attacks35Decks859Flashcards2Learners -
C701 Certified Ethical Hacking
C701 Certified Ethical Hacking
By: Angela Little
Malware Analysis, CEH Tools2Decks36Flashcards3Learners -
1. Threats, Attacks and Vulnerabilities
1. Threats, Attacks and Vulnerabilities
By: Matthew Schroeder
1.1 Analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast different types of attacks, 1.3 Threat actor types and attributes6Decks76Flashcards1Learner -
x study
x study
By: Sean Tonelli
Section A Engagement Life Cycle Management, Section A5 Threat Assessment, B1 IP Protocols9Decks124Flashcards3Learners -
cybersecurity
cybersecurity
By: bob duncn
Cybersecurity Test, Security Terminology, Security Technologies10Decks56Flashcards1Learner -
CompTIA Security+
CompTIA Security+
By: Salewa Aderonmu
Lesson 7 - Questions, Lesson 8 - Questions, Lesson 9 - Questions28Decks1,104Flashcards3Learners -
cs
cs
By: charlie LEWIS
OOP, cpu, registers39Decks168Flashcards1Learner -
Security+
Security+
By: Michelle Vickers
Malware Types, Attack Types, Threat Actor Types & Attributes8Decks205Flashcards1Learner -
CS3600
CS3600
By: McKenzie Messina
Unit 1: Introduction to Computer Security, Unit 2: Symmetric Cryptography, Unit 3: Integrity9Decks44Flashcards1Learner -
Informática
Informática
By: Fabio Elias
Malware, Outros2Decks50Flashcards1Learner -
CompTIA Sec+
CompTIA Sec+
By: James Camp
Social Engineering Techniques, Types of Attacks/Malware, Application Attacks29Decks377Flashcards5Learners -
CompTIA Security+ SY0-501 - Based on Objectives
CompTIA Security+ SY0-501 - Based on Objectives
By: Tánh Phạm
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks.45Decks887Flashcards490Learners -
ag-CEH v10
ag-CEH v10
By: Anti Gondu
Module 1 - Intro to Ethical Hacking, Module 2 - Footprinting and Reconnaissance, Module 3 - Scanning Networks25Decks772Flashcards2Learners -
Computing
Computing
By: Lewis Brown
Computer Malware, Scripting And Mark Up Languages, Computing Questions8Decks98Flashcards2Learners -
CISM Exam Prep
CISM Exam Prep
By: Bryan Scott
Information Security Governance, Business Continuity & Security, Incident Response20Decks186Flashcards2Learners -
Domain 5: Information Asset Protection
Domain 5: Information Asset Protection
By: Makponse Yamonche
1-Information Security Management, 1.1 : Privacy and third Party Management, 1.2: Security Incident Management17Decks270Flashcards4Learners -
cyber
cyber
By: Denis T
Malware en Aanvalstypes, Cyber rollen en CIA, stakeholders, assets, threat definities7Decks95Flashcards1Learner -
dte
dte
By: Annie Grant
Protocols, Australian Privacy Policy, network cable18Decks119Flashcards1Learner -
Computer science
Computer science
By: B Weston 10
CPU components, MEMORY, Images10Decks72Flashcards1Learner -
ITN 260
ITN 260
By: Joe Schmoe
Chapter 1 - introduction To Security, Chapter 15 - Risk Mitigation, Chapter 8 - Wireless Network Security15Decks567Flashcards2Learners -
CompTIA Security+ SY0-501
CompTIA Security+ SY0-501
By: L PUA
Glossary of Terms Page 1, Glossary of Terms Page 2, Glossary of Terms Page 3134Decks913Flashcards5Learners -
Cyber Security
Cyber Security
By: NS CodeWriter
Terms, Malware, General7Decks67Flashcards3Learners -
IMT4113 Technology
IMT4113 Technology
By: Lars Veggeland
Intro, Cryptology: intro, Cryptology: Symmetric15Decks94Flashcards8Learners -
A Computer Science : Unit 1
A Computer Science : Unit 1
By: ww ww
1.1.1 Architecture Introduction, 1.1.2 Von Neumann Architecture, 1.1.3 Factors affecting CPU performance26Decks253Flashcards2Learners -
Cyber Security
Cyber Security
By: Aiden Beck
Risk Management, Internet Of Things, Pen Testing19Decks86Flashcards2Learners -
Computing - Organised
Computing - Organised
By: Zayd IMRAN
Computer Systems - Translators, Data Representation - Logic Gates, Data Representation - Units22Decks361Flashcards1Learner -
Core 2
Core 2
By: Bridget M
2.3 Malware Detection, Removal and Prevention, 2.4 Social Engineering, 1.8 Operating System Types5Decks87Flashcards1Learner -
COMPUTER SCIENCE REVAMPED IGCSE
COMPUTER SCIENCE REVAMPED IGCSE
By: Unknown Unknown
Sensors, ASCII and Unicode, Protocols and DNS20Decks123Flashcards3Learners -
CEH
CEH
By: Alex Santiago
MOD 16 - Hacking Wireless, MOD 17 - Hacking Mobile Platforms, MOD 18 - Iot and OT Hacking13Decks164Flashcards1Learner -
Security+
Security+
By: Paul Rosario
Acronyms, Chapter 1 - Mastering Security Basics, Chapter 2 - Understanding Identity and Access Management5Decks492Flashcards2Learners -
CompTIA Security+ (SY0-501)
CompTIA Security+ (SY0-501)
By: Doops Zero
Malware, Sample Quiz Questions, Understanding Attackers3Decks63Flashcards1Learner -
IT 2020
IT 2020
By: Harvey Mills
Data Collection Methods, Malware, Threats to Data9Decks67Flashcards2Learners -
Security+
Security+
By: Kevin Zheng
Encryption Algorithms, Certificate Formats, Ports26Decks242Flashcards1Learner -
computer science
computer science
By: Stan PRICHARD
ASCII Unicode, computer protocols, network transfer10Decks60Flashcards2Learners -
COSC362
COSC362
By: Hayley Krippner
Lecture 1: Course introduction, Lecture 2: Course overview (key definitions), [TODO] Lecture 3: Number Theory and Finite Fields -- Discrete Mathematics (basic number theory, modular arithmetic, groups and fields, boolean algebra)21Decks1,305Flashcards3Learners