Learn Malware
Study Malware using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
COMP SCI
COMP SCI
By: Unknown Unknown
Overview, External Threats I: Social Engineering & Denial of Service, External Threats Part II: Backdoor Mechanisms, IP Spoofing, and MITM Attacks...15Decks145Flashcards1Learner -
CEH
CEH
By: Alex Santiago
MOD 16 - Hacking Wireless, MOD 17 - Hacking Mobile Platforms, MOD 18 - Iot and OT Hacking...13Decks164Flashcards1Learner -
Computing - Organised
Computing - Organised
By: Zayd IMRAN
Computer Systems - Translators, Data Representation - Logic Gates, Data Representation - Units...22Decks361Flashcards1Learner -
CompTIA Security+ SY0-501
CompTIA Security+ SY0-501
By: L PUA
Glossary of Terms Page 1, Glossary of Terms Page 2, Glossary of Terms Page 3...134Decks913Flashcards6Learners -
CompTIA Sec+
CompTIA Sec+
By: SERGIO FETTER
Malware, Logs2Decks32Flashcards2Learners -
A Computer Science : Unit 1
A Computer Science : Unit 1
By: ww ww
1.1.1 Architecture Introduction, 1.1.2 Von Neumann Architecture, 1.1.3 Factors affecting CPU performance...26Decks253Flashcards2Learners -
Computer Security
Computer Security
By: Sherissa Pinnock
Lecture 2, Cryptography, Authentication...5Decks56Flashcards1Learner -
Security +
Security +
By: Blayne Ehrenzeller
Social Engineering and Security Fundamentals, Malware, Password Attacks...16Decks195Flashcards1Learner -
Threats, Vulnerability, Mitigations
Threats, Vulnerability, Mitigations
By: Chauncey Taylor
Threat actors, Common threat Vectors, Memory injection...14Decks76Flashcards2Learners -
Computing
Computing
By: Ethan Turner
Computer Systems and CPU, Von Neumann Architecture, The Fetch-Decode-Execute Cycle...19Decks233Flashcards3Learners -
Security + 601
Security + 601
By: Carlos Rosado
Attacks, Threats, Vulnerabilities, Malware Variants, Types of Attacks...18Decks265Flashcards1Learner -
Firewall
Firewall
By: Leslie Book
Firewall Basics, Identify and Malware, CLI Commands...4Decks66Flashcards1Learner -
Security+
Security+
By: a a
Ports, Hashing Algorithms, Symmetric Encryption...16Decks167Flashcards3Learners -
Networking 2
Networking 2
By: Clay Casassa
Malware, Folders, and Printers, Misc, Computer Management...18Decks111Flashcards10Learners -
QRS A+ Core 2
QRS A+ Core 2
By: Elizabeth Perez
3.0 Software Troubleshooting QRS, 4.0 Operational Proceedures, 1.1 Compare and contrast common operating system types and their purposes....24Decks640Flashcards47Learners -
IS4560 HACKING AND COUNTERMEASURES
IS4560 HACKING AND COUNTERMEASURES
By: Barbara Crable
IS4560 CH 1 "Evolution of Hacking", IS4560 CH 2 TCP/IP Review, IS4560 CH 3 Cryptographic Concepts...15Decks160Flashcards25Learners -
C394
C394
By: Alex Lau
Windows 7, Windows 8, Windows 10...20Decks96Flashcards1Learner -
Ceh
Ceh
By: m m
Ports, nMap commands, HPing switches...23Decks131Flashcards4Learners -
Cybersecurity
Cybersecurity
By: Machias Boschman
Basisbegrippen van cybersecurity, Malware en Kwaadaardige code, Misleiding en oplichting...6Decks70Flashcards1Learner -
Computer Science IB
Computer Science IB
By: Unknown Unknown
Sensors, ASCII and Unicode, Protocols and DNS...42Decks450Flashcards5Learners -
Security+ 501
Security+ 501
By: maria spinosa
1.1 Malware, 2.2, 2.1...8Decks139Flashcards1Learner -
BTEC cybersecurity
BTEC cybersecurity
By: baconblock gt
keywords for ports and malware1Decks30Flashcards2Learners -
IT
IT
By: Tarik - Greatest of All Time
Powerpoint 1, Hardware Malfunctions, Misuse...11Decks56Flashcards1Learner -
Sistemi e Reti
Sistemi e Reti
By: SARA MATTIATO
Indirizzi IPv4, Indirizzi IPv6, Protocolli e Servizi...14Decks106Flashcards2Learners -
BTEC IT Compnent 3
BTEC IT Compnent 3
By: George Derrick
Setting Up Ad Hoc Networks, Network Security And Performance, Issues Afftecting Network Availability...7Decks32Flashcards4Learners -
security +
security +
By: larry neville
Chapter 1 Measuring and Weighing Risk, Chapter 2 Monitoring and Diagnosing Networks, Chapter 3 Understanding Devices and Infrastructure...12Decks238Flashcards2Learners -
IT-Sicherheit
IT-Sicherheit
By: Lucas Lahr
Informationssicherheit: Grundbegriffe und Definitionen, Authentifizierung, Passwörter...24Decks281Flashcards1Learner -
CompTIA Security+ Cert Prep: 1 Threats, Attacks, and Vulnerabilities
CompTIA Security+ Cert Prep: 1 Threats, Attacks, and Vulnerabilities
By: Joe Fu
1. Malware, 6. Vulnerability Types, 7. Vulnerability Scanning...8Decks112Flashcards2Learners -
CyberSecurity
CyberSecurity
By: Mauro Vitamia
Vulnerability Assessment, I Malware, Gli Attacchi3Decks54Flashcards1Learner -
CompTIA Security+ SY0-501 - Based on Objectives X
CompTIA Security+ SY0-501 - Based on Objectives X
By: xavier Xavier
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks....45Decks887Flashcards15Learners