Learn Network Attacks
Study Network Attacks using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CompTIA Network + N10-008
CompTIA Network + N10-008
By: Danny Mishler
1.1 (OSI) model layers and encapsulation concepts, 1.2 Explain the characteristics of network topologies and network types., 1.3 Summarize the types of cables and connectors and explain which is the appropriate type for a solution. ...26Decks147Flashcards8Learners -
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH)
By: Christoph Todd
Common Terms, Zero Day Attack, Miscellaneous Computer Processes (stuff I find and look up along the way) ...66Decks320Flashcards6Learners -
Cyber Security
Cyber Security
By: Fernando Vasquez
IT Fundamentals and Security +, Operating Systems and Networking, Security Concepts ...11Decks204Flashcards1Learner -
Net+ N10-008
Net+ N10-008
By: Carlos Lorenzo
1.1 Compare and contrast the Open Systems Interconnection (OSI) model layers and encapsulation concepts, 1.2 Explain the characteristics of network topologies and network types, 1.3 Summarize the types of cables and connectors and explain which is the appropriate type for a solution. ...26Decks93Flashcards6Learners -
Certified in Cybersecurity
Certified in Cybersecurity
By: Brittany Hullum
Chapter 1: Confidentiality, Integrity, Availability, and Non-repudiation, Chapter 2: Authentication and Authorization, Chapter 3: Privacy ...16Decks281Flashcards1Learner -
CySA+
CySA+
By: Brandon R
Cryptography, Managing Risk, Public Key Infrastructure ...28Decks234Flashcards3Learners -
CISA - Domain 5
CISA - Domain 5
By: Candida Somerset
Information asset security frameworks, standards and guidelines, Part B: 5.12 Security Awareness Training, Part B : 5.13 IS Attack Methods & Techniques ...6Decks29Flashcards7Learners -
Sec×+++
Sec×+++
By: Tavon Mullaney
1, ch 13 Encryption and Hashing Concepts, ch 6 Networking Protocols and Threats ...32Decks247Flashcards4Learners -
Security +
Security +
By: Lorenzo U
5.1 Compare and contrast various types of controls, 5.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture, 1.5 Explain different threat actors, vectors, and intelligence sources ...10Decks311Flashcards2Learners -
COSC362
COSC362
By: Hayley Krippner
Lecture 1: Course introduction, Lecture 2: Course overview (key definitions), [TODO] Lecture 3: Number Theory and Finite Fields -- Discrete Mathematics (basic number theory, modular arithmetic, groups and fields, boolean algebra) ...21Decks1,305Flashcards3Learners -
CompTIA Security Tests
CompTIA Security Tests
By: Hyun Rim
CH01 Overview of Security, CH02 Malware, CH03 Malware Infection ...56Decks2,132Flashcards3Learners -
Distributed Systems
Distributed Systems
By: Mia Graham-Thompson
Distributed Systems and the Client-Server Model, Java Socket Programming, TCP ...13Decks90Flashcards2Learners -
Security+
Security+
By: a a
Ports, Hashing Algorithms, Symmetric Encryption ...16Decks167Flashcards3Learners -
Security+ GCGH Chapter 4, Securing Your Network
Security+ GCGH Chapter 4, Securing Your Network
By: StuffOffYouStuff .
Exploring Advanced Security Devices, Understanding Wireless Attacks, Securing Wireless Networks ...4Decks50Flashcards2Learners -
CompTIA A+ Core 2
CompTIA A+ Core 2
By: Birdman Jetson
1.1 Identify Basic Features of Microsoft Windows Editions, 1.2 Microsoft Command Line Tool, 1.3 Use Features & Tools of Microsoft Windows 10 Operating System (OS) ...35Decks506Flashcards16Learners -
Security Plus SYO-601
Security Plus SYO-601
By: Jason Mahan
Chapter 1 Security Fundamentals, Chapter 2 Implementing Public Key Infrastructure, Chapter 3 Identity and Access Management ...12Decks184Flashcards2Learners -
CySA+ 2023
CySA+ 2023
By: Thomas Hollinghurst
1A. Identify Security Control Types obj 5.3, 1B. Importance of Threat Data and Intelligence obj 1.1, 1.2, 2A. Threats and Threat Actor Types ...15Decks209Flashcards4Learners -
1.0 Threats, Attacks, and Vulnerabilities
1.0 Threats, Attacks, and Vulnerabilities
By: Justin Doring
1.1 Compare and contrast different types of social engineering techniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...8Decks206Flashcards1Learner -
ZSecurity Ethical Hacking: Network Hacking
ZSecurity Ethical Hacking: Network Hacking
By: Charl Swart
Network Hacking: Post Connection Attacks, Server-Side Attacks2Decks20Flashcards2Learners -
Security+ Comp TIA
Security+ Comp TIA
By: Dominic Asio
Chapter 1 Social Engineering Techniques, Chapter 2 Type of Attack Indicators, Chapter 3 Application Attack Indicators ...5Decks124Flashcards1Learner -
Application Attacks
Application Attacks
By: Jeffrey Lee
Code Injection, Vishing, Pharming and Whaling, abbreviations ...10Decks76Flashcards1Learner -
Security+ Study Pts
Security+ Study Pts
By: Carmen Menéndez
X- Security+ Exam 411, 1- Mastering the Basics, 2- Exploring Control Types/ Methods ...12Decks124Flashcards3Learners -
Test 3 Udacity videos
Test 3 Udacity videos
By: Tony Mack
9-Software Defined Networking, 9.1-Programming SDNs, 10 - Traffic Engineering ...7Decks158Flashcards1Learner -
Security + 501 - FHSU - Feb 3 - 13
Security + 501 - FHSU - Feb 3 - 13
By: Casey Tozier
Domain 1.1 - Given a scenario, analyze indicators of compromise and determine the type of malware., Domain 1.2 - Compare and contrast types of attacks., Domain 1.3 - Explain threat actor types and attributes. ...39Decks773Flashcards7Learners -
C2
C2
By: Randy Michael
Windows System Editing Tools, Windows 10 version Recommendations, Malware definitions ...12Decks69Flashcards1Learner -
Network And Security
Network And Security
By: Dejon Cox
Network Command Lines, Cyber Attacks, Security ...4Decks41Flashcards1Learner -
CompTia Swc+ SYO-601
CompTia Swc+ SYO-601
By: David Jeltema
1.2 Attack Types, 1.3 Application attacks, 1.4 Network Attacks ...7Decks124Flashcards1Learner -
CompTIA PenTest+
CompTIA PenTest+
By: Marie Jane
Planning and Scoping, Information Gathering and Vulnerability Scanning, Attacks and Exploits: Network and Application Attacks ...7Decks35Flashcards2Learners -
IntroSec
IntroSec
By: Elsa N
SB 3: Security Basics, SB 4: A Language for Security, SB 5: Policy Languages and Policy Types ...21Decks188Flashcards1Learner -
USNA Cyber
USNA Cyber
By: Kris Medina
Cyber Domain & Pillars of Cyber Security, Risk, Computer Architecture ...30Decks240Flashcards5Learners