Learn Network Attacks
Study Network Attacks using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Security+
Security+
By: Zoubida Regzal
1.1 Social engineering attacks, 1.2 Malware & common attacks, 1.3 Application attacks ...35Decks859Flashcards6Learners -
Security+ Exam
Security+ Exam
By: Alonzo Garza
Section 1 Overview to Security, Section 2 Malware, Section 3 Malware Infections ...34Decks787Flashcards7Learners -
Net+ 008
Net+ 008
By: Kris Stokes
Obj 1.1 OSI Model & Encapsulation, Obj 1.2 Network topologies and types, Obj 1.3 Cables, connectors, & Ethernet Standards ...26Decks614Flashcards2Learners -
CISSP - Certified Information Systems Security Professional
CISSP - Certified Information Systems Security Professional
By: Abran Tapia
1 - Security Governance, 2 - Personnel Security and Risk Management, 3 - Business Continuity Planning ...20Decks504Flashcards185Learners -
CSF Finals
CSF Finals
By: Justin Ooi
Cryptography, Access Control, Steganography ...13Decks161Flashcards1Learner -
Cyber Security Fundamentals
Cyber Security Fundamentals
By: kai heng Loh
1. Introduction to Cyber Security, 2. Access Control, 3. Steganography ...11Decks168Flashcards12Learners -
CS6250 Exam 3
CS6250 Exam 3
By: Sarin Patel
9 - Software Defined Networking, 9.1 - Programming SDNs, 10 - Traffic Engineering ...7Decks107Flashcards26Learners -
ITN 260
ITN 260
By: Joe Schmoe
Chapter 1 - introduction To Security, Chapter 15 - Risk Mitigation, Chapter 8 - Wireless Network Security ...15Decks567Flashcards5Learners -
CEH Exam Guide 3rd Ed, for CEH Exam v9
CEH Exam Guide 3rd Ed, for CEH Exam v9
By: Stephen Holden
Chapter 1 - Essential Knowledge (Introduction to Ethical Hacking), Chapter 2 - Reconnaissance (Footprinting and Reconnaissance), Chapter 3 - Scanning and Enumeration (Scanning Networks) ...17Decks545Flashcards43Learners -
CompTIA Security+
CompTIA Security+
By: Agustín Covarrubias
Network, Cloud, Governance, Risk and Compliance ...7Decks409Flashcards2Learners -
Systems Security
Systems Security
By: Amanda Greene
Mistake Review, Key Principles, Attacks ...8Decks119Flashcards4Learners -
Computer Science
Computer Science
By: Ansh Somani
Architecture of the CPU, Memory and Storage, Data Storage ...6Decks385Flashcards4Learners -
CSCI 4130 - Intro to Cybersecurity
CSCI 4130 - Intro to Cybersecurity
By: Kelly Wei
Security Principles, Control Hijacking - Attacks, Control Hijacking - Defenses ...11Decks437Flashcards4Learners -
CompTIA Security +
CompTIA Security +
By: Andre Bangala
Security + Acronyms, Security + Acronyms, Security + Acronyms ...29Decks390Flashcards1Learner -
CompTIA Network+ Objective
CompTIA Network+ Objective
By: Mr. Rodgers
1.1 Compare and contrast the Open Systems Interconnection (OSI) model layers and encapsulation concepts, 1.2 Explain the characteristics of network topologies and network types., 1.3 Summarize the types of cables and connectors and explain which is the appropriate type for a solution ...28Decks577Flashcards1Learner -
Security & Networks
Security & Networks
By: Saabarin Dirie
Access control, web attacks - sql injections, web attacks -- part 1 ...14Decks311Flashcards1Learner -
CISSP Power Notes
CISSP Power Notes
By: Dola Sang
Chapter 6- Cryptography and Symmetric Key Algorithms, Chapter 7: PKI and Cryptographic Applications, Chapter 8- Security Models, Design and Capabilities ...14Decks1,367Flashcards4Learners -
Module K: Security
Module K: Security
By: Harold Quang
K01 - Gathering Information, K02 - Network Scan Enumeration, K03 - Client Side Attacks ...5Decks153Flashcards4Learners -
SEC541
SEC541
By: Jake Thundersnake
Section 1: Management Plane and Network Attacks, Section 2: Compute and Application Attacks, Section 3: Security Services and Data Discovery ...7Decks302Flashcards1Learner -
Security+
Security+
By: Sean Shirley
Basics and fundamentals, General Security threats, Generally Mitigating Threats ...41Decks807Flashcards1Learner -
CyberOPS
CyberOPS
By: Chris Northrup
Module 1, Module 2, Module 3 ...20Decks473Flashcards13Learners -
Cybersecurity
Cybersecurity
By: Ben Brown
Threats, Vulnerabilities, Exploits and Risks, Attack Vectors, Network Vulnerability Testing ...6Decks68Flashcards1Learner -
Security+ 101
Security+ 101
By: Mishi Learns
Social Engineering, Malware, Application Attacks ...6Decks179Flashcards1Learner -
CCT
CCT
By: Casey Wilfling
01 - InfoSec Threats, 02 - Information Security Attacks, 03 - Information Security Fundamentals ...22Decks291Flashcards3Learners -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types ...41Decks1,670Flashcards21Learners -
CompTIA Sec+ Cert Exam (501)
CompTIA Sec+ Cert Exam (501)
By: Raaay Shell
Lesson 1: Comparing and Contrasting Attacks, Lesson 2: Comparing and Contrasting Security Controls, Lesson 3: Assessing Security Posture with Software Tools ...15Decks1,091Flashcards12Learners -
NS
NS
By: Elainehehe Unknown
OSPF Routing, OSPF Security, Access Control Lists ...8Decks126Flashcards1Learner -
CISSP OSG
CISSP OSG
By: Sad Summertron
Chapter 3: Business Continuity Planning, Chapter 4: Laws, Regulations, and Compliance, Chapter 5: Protecting Security of Assets ...19Decks477Flashcards43Learners -
Security+ Cert Darril Gibson
Security+ Cert Darril Gibson
By: IT Consultant Allen
Chapter 1 Mastering Security Basics, Other Questions, Chapter 2 Understanding Identity and Access Management ...12Decks307Flashcards12Learners -
CompTIA A+220-1002
CompTIA A+220-1002
By: Pat Man
Basic Linux Commands, Microsoft Command Line Tool, The Windows Control Panel ...27Decks344Flashcards50Learners