Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
SEC 401 - Security Essentials
SEC 401 - Security Essentials
By: m a
Day 1 - Network Security Essentials, Day 2 - Defense-in-Depth and Attacks, Day 3 - Threat Management6Decks170Flashcards15Learners -
SEC+
SEC+
By: Alexander Gendron
Crypto, Symmetric Encryption, Asymmetric Encryption18Decks162Flashcards3Learners -
Security + SY0-601
Security + SY0-601
By: Alket Shabani
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. Given a scenario, analyze potential indicators associated with network attacks.24Decks258Flashcards39Learners -
CompTIA Sec+ Practice (501)
CompTIA Sec+ Practice (501)
By: Raaay Shell
1.5 Explain vulnerability scanning concepts, 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks14Decks442Flashcards77Learners -
SSCP
SSCP
By: Nap Escasinas
Chapter 1 - Security Fundamentals, Chapter 2 - Access Controls, Chapter 3 - Basic Networking and Communications14Decks321Flashcards5Learners -
CS111 InfoSec
CS111 InfoSec
By: Thomas Collins
Lectures up to 9/2, Public Key Cryptography, Lecture 6 - Risk5Decks76Flashcards1Learner -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks35Decks546Flashcards16Learners -
CYBR 158
CYBR 158
By: Lateefat Alimi
MOD 7 - Physical Security, MOD 1 - Security Concepts and Governance, MOD 8 - Midterm16Decks378Flashcards1Learner -
CISSP Study Guide
CISSP Study Guide
By: Enosh Chang
Security Governance Through Principles and Policies, Personnel Security and Risk Management Concepts, Business Continuity Planning21Decks420Flashcards1Learner -
CISSP 2019 (tms005)
CISSP 2019 (tms005)
By: Tuck Meng Siew
Chapter 1– Security Governance through Principles and Policies, Chapter 2– Personnel Security and Risk Management Concepts, Chapter 3– Business Continuity Planning21Decks290Flashcards28Learners -
Juniper Firewall Terms
Juniper Firewall Terms
By: Philip Stroman
Juniper Firewall Terms, Network Threats and Attacks, Juniper Security Director Functionalities3Decks131Flashcards1Learner -
PKSB - final exames
PKSB - final exames
By: Tomáš Šlancar
Common - Question 1 (Quality in development), Common - Question 2 (Principy sifer), Common - Question 3 (Application of cipher alg)9Decks371Flashcards2Learners -
CISSP
CISSP
By: Eric Lekus
Chapter 1 Security Governance Through Principles and Policies, Chapter 2 Personnel Security and Risk Management, Chapter 3 Business Continuity Planning22Decks524Flashcards1Learner -
Security+
Security+
By: Camden Connell
Chapter 1 & 2 Todays Security Professional & CyberSecurity Threat Landscape, Chapter 3 Malicious Code, Chapter 4 Social Engineering, Physical, and Password Attacks16Decks633Flashcards2Learners -
SYO-601
SYO-601
By: Maria Ouvarova
Social Engineering, Types of Attack, Computing Architecture10Decks600Flashcards1Learner -
Network Security
Network Security
By: Ji Lim
Public Key Infrastructure, Email Security, IPSec9Decks70Flashcards1Learner -
CISSP
CISSP
By: David Caranfa
Risk Management, Controls, BC/DC27Decks183Flashcards1Learner -
1.4 network security
1.4 network security
By: Connie Beevers
1.4.1 threats to a network, 1.4.2 identifying data attacks2Decks22Flashcards1Learner -
SEC+ 601
SEC+ 601
By: Duc Phan
1.1: Compare and contrast different types of social engineering techniques. , 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks.9Decks222Flashcards1Learner -
Network Operations
Network Operations
By: Roisin Tunstall
Network Protocols, Firewalls and network security measures, Virtual private networks (VPNs)7Decks108Flashcards1Learner -
BTEC IT
BTEC IT
By: Jade Hickinbotham
Internal and External Threats, Mal. Ware, Networks9Decks120Flashcards4Learners -
Cyber security
Cyber security
By: Pa Broon
DES, AES, RSA, Cryptography, Kerberos10Decks74Flashcards6Learners -
CS6520 Test 3 Timothy
CS6520 Test 3 Timothy
By: Andrew Parmar
Lesson 9 - Software Defined Networking, Lesson 9.1 - Programming SDNs, Lesson 10 - Traffic Engineering6Decks200Flashcards4Learners -
03 Connect and Protect: Networks and Network Security
03 Connect and Protect: Networks and Network Security
By: Amreek Paul
WK1 Introduction to Networks, WK1 Cloud Networks, WK1 Introduction to Network Communication29Decks269Flashcards1Learner -
Comptia Security + SY0-501
Comptia Security + SY0-501
By: Nerf D
Networking, Securing systems, policies, plans, and procedures11Decks160Flashcards5Learners -
CISCO - Network Support and Security
CISCO - Network Support and Security
By: Mariano Pompili
1.1 Diagnostics and Troubleshooting Methodologies, 1.2 Network Documentation, 1.3 Help Desks17Decks281Flashcards1Learner -
CompTIA A+ Core 2 (220-1102)
CompTIA A+ Core 2 (220-1102)
By: John Vargas
Operating System 3 revision, Security, Software and Trouble Shooting49Decks1,033Flashcards3Learners -
CompTIA Security + (Based on Darril Gibson's Study Guide) SY0-501
CompTIA Security + (Based on Darril Gibson's Study Guide) SY0-501
By: Anna O'Malley
1. Mastering Security Basics, Understanding Identity and Access Managment, Exploring Network Technologies and Tools12Decks66Flashcards7Learners -
Sec+
Sec+
By: C W
Security+ nmap command prompts, Network+, Sec+ Acronyms9Decks184Flashcards5Learners -
Degree - Security and Networks
Degree - Security and Networks
By: Dominic Lees
Week 2 - Symmetric Encryption, Week 4 - Networking and Security Protocols, Week 6 - TLS5Decks36Flashcards1Learner