Learn Pki
Study Pki using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CISSP Sybex Study Guide
CISSP Sybex Study Guide
By: Rebecca Ma
Chapter 1 - Security Governance Through Principles And Policies, Chapter 2 - Personnel Security And Risk Management Concepts, Chapter 3 - Business Continuty Planning ...22Decks455Flashcards240Learners -
CISSP
CISSP
By: Emma Smith
Chapter 1 - Governance, Chapter 3 - BCP, Chapter 4 - Legal ...11Decks175Flashcards5Learners -
CISSP OSG
CISSP OSG
By: Sad Summertron
Chapter 3: Business Continuity Planning, Chapter 4: Laws, Regulations, and Compliance, Chapter 5: Protecting Security of Assets ...19Decks477Flashcards43Learners -
Security+
Security+
By: Jonathan Russial
Chapter 1 - General Concepts, Chapter 2 - Threat Landscape, Chapter 3 - Malicious Code ...20Decks650Flashcards2Learners -
Capstone Project (Security+)
Capstone Project (Security+)
By: Kyle Rathbone
Threat Management and Cybersecurity Resources, Threats And Attacks On Endpoints, Endpoint and Application Development Security ...6Decks273Flashcards1Learner -
ICN
ICN
By: James Whittaker
Numérisation et Cyber-criminalité, Étude des traces analogiques & numériques, Composant d'un Ordinateur ...15Decks320Flashcards1Learner -
Miscellaneous Stuff Not for Studying
Miscellaneous Stuff Not for Studying
By: Kerry Gambrel
Regulations, standards, and frameworks, Security Controls and stuff, 4A Compare and Contrast Social Engineering Techniques ...9Decks237Flashcards1Learner -
CompTIA Sec+
CompTIA Sec+
By: James Groth
GCGA Ch. 1 Mastering Security Basics, GCGA Ch.2 Understanding Identity and Access Management, GCGA Ch. 3 Exploring Network Technologies and Tools ...62Decks857Flashcards1Learner -
Comptia Security + SY0-501
Comptia Security + SY0-501
By: Nerf D
Networking, Securing systems, policies, plans, and procedures ...11Decks160Flashcards5Learners -
ITN 260
ITN 260
By: Joe Schmoe
Chapter 1 - introduction To Security, Chapter 15 - Risk Mitigation, Chapter 8 - Wireless Network Security ...15Decks567Flashcards5Learners -
crypto
crypto
By: Samuel Amoah
pki, certificates2Decks70Flashcards1Learner -
SecuSys
SecuSys
By: Ben Gr
Le système d'information de l'organisation, Authentification, Backup ...6Decks97Flashcards2Learners -
Cybersecurity
Cybersecurity
By: Cyred Datuin
Security Controls, CIA, non-repudiation, authentication., Zero trust, deception & disruption, change management ...12Decks202Flashcards1Learner -
Security +
Security +
By: Chris Quinn
Chapter 3a - Networking, Chapter 3b - Protocols, Miscellaneous ...13Decks553Flashcards1Learner -
NetSec
NetSec
By: Jodok Vieli
PKI, TLS Protocol, TLS Attacks ...13Decks142Flashcards3Learners -
Kindle 601 Review
Kindle 601 Review
By: Mer Gimeno
Implementing PKI, Understanding Security Fundamentals, Test3Decks96Flashcards1Learner -
Rattrapage ICN
Rattrapage ICN
By: Ines Pinton
Syteme et gestion de fichiers, Numerisation cyber-criminalite et hygiene de vie numerique, Rapport OSAC ...30Decks251Flashcards3Learners -
IMT4113 Technology
IMT4113 Technology
By: Lars Veggeland
Intro, Cryptology: intro, Cryptology: Symmetric ...15Decks94Flashcards8Learners -
Cryptographic Solutions
Cryptographic Solutions
By: Jonathan Nuqui
Cryptographic Solutions, Symmetric Algorithms, Asymmetric Algorithms ...9Decks61Flashcards1Learner -
Q&A
Q&A
By: Young K
Attacks, VPN, Technical ...10Decks217Flashcards1Learner -
Informasjonssikkerhet
Informasjonssikkerhet
By: Natalia Groot
Begreper - kapittel 1, Brukerautentisering - kapittel 6, Kryptografy - kapittel 3 ...11Decks169Flashcards1Learner -
Cryptography Extra 2
Cryptography Extra 2
By: Bijan Fardjad
Asymmetric Cryptography 1, Symmetric Cryptography - Confusion / Diffusion etc ..., Symmetric Cryptography 2 - CTR, OFB, CBC, etc ... ...8Decks58Flashcards4Learners -
CYBR 158
CYBR 158
By: Lateefat Alimi
MOD 7 - Physical Security, MOD 1 - Security Concepts and Governance, MOD 8 - Midterm ...15Decks378Flashcards2Learners -
Informatikai rendszerek és szolgáltatások biztonsága
Informatikai rendszerek és szolgáltatások biztonsága
By: user delete
Ismertesse a szerver operációs rendszerekkel szemben támasztott legfontosabb biztonsági követelményeket és hogyan felel meg ezeknek, illetve milyen szolgáltatásokat nyújt a Windows Server 2012 operációs rendszer. Követelmények OS-sel szemben, Ismertesse hogyan biztosítható a címtárak és a fájlrendszer biztonsága., A felhasználók hitelesítése és jogosultságaik kezelése. A felhasználói csoportok és a csoportjogok. Az engedélyek. ...10Decks177Flashcards45Learners -
Cisco CCNA Security (640-554)
Cisco CCNA Security (640-554)
By: Aaron Ekinaka
Chapter 1 - Networking Security Concepts, Chapter 2 - Understanding Security Policies Using a Lifestyle Approach, Chapter 3 - Building a Security Strategy ...23Decks270Flashcards61Learners -
Security+ exam
Security+ exam
By: Nick Barber
Secure Protocols, Symmetric vs Asymmetric, Encryption and stenography ...74Decks586Flashcards1Learner -
Security+
Security+
By: User Unknown
Acronyms, 3.0 - Architecture and Design, 1.0 - Threats, Attacks, and Vulnerabilities ...10Decks492Flashcards1Learner -
COSC362
COSC362
By: Hayley Krippner
Lecture 1: Course introduction, Lecture 2: Course overview (key definitions), [TODO] Lecture 3: Number Theory and Finite Fields -- Discrete Mathematics (basic number theory, modular arithmetic, groups and fields, boolean algebra) ...21Decks1,305Flashcards3Learners -
SY0-501 Recap
SY0-501 Recap
By: noneed toverify
Identity & Access Management, Threats, Attacks & Vulnerabilities, Risk Management ...6Decks75Flashcards2Learners -
CISSP 2019 (tms005)
CISSP 2019 (tms005)
By: Tuck Meng Siew
Chapter 1– Security Governance through Principles and Policies, Chapter 2– Personnel Security and Risk Management Concepts, Chapter 3– Business Continuity Planning ...21Decks290Flashcards36Learners