Learn Securities
Study Securities using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Security+ 701
Security+ 701
By: Erdis Kreka
network + Important Ports, Domain 1.1-1.2, 1.3-1.4...16Decks384Flashcards5Learners -
KH Preparation
KH Preparation
By: Kevin Heneghan
1-50, 51-100, 101-150...17Decks849Flashcards1Learner -
Firewalls and Network Security
Firewalls and Network Security
By: Pug Party
lab Understanding, Platform and Architecture Knowledge check, quiz 1...18Decks253Flashcards309Learners -
BAR PREP
BAR PREP
By: D K
FL Secured Transactions, MBE Con Law, FL Commercial Paper...23Decks906Flashcards2Learners -
C172 - Networking & Security
C172 - Networking & Security
By: Ami Steelman
All Course, Lesson 1: Introduction to Computer Networks, Lesson 2: Physical Layer Cabling: Twisted Pair...8Decks683Flashcards100Learners -
CCSK Practice Tests - CSA Security Guidance v4
CCSK Practice Tests - CSA Security Guidance v4
By: Chris Nadeau
Domain 1: Cloud Computing Concepts and Architectures, Domain 2: Governance and Enterprise Risk Management, Domain 3: Legal Issues, Contracts, and Electronic Discovery...16Decks329Flashcards27Learners -
Security+ Get Certified Get Ahead SY0-501
Security+ Get Certified Get Ahead SY0-501
By: Jennifer Kajiwara
Chapter 1 Mastering Security Basics, Chapter 2 Understanding Identity and Access Management, Chapter 3 Exploring Network Technologies and Tools...11Decks1,443Flashcards5Learners -
Network Security 1.0
Network Security 1.0
By: Nathan Banks
Module 1: Securing Networks, Module 2: Network Threats, Module 3: Mitigating Threats...23Decks315Flashcards12Learners -
CompTIA CertMaster Practice for Security+ SY0-601
CompTIA CertMaster Practice for Security+ SY0-601
By: Marlen Olmedo
1.0 Attacks, Threats, and Vulnerabilites, 1.2 Given a scenario, analyze potential indicators to determine the type of attack., Cybersecurity Vocab....4Decks145Flashcards404Learners -
CISI Securities
CISI Securities
By: kacy thiru
1.1 Asset Classes- Shares, 1.2 Asset Classes - Debt Instruments, 1.3 Government Debt...14Decks217Flashcards112Learners -
CCNA Security 210-260
CCNA Security 210-260
By: Brian Schroeder
Network Security Concepts, Common Security Threats, Implementing AAA in Cisco IOS...21Decks567Flashcards227Learners -
Cyber Security - Cambridge Technical
Cyber Security - Cambridge Technical
By: Miss Watters
LO1, LO2, L03...4Decks101Flashcards101Learners -
Information Security
Information Security
By: Felix Hüneburg
Introduction, L2 - Securicy Policies, Social Engineering...11Decks230Flashcards114Learners -
SEC 160 Security Administration
SEC 160 Security Administration
By: Rachman Walker
Module 1 - The Danger, Module 2 - Fighters In The War Against Cybercrime, Module 3 - The Windows Operating System...18Decks494Flashcards1Learner -
Comptia Security+
Comptia Security+
By: jamie sitzlar
Port Numbers and Protocols, DNS Records, Acronyms...10Decks789Flashcards1Learner -
CompTIA security+ 701
CompTIA security+ 701
By: Unknown Unknown
Categories & Types of security controls, Chapter 1 - Types of security controls, Threats, Attacks, and Vulnerabilities...15Decks696Flashcards8Learners -
07 - Spring 2019 - CET-2830C_Information Security
07 - Spring 2019 - CET-2830C_Information Security
By: Brian Smith
Chapter 01 – Quiz Introduction to Security, Chapter 02 Quiz – Malware and Social Engineering Attacks, Chapter 03 Quiz – Basic Cyprography...7Decks147Flashcards349Learners -
Physical Security
Physical Security
By: Ashley Cee
Notes from Study Group, Barriers, Alarms...10Decks488Flashcards75Learners -
Security + SY0-601
Security + SY0-601
By: Alket Shabani
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. Given a scenario, analyze potential indicators associated with network attacks....24Decks258Flashcards41Learners -
CISI Wrong course
CISI Wrong course
By: Tom Heyworth
Chapter 1: The Financial Services Sector, Chapter 3: Equities, Chapter 2: The Economic Environment...12Decks997Flashcards3Learners -
Security Forces QC Review
Security Forces QC Review
By: Gabriel Garcia
Entry Controller, Patrolman, Patrolman v2...6Decks575Flashcards115Learners -
COMPtia Security+-701 Flashcards
COMPtia Security+-701 Flashcards
By: sylwia latkowska
Control Objectives, Control Objectives 2, Security And Privacy...46Decks536Flashcards20Learners -
Information Systems Security
Information Systems Security
By: Enrico Carraro
Security of network applications, Firewall and IDS/IPS, Network Security...7Decks340Flashcards27Learners -
Security+
Security+
By: Kevin Nunes
Module 01 - Security Concepts, Module 02 - Threats, Vulnerabilities, and Mitigations, Module 03 - Criptography...13Decks1,391Flashcards1Learner -
CHRIS'S CSC PREP
CHRIS'S CSC PREP
By: Dennis Ragauskas
Chapter 1 Terms, Chapter 1 | The Canadian Securities Industry, Chapter 2 | The Capital Market...10Decks357Flashcards48Learners -
Security+
Security+
By: Jonathan Russial
Chapter 1 - General Concepts, Chapter 2 - Threat Landscape, Chapter 3 - Malicious Code...20Decks650Flashcards2Learners -
AWS Security Certification
AWS Security Certification
By: Mark Teasdale
Domain-1 Threat Detection and Incident Management, Domain-2 Security Logging and Monitoring, Domain-3 Infrastructure Security...8Decks349Flashcards39Learners -
C836-Fundamentals of Information Security
C836-Fundamentals of Information Security
By: Markee Colston
Chapter 1: What is Information Security?, Chapter 2: Identification and Authentication, Chapter 3: Authorization and Access Control...9Decks192Flashcards137Learners -
Canadian Securities Course
Canadian Securities Course
By: Sharon Cheema
Chapter One, Chapter Two, Chapter Three...6Decks281Flashcards215Learners -
Secure Software Design - D487
Secure Software Design - D487
By: Paul Wartenberg
Section 1 Software Security and SDLC, Section 2: Software Requirements and Risks, Section 3 - Software Security Test Plan...4Decks194Flashcards132Learners