Learn Securities
Study Securities using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
AIMD Security
AIMD Security
By: Teresa Carrigan
Network Ports, Tricky Questions, Network Protocols ...7Decks630Flashcards7Learners -
Cyber Security
Cyber Security
By: Josh Davidson
Week 1 - Intro, Lecture 2 - Network Security, 2 - IDS ...15Decks288Flashcards2Learners -
Security+
Security+
By: Sean Shirley
Basics and fundamentals, General Security threats, Generally Mitigating Threats ...41Decks807Flashcards1Learner -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types ...41Decks1,670Flashcards5Learners -
Energy Security U2
Energy Security U2
By: cammy mccready
Defining Energy, Global Distribution, Energy Access ...17Decks515Flashcards5Learners -
CISSP - Security Management
CISSP - Security Management
By: Tim Pelland
CIA Triad, Control Types, OSI Models ...12Decks831Flashcards27Learners -
Network and Security - Foundations
Network and Security - Foundations
By: Dakota Styx
1 - TCP/IP and OSI Models, 2 - Network Media, Devices, and Standards, 3 - Basic Network Commands Overview and Terms ...9Decks231Flashcards9Learners -
Intro to Computer Security Final
Intro to Computer Security Final
By: Jesus Garcia
Term Test 2, Term Test 3, Chapter 21 - Quiz ...5Decks251Flashcards147Learners -
Security Plus
Security Plus
By: Chuckie McGib
Chapter 2, Chapter 3, Chapter 4 ...12Decks552Flashcards14Learners -
Cyber Security - CompTIA 501
Cyber Security - CompTIA 501
By: Karl Starkweather
Ch1 Risk Management, Ch2 Cryptography, Ch3 Identity and Access Management ...10Decks440Flashcards17Learners -
Security+
Security+
By: Dan Aram
Attacks, Threats, and Vulnerabilities, Architecture and Design, 3.0 Implementation ...11Decks823Flashcards1Learner -
Secured Transactions
Secured Transactions
By: Jesse Gray
Vocabulary, Collateral, Scope of Article 9 ...8Decks145Flashcards83Learners -
SC - 900 Microsoft Security, Compliance, and Identity Fundamentals
SC - 900 Microsoft Security, Compliance, and Identity Fundamentals
By: 3DPD Unknown
Describe security and compliance concepts, Describe identity concepts, Describe the services and identity types of Azure AD ...17Decks665Flashcards8Learners -
AIT 660 - Cyber Security
AIT 660 - Cyber Security
By: Crystal AustinWong
Lecture 1, Lecture 2, Lecture 3 ...12Decks362Flashcards18Learners -
FCA Paper 1: Securities
FCA Paper 1: Securities
By: Tom Hill
Chapter 1: The Financial Seevices Industry, Chapter 2: Asset Classes - Equity, Chapter 2 - Asset Classes - Debt ...11Decks387Flashcards1Learner -
Security +
Security +
By: Jon-Paul Brune
Chapter 2 - Monitoring & Diagnosing Networks, Chapter 1 - Measuring & Weighing Risk, Chapter 3 - Understanding Devices & Infrastructure ...12Decks397Flashcards13Learners -
BASS - Economics of Security
BASS - Economics of Security
By: Diarno van Tuijl
LIT1: Becker, G. (1992, December 9). The Economic Way of Looking at Life., LIT1: Cooter, R. & Ulen, T. (2016). Law & Economics (6th ed.)., LIT1: Winter, H. (2020). The economics of crime: an introduction to rational crime analysis (2nd ed.). ...29Decks384Flashcards1Learner -
Security 601
Security 601
By: Marlon M
1.1 Social Engineering Techniques, 1.2 Malware Types, 1.3 Application Attacks ...16Decks385Flashcards1Learner -
Security+
Security+
By: Taimoor Fayyaz
Ports, Basics, Malware ...22Decks583Flashcards1Learner -
Microsoft 365 Security Administration (MS-500)
Microsoft 365 Security Administration (MS-500)
By: Douglas Carpenter
Create, Configure, and Manage Identities, Explore Identity Synchronization, Implement and Manage Hybrid Identity ...11Decks252Flashcards26Learners -
CCSK Practice Tests - CSA Security Guidance v4
CCSK Practice Tests - CSA Security Guidance v4
By: Chris Nadeau
Domain 1: Cloud Computing Concepts and Architectures, Domain 2: Governance and Enterprise Risk Management, Domain 3: Legal Issues, Contracts, and Electronic Discovery ...16Decks329Flashcards7Learners -
Security+ Cert Darril Gibson
Security+ Cert Darril Gibson
By: PO1 Allen
Chapter 1 Mastering Security Basics, Other Questions, Chapter 2 Understanding Identity and Access Management ...12Decks307Flashcards12Learners -
Firewalls and Network Security
Firewalls and Network Security
By: The Pug Party
lab Understanding, Platform and Architecture Knowledge check, quiz 1 ...18Decks253Flashcards58Learners -
CISI: Securities
CISI: Securities
By: Joey Rigden
Chapter 2: Asset Classes, Chapter 4: The Primary Market, Chapter 5: Secondary Markets ...11Decks718Flashcards3Learners -
4th Year, Week 3 (VDV and Door Security)
4th Year, Week 3 (VDV and Door Security)
By: Jack Fisher
Electronic Access Control, VDV Applications2Decks115Flashcards18Learners -
Security+
Security+
By: Camden Connell
Chapter 1 & 2 Todays Security Professional & CyberSecurity Threat Landscape, Chapter 3 Malicious Code, Chapter 4 Social Engineering, Physical, and Password Attacks ...16Decks633Flashcards2Learners -
Secured Transactions
Secured Transactions
By: Cat Katz
Secured Transactions1Decks46Flashcards175Learners -
Global security
Global security
By: Laura Büker
Lecture 1, Lecture 2, Lecture 3 ...12Decks168Flashcards1Learner -
Security + Messer
Security + Messer
By: Blayne Ehrenzeller
1.1 - Social Engineering, 1.2 - Attack Types, 1.3 - Application Attacks ...24Decks622Flashcards1Learner -
Security
Security
By: Trevor Christie-Taylor
Communication and network security, Software Development Security, Security Assessment and Training ...8Decks859Flashcards1Learner