Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(50)
Decks
Flashcards
Learners
-
Commercial Multi
Commercial Multi
By: Blake Wolanin
Detecting Failed Engine Procedure, Restart Procedure, Securing Procedure7Decks49Flashcards1Learner -
GCSE - Biology
GCSE - Biology
By: Shreya Ramteke
the menstrual cycle, Extra Things, B728Decks379Flashcards11Learners -
Sec+
Sec+
By: Abeche Ndumbi
1. Overview of Security, Security+ (SY0-601) Acronym List, 1.1 Compare and contrast different types of social engineering techniques4Decks500Flashcards1Learner -
CompTIA Security+ Deluxe Study Guide: Exam SY0-501, Fourth Edition
CompTIA Security+ Deluxe Study Guide: Exam SY0-501, Fourth Edition
By: Alex valentine
Managing Risk, Monitoring and Diagnosing Networks, Understanding Devices and Infrastructure12Decks224Flashcards1Learner -
CSCI 4174
CSCI 4174
By: Eric Desjardins
Module 0: Review of Networking Concepts, Module 1: Introduction to Network Security, Module2: Denial of Service and Social Engineering4Decks118Flashcards4Learners -
CS6520 Test 3 Timothy
CS6520 Test 3 Timothy
By: Andrew Parmar
Lesson 9 - Software Defined Networking, Lesson 9.1 - Programming SDNs, Lesson 10 - Traffic Engineering6Decks200Flashcards4Learners -
Security+
Security+
By: Justin Lane
Security Basics, Social Engineering Techniques, Potential Indicators of Attacks3Decks82Flashcards1Learner -
ag-CEH-V10 - Certified Ethical Hacker
ag-CEH-V10 - Certified Ethical Hacker
By: Anti Gondu
Chapter 1 Introduction to Ethical Hacking, Chapter 0 Random Terms, Chapter 2 System Fundamentals25Decks922Flashcards1Learner -
CISSP 2017
CISSP 2017
By: M Fox
Security and Risk Management 16%, Asset Security 10%, Security Engineering 12%9Decks43Flashcards5Learners -
CompTIA Security+_SY0-601
CompTIA Security+_SY0-601
By: Nick Keenan
1.1 Compare and contrast different types of social engineering techniques., 1.2Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks.6Decks129Flashcards9Learners -
NPDESI
NPDESI
By: Timo-Juhani Karjalainen
Intro to Network Programmability, Linux Primer for Network Engineers, Linux Networking21Decks414Flashcards1Learner -
Ethical Hacking
Ethical Hacking
By: Jose N FESTIN
EH-01-P1: Introduction, 2: Network Scanning, 3. MITM Attacks9Decks102Flashcards2Learners -
Computer Science A-Level
Computer Science A-Level
By: Kathryn Bright
Data Structures, Logical Operations, Algorithms and Programming17Decks507Flashcards1Learner -
Security +
Security +
By: Blayne Ehrenzeller
Social Engineering and Security Fundamentals, Malware, Password Attacks16Decks195Flashcards1Learner -
CISSP
CISSP
By: James Hatton
Domain 1 - Security and Risk Management, Domain 2 - Asset Security, Domain 3 - Security Engineering8Decks159Flashcards2Learners -
InfoSec
InfoSec
By: Sean Pesce
Amazon Security Engineer Interview, Motorola Solutions Interview, InfoSec General3Decks58Flashcards2Learners -
Computing 6 - Networks
Computing 6 - Networks
By: Funso Oduwole
Data Compression, LANs And WANs, Circuit Switching And Packet Switching8Decks123Flashcards2Learners -
Security +
Security +
By: Matheus Fernandes
Threat and attack terminology, Cryptographic, Ports and Protocols10Decks202Flashcards1Learner -
Sec+ -> 1.0 Attacks, Threats, and Vulnerabilities (24%)
Sec+ -> 1.0 Attacks, Threats, and Vulnerabilities (24%)
By: Isabelle S
1.1 - Compare and contrast different types of social engineering techniques., 1.2 - Given a scenario, analyze potential indicators to determine the type of attack., 1.3 -Given a scenario, analyze potential indicators associated with application attacks.8Decks295Flashcards1Learner -
security +
security +
By: larry neville
Chapter 1 Measuring and Weighing Risk, Chapter 2 Monitoring and Diagnosing Networks, Chapter 3 Understanding Devices and Infrastructure12Decks238Flashcards2Learners -
computer science topic checklist flash cards
computer science topic checklist flash cards
By: Jacob Heyes
1.1 Data structures, 1.2 Logical Operations, 1.3 Algorithms and Programs18Decks227Flashcards1Learner -
CompTIA Security+
CompTIA Security+
By: Sara Sofia
Social Engineering, Attack Types, Recognizing Application Attacks7Decks118Flashcards1Learner -
2nd Year A-Level Computer Science
2nd Year A-Level Computer Science
By: Hannan _
System Analyses, Data Transmission and Networking, System Design10Decks98Flashcards1Learner -
Networking
Networking
By: Jeremy English
Test 1 Lessons 1-5, CongestionControlLesson6, Rate limiting and traffic shaping8Decks299Flashcards1Learner -
Microsoft Azure AI Fundementals
Microsoft Azure AI Fundementals
By: Danielle Lamohr
What Is AI, Introduction To Azure Open A.i. Service, Use Automated Machine Learning In Microsoft Azure Learning22Decks444Flashcards4Learners -
Sec+
Sec+
By: Brendan McNulty
FOS, Security Controls, Threat Actors14Decks61Flashcards1Learner -
6250
6250
By: Conner Lines
9 Software Defined Networks, 9.1 Programming SDNs, 10. Traffic Engineering7Decks164Flashcards2Learners -
Cyber Security
Cyber Security
By: Dylane Stephens
General Questions, Cyber Sec Interview Questions, Cyber Sec Interview Questions 29Decks121Flashcards2Learners -
Security+ Study Pts
Security+ Study Pts
By: Carmen Menéndez
X- Security+ Exam 411, 1- Mastering the Basics, 2- Exploring Control Types/ Methods12Decks124Flashcards3Learners -
Threats, Attacks, Vulneraries
Threats, Attacks, Vulneraries
By: I J
Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack, 1.3 Given a scenario, analyze potential indicators associated with application attacks8Decks205Flashcards1Learner -
Cybersecurity Architecture & Engineering - D488
Cybersecurity Architecture & Engineering - D488
By: Paul Wartenberg
Section 1 - Secure Architecture for GRC, Section 2 - Secure Network Architecture, Section 3 - Security Engineering & Cryptography4Decks216Flashcards1Learner -
Computer Science - Component 1
Computer Science - Component 1
By: Louie Hayman
Hardware, Logical Operations, Communications9Decks59Flashcards3Learners -
650
650
By: Karl Kuehner
1. Normal Power Up, 2. Systems Check, 3. Before Start Check19Decks195Flashcards1Learner -
CS6250 Test Prep Exams 1 thru 3
CS6250 Test Prep Exams 1 thru 3
By: N L
TCP Fast Open, Congestion Control & Streaming, Rate Limiting and Traffic Shaping9Decks85Flashcards4Learners -
Geography Water Case Studies
Geography Water Case Studies
By: Maciej Zagdan
Water Insecurity, Water Management Schemes, Droughts12Decks170Flashcards2Learners -
easyJet Command Revison
easyJet Command Revison
By: Maxime P
Limitations Aircraft general, Limitations Air bleed/Cond/Press/Vent, Limitations Auto flight system37Decks586Flashcards2Learners -
CyberSAFE: Exam CBS-410
CyberSAFE: Exam CBS-410
By: 3DPD Unknown
Identifying Security Compliance Measures, Recognizing and Addressing Social Engineering Attacks, Securing Devices5Decks224Flashcards1Learner -
professionalism in practice
professionalism in practice
By: Somto Azubuike
professional responsibilities, system development lifecycle, requirements and requirements engineering16Decks199Flashcards1Learner -
CISSP (2020)
CISSP (2020)
By: Aidan McCarthy
Domain 1 - Security & Risk Management, Domain 2 - Asset Security, Domain 3 - Security Architecture and Engineering3Decks78Flashcards1Learner -
CISSP
CISSP
By: Daniel Bardenstein
Secure Engineering, Networking, Vulns, Threats, CounterMeasures4Decks157Flashcards1Learner -
A OCR Computer Science A level
A OCR Computer Science A level
By: Anonymous T
Chapter 1 - Processor components, Chapter 2 - Processor performance, Chapter 3 - Types of processor75Decks944Flashcards9Learners -
Sy0-601: 1.0 Threats, Attacks, and Vulnerabilities
Sy0-601: 1.0 Threats, Attacks, and Vulnerabilities
By: Christopher Robbins
1.1 Compare and contrast different types of social engineering techniques, 1.2 Given a scenario, analyze potential indicators to determine the type of attack, 1.3 Given a scenario, analyze potential indicators assoicated with application attacks8Decks179Flashcards2Learners -
CompTIA Security+ Exam
CompTIA Security+ Exam
By: Jordan Davis
Chapter 1: Today's Security Professional, Chapter 4 review Questions Social Engineering,Physical And Password Attacks, Chapter 5 Security Assessment & Testing4Decks63Flashcards1Learner -
Computing
Computing
By: Daniel Barber
Topic 1.1 - Data Structures, Topic 1.2 - Logical Operations, 1.3 - Algorithms17Decks251Flashcards5Learners -
Ethical Hacking
Ethical Hacking
By: phil bieni
Kahoot - Intro to Ethical hacking, Common Attack flows & Attack Terminology - EH-01-P1, Kahoot - EH-02-P1 Network Scanning12Decks115Flashcards3Learners -
Computer Science Paper two stuff
Computer Science Paper two stuff
By: gusy edwards
The Computer System's Architecture, Embedded Systems, Memory11Decks89Flashcards1Learner -
Stuff I Don't Know 1012
Stuff I Don't Know 1012
By: Sam Stone
Malware Removal Steps, Windows 10 Minimum Requirements, Windows 11 Minimum Requirements21Decks146Flashcards1Learner -
Blue Book
Blue Book
By: s b
DONE - 1A Certificates and Documents - Certification, *1B Certificates and Documents - Privileges and Limitations, DONE 1C Certificates and Documents - Currency Requirements48Decks685Flashcards28Learners -
Sec
Sec
By: Stephen Kane
1.0 Malware types, 1.1 Social engineered attacks, 1.2 Application/Service attacks10Decks111Flashcards1Learner -
CompTIA PenTest+
CompTIA PenTest+
By: Grayden Odum
PenTest Methodologies, Rules of Engagement, White Box Support Resources30Decks195Flashcards8Learners