Learn Social Engineering
Study Social Engineering using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Sec+ Study Deck
Sec+ Study Deck
By: Destiny Lester
Fundamentals Of Security, Threat Actors, Physical Security ...7Decks208Flashcards1Learner -
CompTIA Security+
CompTIA Security+
By: Salewa Aderonmu
Lesson 7 - Questions, Lesson 8 - Questions, Lesson 9 - Questions ...28Decks1,104Flashcards38Learners -
Study Guide SY0-601
Study Guide SY0-601
By: Dakota Edmunds
1.1 Compare and contrast different types of social engineering techniques., 1.5 Explain Different Threat Actors, Vectors And Intelligence Sources, 1.2 Given a scenario, analyze potential indicators to determine the type of attack ...20Decks620Flashcards168Learners -
Security +
Security +
By: Jon-Paul Brune
Chapter 2 - Monitoring & Diagnosing Networks, Chapter 1 - Measuring & Weighing Risk, Chapter 3 - Understanding Devices & Infrastructure ...12Decks397Flashcards13Learners -
Sec+
Sec+
By: Zach Harvey
Ports and protocols, Social Engineering, Attack types ...37Decks577Flashcards3Learners -
Comptia Security+ SYO-701
Comptia Security+ SYO-701
By: Willie Fair
Fundamentals Of Security, Threat Actors, Physical Security ...6Decks94Flashcards3Learners -
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH)
By: Jeff Corbett
Introduction to Ethical Hacking, Ethics, and Legality, Footprinting and Social Engineering, Scanning and Enumeration ...16Decks82Flashcards74Learners -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
1.1 Social Engineering, 1.2 Attack Types, 1.3 Application Attacks ...35Decks722Flashcards25Learners -
Network Security
Network Security
By: Aleysha Mullen
Review of Networking Concepts, Introduction to Network Security, Denial of Service and Social Engineering ...10Decks174Flashcards8Learners -
ECSA - Certified Security Analyst
ECSA - Certified Security Analyst
By: Abran Tapia
1 - Intro 2 Pen Testing, 2 - Pen Testing Scope and Engagement, 3 - OSINT Methodology ...12Decks153Flashcards3Learners -
Security 601
Security 601
By: Marlon M
1.1 Social Engineering Techniques, 1.2 Malware Types, 1.3 Application Attacks ...16Decks385Flashcards1Learner -
CompTIA Security+ (SY0-701, IN-WORK)
CompTIA Security+ (SY0-701, IN-WORK)
By: Erik Senekham
Fundamentals of Security, Threat Actors, Physical Security ...5Decks360Flashcards1Learner -
CompTIA Security+
CompTIA Security+
By: Adit Dharmendrakumar
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack.2Decks52Flashcards2Learners -
CompTIA: A+ C2 (110-1102)
CompTIA: A+ C2 (110-1102)
By: Rachael Carling
1.5: Windows Settings, 2.2: Wireless Security, ~ 1.2: Given a scenario, use the appropriate Microsoft command-line tool ...11Decks168Flashcards1Learner -
Ethical Hacking
Ethical Hacking
By: Halima Ali
1 - Ethical Hacking Concepts, 2 - TCP/IP Concepts, 3 - Network and Computer Attacks ...5Decks56Flashcards10Learners -
SY0-601
SY0-601
By: Jill LaBeau
Introduction, Social Engineering, Indicators of Attacks3Decks78Flashcards3Learners -
E-marketing ht-19
E-marketing ht-19
By: Anna M
E-commerce and advertising, Social, global and local marketing & Pricing information, Programmatics - guestlecture ...6Decks108Flashcards7Learners -
PoCS
PoCS
By: M E
CS Basic Security Concepts - Sheet1, CS Cyber Actors, CS Cyber Attack Life Cycle #1 ...25Decks327Flashcards1Learner -
Pentest+ 5.3 Tools
Pentest+ 5.3 Tools
By: Chris Antoine
Scanners, Credential Testing Tools, Debuggers ...12Decks75Flashcards2Learners -
Comptia
Comptia
By: Russell Davis
Social Engineering, Determine type of attack via indicators, Application Attacks ...35Decks1,194Flashcards27Learners -
ICT
ICT
By: Evie Brown
L03-Data And Data Types, LO1-1.5, 4.6- Validity,reliabilty And Bias ...16Decks262Flashcards4Learners -
Security+
Security+
By: Hayley Smith
Social Engineering Techniques, Types of Malware &Their Indicators, Acronyms ...5Decks61Flashcards1Learner -
Sec+
Sec+
By: Brendan McNulty
FOS, Security Controls, Threat Actors ...14Decks231Flashcards1Learner -
Sec+ 601 Practice Questions
Sec+ 601 Practice Questions
By: Kris G
Lesson 1: Comparing Security Roles and Security Controls, Lesson 2: Explaining Threat Actors and Threat Intelligence, Lesson 3: Performing Security Assessments ...21Decks305Flashcards150Learners -
Professor Messer CompTIA Security+ SYO-601ty +
Professor Messer CompTIA Security+ SYO-601ty +
By: Matt R
Phishing, Control Types, Principles of Social Engineering ...5Decks48Flashcards4Learners -
Security+
Security+
By: Jonathan Russial
Chapter 1 - General Concepts, Chapter 2 - Threat Landscape, Chapter 3 - Malicious Code ...20Decks650Flashcards1Learner -
GCSE Geography
GCSE Geography
By: Ethan Retish
Ecosystems, Nutrient cycle, Changes to ecosystem ...53Decks347Flashcards7Learners -
CyberSAFE: Exam CBS-410
CyberSAFE: Exam CBS-410
By: 3DPD Unknown
Identifying Security Compliance Measures, Recognizing and Addressing Social Engineering Attacks, Securing Devices ...5Decks224Flashcards3Learners -
Critical systems Engineering
Critical systems Engineering
By: Benedict Matovu
Lecture 1 - Overview, Lecture 1 Dependability and Security, Social-Technical Systems ...12Decks194Flashcards1Learner -
Information Security
Information Security
By: Will Robinson
CIA Triad, Passwords, Password storage ...15Decks162Flashcards1Learner