Learn Social Engineering
Study Social Engineering using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CompTIA Security+
CompTIA Security+
By: Sara Sofia
Social Engineering, Attack Types, Recognizing Application Attacks ...7Decks163Flashcards1Learner -
Online Marketing Course - Duke
Online Marketing Course - Duke
By: andre cummings
SEO Foundations: Introduction To SEO, SEO Foundations: A model of Search Engines, Social Media Foundations: Understanding Social Media Strategy ...14Decks88Flashcards4Learners -
NEBOSH INT -B
NEBOSH INT -B
By: Jessica bate
IB-1 Principles of Chemical Control Toxicology & Epidemiology, IB-2 Hazardous Substances & Other Chemicals - Assessment Of Risk, IB-3 Hazardous Chemicals - Engineering Controls & PPE ...11Decks159Flashcards15Learners -
Security+
Security+
By: Nick Bishop
Ports, Managing Risk, Monitoring and Diagnosing Networks ...12Decks452Flashcards1Learner -
CISM Exam Prep
CISM Exam Prep
By: Bryan Scott
Information Security Governance, Business Continuity & Security, Incident Response ...20Decks186Flashcards1Learner -
Biology
Biology
By: Reynard Vos
Cloning and Stem Cells, Grade 12 Environmental Studies - Part 1 POPULATION ECOLOGY, Grade 12 Reproductive Animal Strategies ...25Decks765Flashcards23Learners -
Security+
Security+
By: Zoubida Regzal
1.1 Social engineering attacks, 1.2 Malware & common attacks, 1.3 Application attacks ...35Decks859Flashcards6Learners -
SEC+
SEC+
By: Nerdie Productions
Fundamental of Security, Threat Actor, Physical Security ...9Decks259Flashcards1Learner -
Cyber Security
Cyber Security
By: Robert Livingston
Fundamentals of Security, Threat Actors, Physical Security ...6Decks217Flashcards1Learner -
Geography
Geography
By: Sophia Stewart
Global Urban Change, Lagos, Olusosun Landfill + Informal Economy ...26Decks267Flashcards2Learners -
YEAR 8 ICT TERM1
YEAR 8 ICT TERM1
By: kaydence !!
CYBERSECURITY: L1 YOU & YOUR DATA, CYBERSECURITY: L2 SOCIAL ENGINEERING, CYBERSECURITY: SCRIPT KIDDIES ...8Decks45Flashcards1Learner -
CompTIA A+ 1002 Concepts
CompTIA A+ 1002 Concepts
By: Mr. Victor B.
Basic Linux Commands, Microsoft Command Line Tool, The Windows Control Panel ...27Decks344Flashcards3Learners -
ECSA - Certified Security Analyst
ECSA - Certified Security Analyst
By: Abran Tapia
1 - Intro 2 Pen Testing, 2 - Pen Testing Scope and Engagement, 3 - OSINT Methodology ...12Decks153Flashcards3Learners -
CEH
CEH
By: Alex Santiago
MOD 16 - Hacking Wireless, MOD 17 - Hacking Mobile Platforms, MOD 18 - Iot and OT Hacking ...13Decks164Flashcards1Learner -
My Lexicon
My Lexicon
By: Nguyen Ba Phong
Abstract Qualities and Concepts, Actions and Activities, Arts, Humanities and Recreation ...41Decks268Flashcards1Learner -
Pentest+
Pentest+
By: Zoubida Regzal
1 Planning & scoping, 2.1 Information gathering & Vulnerability scanning: passive reconnaissance, 2.2.1 Information gathering & Vulnerability scanning: active reconnaissance/ scanning & recon ...28Decks781Flashcards4Learners -
A Computer Science : Unit 1
A Computer Science : Unit 1
By: ww ww
1.1.1 Architecture Introduction, 1.1.2 Von Neumann Architecture, 1.1.3 Factors affecting CPU performance ...26Decks253Flashcards2Learners -
General Paper
General Paper
By: ohhelloo me
Advertising, Censorship, Unity ...21Decks111Flashcards7Learners -
INSY440
INSY440
By: Matt Gu
Strategy & Business Models, E-commerce Infrastructure: The Internet, Web, and Mobile Platform (I), E-commerce Infrastructure: The Internet, Web, and Mobile Platform (II) ...19Decks427Flashcards4Learners -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types ...41Decks1,670Flashcards21Learners -
Security +
Security +
By: Kennedy Taylor
CompTIA Security+: Social Engineering Techniques & Other Attack Types, CompTIA Security+: Implementing Cybersecurity Resilience2Decks115Flashcards1Learner -
Computing - Organised
Computing - Organised
By: Zayd IMRAN
Computer Systems - Translators, Data Representation - Logic Gates, Data Representation - Units ...22Decks361Flashcards1Learner -
Computer Science
Computer Science
By: Libby Simpson
Necessary vocan for describing programming, CPU and Memory, Hardware and Software ...7Decks157Flashcards1Learner -
Security +
Security +
By: Matheus Fernandes
Threat and attack terminology, Cryptographic, Ports and Protocols ...10Decks202Flashcards1Learner -
Security+
Security+
By: a a
Ports, Hashing Algorithms, Symmetric Encryption ...16Decks167Flashcards3Learners -
CompTIA A+ Core 2 (220-1102)
CompTIA A+ Core 2 (220-1102)
By: John Vargas
Operating System 3 revision, Security, Software and Trouble Shooting ...50Decks1,075Flashcards42Learners -
ENGGEN 204
ENGGEN 204
By: Mardee Bayron
Introduction To ENGGEN 204, Teamwork: Team Lifecycle & Dysfunction, Teamwork: Negotiation And Compromise ...24Decks221Flashcards2Learners -
QRS A+ Core 2
QRS A+ Core 2
By: Elizabeth Perez
3.0 Software Troubleshooting QRS, 4.0 Operational Proceedures, 1.1 Compare and contrast common operating system types and their purposes. ...24Decks640Flashcards47Learners -
CompTIA A+ CORE 2
CompTIA A+ CORE 2
By: Jared Oliver
Mobile Operating Systems, Windows OS, Installation Requirements ...30Decks306Flashcards4Learners -
Security +
Security +
By: Blayne Ehrenzeller
Social Engineering and Security Fundamentals, Malware, Password Attacks ...16Decks195Flashcards1Learner