Learn Social Network
Study Social Network using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Information Technology GR11 NOV
Information Technology GR11 NOV
By: Hannah Hundermark
Computer Hardware, Software, Networking: LAN ...9Decks165Flashcards1Learner -
Network Security
Network Security
By: Aleysha Mullen
Review of Networking Concepts, Introduction to Network Security, Denial of Service and Social Engineering ...10Decks174Flashcards8Learners -
[9569] computing booooo
[9569] computing booooo
By: Eugenia Ng
errr basic python theory, Social, Ethical, Legal and Economical Issues, Network + Network Security ...4Decks83Flashcards8Learners -
Animal Social Behaviour
Animal Social Behaviour
By: Emilia Cole
Neurobiology, neurotransmitters and brain structure, Brains and Epigenetics, Hormones and Social Behaviour ...11Decks170Flashcards3Learners -
Steno
Steno
By: Kelly Willcut
Punctuation, Medical, Food ...60Decks7,152Flashcards14Learners -
IT
IT
By: Wesley Mabutho
LS, Networks, Social Implications3Decks41Flashcards1Learner -
CEH
CEH
By: Andrew Parker
Chapter 1 - Essential Knowledge, Chapter 2 - Reconaissance, Chapter 3 - Scanning & Enumeration ...13Decks813Flashcards30Learners -
BUS 550 Final
BUS 550 Final
By: Tracy Trieu
Ch. 7 Network Effects, Ch. 8 Social Media, Ch. 9 The Sharing Economy ...5Decks92Flashcards31Learners -
Computing
Computing
By: Ben Coombner
Social Networking, Data representation, Python / turtle ...4Decks28Flashcards1Learner -
A+ 1002
A+ 1002
By: Unknown Unknown
Physical Security, Logical Security, Wireless Security ...29Decks564Flashcards5Learners -
IS 414 Security
IS 414 Security
By: Sarah Walker
Risk, Fraud, Vulnerability Management & System Hardening ...7Decks107Flashcards1Learner -
Meu CEH
Meu CEH
By: FabS Pam
Module 1 - Intro to Ethical Hacking, Module 2 - Footprinting and Reconnaissance, Module 3 - Scanning Networks ...22Decks366Flashcards30Learners -
ECSA - Certified Security Analyst
ECSA - Certified Security Analyst
By: Abran Tapia
1 - Intro 2 Pen Testing, 2 - Pen Testing Scope and Engagement, 3 - OSINT Methodology ...12Decks153Flashcards3Learners -
CSF Finals
CSF Finals
By: Justin Ooi
Cryptography, Access Control, Steganography ...13Decks161Flashcards1Learner -
OAM
OAM
By: Sarah Idris
week 1, decision making I, Decision Making II ...21Decks582Flashcards2Learners -
Sociology 1020
Sociology 1020
By: Uma Jacoby
Chapter 3 - Culture, Chapter 4 - Socialization, Chapter 5 - Social Interaction ...15Decks436Flashcards7Learners -
English Proficiency
English Proficiency
By: Tri Minh
Vocabulary 1, Prepositions, Business vocabulary ...5Decks87Flashcards2Learners -
Computing - Organised
Computing - Organised
By: Zayd IMRAN
Computer Systems - Translators, Data Representation - Logic Gates, Data Representation - Units ...22Decks361Flashcards1Learner -
HR 512, 514, 516, 521, 522
HR 512, 514, 516, 521, 522
By: John Walter
HR 512, HR 514 Grievance system, HR 516 Usage Social Media and Social Networking ...5Decks63Flashcards10Learners -
(6) CompTia Security+ SY0-601 Definitions
(6) CompTia Security+ SY0-601 Definitions
By: Maciej Węgrzynowski
1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application Attacks ...47Decks1,691Flashcards32Learners -
Study Guide SY0-601
Study Guide SY0-601
By: Dakota Edmunds
1.1 Compare and contrast different types of social engineering techniques., 1.5 Explain Different Threat Actors, Vectors And Intelligence Sources, 1.2 Given a scenario, analyze potential indicators to determine the type of attack ...20Decks620Flashcards168Learners -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
1.1 Social Engineering, 1.2 Attack Types, 1.3 Application Attacks ...35Decks722Flashcards25Learners -
my CEH - Certified Ethical Hacker
my CEH - Certified Ethical Hacker
By: Roger Pharr
Chapter 1 Introduction to Ethical Hacking, Chapter 0 Random Terms, Chapter 2 System Fundamentals ...19Decks406Flashcards23Learners -
CEH Exam Guide 3rd Ed, for CEH Exam v9
CEH Exam Guide 3rd Ed, for CEH Exam v9
By: Stephen Holden
Chapter 1 - Essential Knowledge (Introduction to Ethical Hacking), Chapter 2 - Reconnaissance (Footprinting and Reconnaissance), Chapter 3 - Scanning and Enumeration (Scanning Networks) ...17Decks545Flashcards42Learners -
French Vocab Revision
French Vocab Revision
By: edad edad
5.2H - My Area, 6.1F - My Work, 6.1H - Why we need Corporations ...44Decks1,060Flashcards10Learners -
New Media Challenges
New Media Challenges
By: Verena Visser
Lecture 1, Lecture 2: An introduction to privacy, Lecture 3: Personalization, Privacy concerns and Information sharing ...20Decks329Flashcards2Learners -
BUS 115-Intro to Business
BUS 115-Intro to Business
By: Amanda Kerker
Ch. 1-The Dynamics Of Business And Economics, Chapter 2-Business Ethics and Social Responsibility, Chapter 3-Business in a Borderless World ...11Decks292Flashcards52Learners -
CND
CND
By: Alex Bachman
PORT SCANNING PEs, Packet Analysis 1 PEs, Packet Analysis 2 PEs ...11Decks288Flashcards5Learners -
Essential Words
Essential Words
By: Hossein Ahmadian
U1-Environmental, OX-24, OX-23 ...28Decks683Flashcards6Learners -
PenTest+
PenTest+
By: Laurence Toje
Penetration Testing, Planning and Scoping Penetration Tests, Information Gathering ...13Decks340Flashcards1Learner