Tags: Computer Programming, Cryptography, Technology & Engineering
Study Cryptography
Interested in solving codes? Or are you already studying Cryptography? Learn how to convert ordinary plain text into coded or unintelligible text & vice-versa.
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CSCI 4130 - Intro to Cybersecurity
CSCI 4130 - Intro to Cybersecurity
By: Kelly Wei
Security Principles, Control Hijacking - Attacks, Control Hijacking - Defenses ...11Decks437Flashcards4Learners -
Auria
Auria
By: Joseph Callaghan
Interview, Ports, Cryptography ...7Decks145Flashcards1Learner -
CISSP
CISSP
By: wyt hat
Domain 3 -InfoSec Governance & Risk Mgt, Last notes, Application Security ...10Decks520Flashcards10Learners -
software Security
software Security
By: Farina Hoepel
Sins of SQL Injection, Test Driven Development, Behavior Driven Development ...10Decks180Flashcards5Learners -
CEH v12 Exam Prep "Hard"
CEH v12 Exam Prep "Hard"
By: Naser aljufairah
Module 01 - Introduction to Ethical Hacking ( EC Mode ), Module 02 - Footprinting and Reconnaissance ( EC Mode ), Module 03 - Scanning Networks ( EC Mode ) ...19Decks1,206Flashcards168Learners -
CompTIA Security+
CompTIA Security+
By: Joe Park
Ch.1 Todays Security Professional, Ch.2 Cybersecurity Threat Landscape, Ch.3 Malicious Code ...10Decks286Flashcards1Learner -
Security+ SY0-601 Mike Chapple
Security+ SY0-601 Mike Chapple
By: Nick Z
Chapter 01 - Todays Security Professional, Chapter 02: Cyber Security Landscape, End of Chapter Questions ...11Decks510Flashcards15Learners -
Meu CEH
Meu CEH
By: FabS Pam
Module 1 - Intro to Ethical Hacking, Module 2 - Footprinting and Reconnaissance, Module 3 - Scanning Networks ...22Decks366Flashcards31Learners -
CPSA 2024
CPSA 2024
By: sweet •
A2 - Law and Compliance, B1 - IP Protocols, B2 - Network Architectures ...16Decks187Flashcards4Learners -
Networks and Security
Networks and Security
By: Joe Walder
Mid-Sem 2017, Mid-Sem Examples, 12 - Networked Appl. Architectures ...13Decks247Flashcards9Learners -
Ethics class
Ethics class
By: Kazybek Khairulla
Software Contracts, Professional Issues, Social Issues I ...7Decks83Flashcards1Learner -
TM112
TM112
By: Oliver Ruffell
Hardware and Software, Cloud Computing, Mobile Phones ...11Decks304Flashcards1Learner -
CISSP
CISSP
By: David Caranfa
Risk Management, Controls, BC/DC ...27Decks183Flashcards1Learner -
6035 supplement
6035 supplement
By: Phillip Son
P2L5 Intro to Cryptography, P2L6 Symmetric Encryption, Public Key crypto ...6Decks96Flashcards4Learners -
Security+ 601 Acronyms w/Definitions
Security+ 601 Acronyms w/Definitions
By: Zena Quiroz
Security +601 Acronyms and Definitions, Network Protocols, TCP vs. UDP ...17Decks190Flashcards3Learners -
Mykes Notes
Mykes Notes
By: Okoye Michael
Crafting Interpreters, Reading Research Papers, Rust Language ...7Decks169Flashcards2Learners -
CISSP
CISSP
By: Jordan I
Chapter 4 - Laws, Regulation, Compliance, Chapter 5, Chapter 6 - Cryptography3Decks21Flashcards1Learner -
CASP
CASP
By: Kim k
Assessment Test, Cryptography2Decks30Flashcards5Learners -
SSCP
SSCP
By: Nap Escasinas
Chapter 1 - Security Fundamentals, Chapter 2 - Access Controls, Chapter 3 - Basic Networking and Communications ...14Decks321Flashcards11Learners -
Security (Part 1)
Security (Part 1)
By: Hana Chong
IT Risk and Risk Assessment, Cryptography, IT Controls ...6Decks125Flashcards4Learners -
CP2414 Network Security
CP2414 Network Security
By: Reece Kelly
Week 1 - Introduction & Application and Networking-based Attacks, Week 2 - Administering Secure Networks, Week 3 - Intruders and Firewalls ...7Decks105Flashcards1Learner -
my CEH - Certified Ethical Hacker
my CEH - Certified Ethical Hacker
By: Roger Pharr
Chapter 1 Introduction to Ethical Hacking, Chapter 0 Random Terms, Chapter 2 System Fundamentals ...19Decks406Flashcards23Learners -
SocProf
SocProf
By: Daniel Casley
Social, Professional Issues and Legislation, Cryptography, Computer Misuse ...5Decks69Flashcards1Learner -
Cissp
Cissp
By: Daniel meyer
Chapter 3 - CISSP, Chapter 3 - Cryptography Only2Decks163Flashcards4Learners -
Security+ prep
Security+ prep
By: Michael Vlieger
Security Refresh, Security+ Ports, Cryptography ...5Decks147Flashcards3Learners -
CEH Exam Guide 3rd Ed, for CEH Exam v9
CEH Exam Guide 3rd Ed, for CEH Exam v9
By: Stephen Holden
Chapter 1 - Essential Knowledge (Introduction to Ethical Hacking), Chapter 2 - Reconnaissance (Footprinting and Reconnaissance), Chapter 3 - Scanning and Enumeration (Scanning Networks) ...17Decks545Flashcards42Learners -
Comptia
Comptia
By: Unknown Unknown
1.1 - General Security Concepts, 2.1 - Summarise fundamental security concepts, 2.2 - Zero trust ...9Decks141Flashcards1Learner -
Ports and Protocols
Ports and Protocols
By: Nigel Lim
Ports and Protocols, Types of Hackers, Threats to VMS ...13Decks86Flashcards2Learners -
Information säkerhet
Information säkerhet
By: QQequalstears QQequalstears
Attack, threats, General knowledge, Password, cryptography, threat modelling ...5Decks118Flashcards1Learner -
CompTIA Security+
CompTIA Security+
By: Jason Keyt
LP - Security Goals and Controls, LP - Fundamental Security Concepts, LP - Practical Cryptography ...22Decks478Flashcards2Learners
-
Entrance Exams
-
Professional Certifications
-
Foreign Languages
-
Science
-
English
-
Humanities & Social Studies
-
Mathematics
-
Medical & Nursing
-
Vocations
-
Law
-
Health & Fitness
-
Business & Finance
-
Technology & Engineering
-
Food & Beverage
-
Fine Arts
-
Random Knowledge
-
Architecture
-
Biotechnology
-
Computer Programming
-
Computer Science
-
Engineering
-
Graphic Design
-
Information Security
-
Information Technology
-
Management Information Systems
-
Technology Certifications