Learn Application Security
Study Application Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
OCP Java SE 17 (1Z0-829)
OCP Java SE 17 (1Z0-829)
By: Andrei Suslov
Chapter 1, Chapter 2, Chapter 3 ...21Decks970Flashcards255Learners -
CCSK v4
CCSK v4
By: wyt hat
Domain 1 - Cloud Computing Concepts and Architectures, Domain 2 - Governance and Enterprise Risk Management, Domain 3 - Legal Issues, Contracts and E-discovery ...11Decks238Flashcards367Learners -
CS4203: Computer Security
CS4203: Computer Security
By: Seamus Bonner
Introduction, Cryptography, Hashing ...19Decks522Flashcards16Learners -
network A+
network A+
By: Mark Scribner
Chapter 1, Chapter 1 - Sheet1, Chapter 2 ...22Decks1,900Flashcards70Learners -
Sem 1-AHEAD_Cyber_Security
Sem 1-AHEAD_Cyber_Security
By: Hemant Kumar
Python Modules Types, Python Methods, Memory & Learning ...27Decks585Flashcards4Learners -
Security+
Security+
By: Sean Shirley
Basics and fundamentals, General Security threats, Generally Mitigating Threats ...41Decks807Flashcards1Learner -
9569 H2 Computing
9569 H2 Computing
By: Ng Jun Siang
Data Structures and Abstract Data Types, Object Oriented Programming, Recursion ...15Decks156Flashcards32Learners -
CISSP - Security Management
CISSP - Security Management
By: Tim Pelland
CIA Triad, Control Types, OSI Models ...12Decks831Flashcards29Learners -
Security + Messer
Security + Messer
By: Blayne Ehrenzeller
1.1 - Social Engineering, 1.2 - Attack Types, 1.3 - Application Attacks ...24Decks622Flashcards1Learner -
Security + 601
Security + 601
By: Sean Suga
Security+ 601 Acronyms, Lesson 3: Performing Security Assessments, Lesson 4: Identifying Social Engineering and Malware ...13Decks854Flashcards20Learners -
Google Cloud Digital Leader
Google Cloud Digital Leader
By: Katherine Malewski
Intro to Digital Transformation, Innovating with Google Cloud, Infrastructure & Application Modernization with Google CLoud ...5Decks94Flashcards123Learners -
A Cloud Guru - AWS
A Cloud Guru - AWS
By: Srinivasan J
IAM, Infra, S3 ...11Decks682Flashcards4Learners -
Next Gig
Next Gig
By: Jamila Duckett
Security Primer, Cloud Concepts, Architecture and Design, Cloud Data Security ...17Decks883Flashcards1Learner -
CompTIA Security+
CompTIA Security+
By: Josef Mengele
Chapter 1 Measuring and Weighing Risk, Chapter 2 Monitoring and Diagnosing Networks, Chapter 3 Understanding Devices and Infrastructure ...12Decks378Flashcards232Learners -
Security+
Security+
By: Dillan Beckelheimer
Chapter 2: Monitoring and Diagnosing Networks, Security+ Questions, Chapter 3: Understanding Devices and Infrastructure ...8Decks297Flashcards100Learners -
Security+
Security+
By: Taimoor Fayyaz
Ports, Basics, Malware ...22Decks583Flashcards1Learner -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...35Decks546Flashcards19Learners -
CompTIA Sec+
CompTIA Sec+
By: James Camp
Social Engineering Techniques, Types of Attacks/Malware, Application Attacks ...29Decks377Flashcards5Learners -
Computer Science IGCSE
Computer Science IGCSE
By: SL ng
CS Key Terms, Networking and the Internet, Revision notes AQA ...9Decks246Flashcards468Learners -
Comp TIA A+ 220 1002 Chris
Comp TIA A+ 220 1002 Chris
By: chris carnaffin
1.1 - Compare and contrast common operating system types and their purposes., 1.2 - Compare and contrast features of Microsoft Windows versions., 1.3 - Summarise general OS installation considerations and upgrade methods. ...33Decks497Flashcards113Learners -
Computer Science (Year 2)
Computer Science (Year 2)
By: Daniel Hole
Software Development, Computer Languages and Representations, Network and Computer Security ...7Decks1,754Flashcards4Learners -
Security+
Security+
By: Richard Romick
Chapter 3: Cryptography, Common Ports, Chapter 4: Network Connectivity ...9Decks388Flashcards1Learner -
► Security+
► Security+
By: B -
Chapter 1: Measuring and Weighing Risk, Chapter 2: Monitoring and Diagnosing Networks, Port Numbers ...13Decks484Flashcards62Learners -
OCP Java SE 17 (1Z0-829)
OCP Java SE 17 (1Z0-829)
By: Mikołaj Telus
Chapter 1, Chapter 2, Chapter 3 ...21Decks1,014Flashcards95Learners -
CCEA GCSE Digital Technology Unit 1
CCEA GCSE Digital Technology Unit 1
By: Alan Templeton
Chapter 1 - Digital Data, Chapter 2 - Software, Chapter 3 - Database Applications ...10Decks280Flashcards58Learners -
Comptia A+ 1102
Comptia A+ 1102
By: Jerry Garcia
Linux, Filesystems, Windows ...12Decks453Flashcards17Learners -
Software security
Software security
By: E Mi
Information security, concepts and principles, OWASP part 1, OWASP part 2 ...16Decks600Flashcards4Learners -
COMPUTER NETWORKS
COMPUTER NETWORKS
By: Sifa Ngari
INTRODUCTION TO COMPUTER NETWORKS, TYPES OF NETWORKS, NETWORKING EQUIPMENT ...23Decks463Flashcards145Learners -
cpi IGCSE
cpi IGCSE
By: Saika .
computer system, input output, Storage Devices ...11Decks323Flashcards4Learners -
Introduction to IT Security
Introduction to IT Security
By: Mathias Unknown
Goals and Principles - What Is Security, Goals and Principles - Privacy, Goals and Principles - Design Principles for Secure Systems ...11Decks127Flashcards26Learners