Learn Computer Forensic
Study Computer Forensic using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(25)
Decks
Flashcards
Learners
-
CS414 - Digital Forensics
CS414 - Digital Forensics
By: Caroline Mckinlay
Week 1 - Further Overview, Week 1 - The Place of Digital Forensics, Week 1 - The Investigative Process ...30Decks316Flashcards17Learners -
Security+ SY0-601
Security+ SY0-601
By: David Wartman
1.0 Acronyms, 1.1 Social Engineering Techniques, 1.2 Malware Types ...37Decks832Flashcards393Learners -
Technology
Technology
By: Robert B
ITN276 - Computer Forensics - Midterm Exam - Review, ITN107 - Personal Computer and Troubleshooting - Midterm Exam - Review, ITN101 - Intro to Network Concepts - Exam 1 - Review3Decks342Flashcards4Learners -
(6) CompTia Security+ SY0-601 Definitions
(6) CompTia Security+ SY0-601 Definitions
By: Maciej Węgrzynowski
1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application Attacks ...47Decks1,691Flashcards29Learners -
Sec+
Sec+
By: Zach Harvey
Ports and protocols, Social Engineering, Attack types ...37Decks577Flashcards3Learners -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
1.1 Social Engineering, 1.2 Attack Types, 1.3 Application Attacks ...35Decks722Flashcards18Learners -
Information Security
Information Security
By: Hanan Timraz
General Security Concepts, Cryptography, Key Management ...13Decks152Flashcards6Learners -
Security Knowledge Bank
Security Knowledge Bank
By: Amie Gray
Abbreviations, Attack Mitigations, Whats that Attack ...23Decks872Flashcards5Learners -
Comptia
Comptia
By: Russell Davis
Social Engineering, Determine type of attack via indicators, Application Attacks ...35Decks1,194Flashcards22Learners -
C178 - Security+ SYO-601
C178 - Security+ SYO-601
By: Jonathan Maner
Section 1: Security Overview, Section 2: Malware, Section 3: Malware Infections ...30Decks635Flashcards4Learners -
Comptia SEC+
Comptia SEC+
By: Shawn Mosby
Section 2.2 Virtualization and Cloud Computing Concepts, Section 2.3 Secure Application development, deployment, and automation concepts, Section 2.4 Authentication and Authorization Design concepts ...27Decks1,865Flashcards11Learners -
Digital Evidence, computer Crime.
Digital Evidence, computer Crime.
By: Makponse Yamonche
Chapter 1: Foundations of Digital Forensics, Language of Computer Crime Investigation, Chapter 3 : Digital Evidence in the Coutroom ...5Decks61Flashcards7Learners -
CompTIA Sec+
CompTIA Sec+
By: James Camp
Social Engineering Techniques, Types of Attacks/Malware, Application Attacks ...29Decks377Flashcards5Learners -
ECC CCE
ECC CCE
By: Kamil Gierach-Pacanek
Data Security, Network Monitoring, Analysis and Troubleshooting, Incident Response ...4Decks126Flashcards1Learner -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types ...41Decks1,670Flashcards6Learners -
CCT
CCT
By: Casey Wilfling
InfoSec Threats, Information Security Attacks, Information Security Fundamentals ...22Decks270Flashcards1Learner -
CCSP
CCSP
By: Brian White
Module 1: Understanding Cloud Computing Concepts, Module 2: Architectural Design and Reference Requirements, Module 3: Understanding Concepts relevant to Cloud Computing ...42Decks171Flashcards75Learners -
COMP41660 Live Data Forensics
COMP41660 Live Data Forensics
By: Sunshine Stars
Week 1 - What Is LDF, Week 1 - Introduction to LDF, Week 2 - LDF Documentation & Reporting ...15Decks177Flashcards4Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...35Decks546Flashcards19Learners -
Sec+
Sec+
By: GiGi C.
1.1 social engineering techniques, 1.2 analyze potential indicators to determine the type of attack, 1.3 potential indicators associated with application attacks ...38Decks387Flashcards1Learner -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. ...40Decks663Flashcards1Learner -
CySA+
CySA+
By: Brandon R
Cryptography, Managing Risk, Public Key Infrastructure ...28Decks234Flashcards2Learners -
Security+
Security+
By: Bradley Wright
Networking Basics & Terms, Intro to Security Terms, Security Policies & Standards ...19Decks143Flashcards2Learners -
USNA Cyber
USNA Cyber
By: Kris Medina
Cyber Domain & Pillars of Cyber Security, Risk, Computer Architecture ...30Decks240Flashcards4Learners -
SEC+
SEC+
By: Kevin Watke
1.5: Threat Actors and Vectors, 1.6: Vulnerabilities, 1.7: Security Assessments ...31Decks65Flashcards2Learners