Learn Computer Forensics
Study Computer Forensics using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(23)
Decks
Flashcards
Learners
-
CompTIA Security+ Certification Practice Exams, Third Edition (Exam SY0-501)
CompTIA Security+ Certification Practice Exams, Third Edition (Exam SY0-501)
By: Alex valentine
Networking Basics and Terminology, Introduction to Security Terminology, Security Policies and Standards20Decks695Flashcards5Learners -
Technology
Technology
By: Robert B
ITN276 - Computer Forensics - Midterm Exam - Review, ITN107 - Personal Computer and Troubleshooting - Midterm Exam - Review, ITN101 - Intro to Network Concepts - Exam 1 - Review3Decks342Flashcards4Learners -
Security+ SY0-601
Security+ SY0-601
By: David Wartman
1.0 Acronyms, 1.1 Social Engineering Techniques, 1.2 Malware Types37Decks832Flashcards358Learners -
(6) CompTia Security+ SY0-601 Definitions
(6) CompTia Security+ SY0-601 Definitions
By: Maciej Węgrzynowski
1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application Attacks47Decks1,691Flashcards26Learners -
Sec+
Sec+
By: Zach Harvey
Ports and protocols, Social Engineering, Attack types37Decks577Flashcards3Learners -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
1.1 Social Engineering, 1.2 Attack Types, 1.3 Application Attacks35Decks722Flashcards11Learners -
Information Security
Information Security
By: Hanan Timraz
General Security Concepts, Cryptography, Key Management13Decks152Flashcards6Learners -
Comptia
Comptia
By: Russell Davis
Social Engineering, Determine type of attack via indicators, Application Attacks35Decks1,194Flashcards16Learners -
C178 - Security+ SYO-601
C178 - Security+ SYO-601
By: Jonathan Maner
Section 1: Security Overview, Section 2: Malware, Section 3: Malware Infections30Decks635Flashcards4Learners -
Comptia SEC+
Comptia SEC+
By: Shawn Mosby
Section 2.2 Virtualization and Cloud Computing Concepts, Section 2.3 Secure Application development, deployment, and automation concepts, Section 2.4 Authentication and Authorization Design concepts27Decks1,865Flashcards5Learners -
Digital Evidence, computer Crime.
Digital Evidence, computer Crime.
By: Makponse Yamonche
Chapter 1: Foundations of Digital Forensics, Language of Computer Crime Investigation, Chapter 3 : Digital Evidence in the Coutroom5Decks61Flashcards7Learners -
CF
CF
By: Bob 01
Computer Forensics review, Windows File System Layout, GUID (Globally Unique Identifier)14Decks122Flashcards1Learner -
ECC CCE
ECC CCE
By: Kamil Gierach-Pacanek
Data Security, Network Monitoring, Analysis and Troubleshooting, Incident Response4Decks120Flashcards1Learner -
CompTIA Sec+
CompTIA Sec+
By: James Camp
Social Engineering Techniques, Types of Attacks/Malware, Application Attacks29Decks377Flashcards5Learners -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types41Decks1,670Flashcards3Learners -
CCSP
CCSP
By: Brian White
Module 1: Understanding Cloud Computing Concepts, Module 2: Architectural Design and Reference Requirements, Module 3: Understanding Concepts relevant to Cloud Computing42Decks171Flashcards74Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks35Decks546Flashcards16Learners -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks.40Decks662Flashcards1Learner -
Sec+
Sec+
By: GiGi C.
1.1 social engineering techniques, 1.2 analyze potential indicators to determine the type of attack, 1.3 potential indicators associated with application attacks38Decks387Flashcards1Learner -
USNA Cyber
USNA Cyber
By: Kris Medina
Cyber Domain & Pillars of Cyber Security, Risk, Computer Architecture30Decks240Flashcards4Learners -
Security+
Security+
By: Bradley Wright
Networking Basics & Terms, Intro to Security Terms, Security Policies & Standards19Decks143Flashcards2Learners -
COMP41590_AdvancedComputerForensics
COMP41590_AdvancedComputerForensics
By: Michael Prozee
Lecture 1 + 2 Intro / Computer Forensics Review, Lecture 3 - Windows File System Layout, Lecture 4 - GUID (Globally Unique Identifier4Decks81Flashcards1Learner -
SEC+
SEC+
By: Kevin Watke
1.5: Threat Actors and Vectors, 1.6: Vulnerabilities, 1.7: Security Assessments31Decks65Flashcards2Learners