Learn Digital Forensic
Study Digital Forensic using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Investigation
Investigation
By: Avery Parker
Collecting Evidence, Data Analysis And Reporting Tools….2 Answers Missing, Digital Forensics ...10Decks344Flashcards6Learners -
CCT-121
CCT-121
By: Joshua Tharrington
Cengage Chapter 1 - Understanding the Digital Forensics Profession and Operations, Cengage Chapter 2 - The Investigator's Office and Laboratory, Cengage Chapter 3 - Data Acquisition ...15Decks313Flashcards3Learners -
Study CompTia SY0-601
Study CompTia SY0-601
By: J Klug
Must know Items, Security+ Acronyms, Ports to Service ...24Decks746Flashcards12Learners -
Wall prep
Wall prep
By: Lhasa Odessa
CSS Attacks, Directory Commands, Frye vs Daubert ...11Decks270Flashcards1Learner -
Digital Evidence, computer Crime.
Digital Evidence, computer Crime.
By: Makponse Yamonche
Chapter 1: Foundations of Digital Forensics, Language of Computer Crime Investigation, Chapter 3 : Digital Evidence in the Coutroom ...5Decks61Flashcards7Learners -
Security+ SY0-601
Security+ SY0-601
By: David Wartman
1.0 Acronyms, 1.1 Social Engineering Techniques, 1.2 Malware Types ...37Decks832Flashcards393Learners -
UOFG_CYBER_SECURITY
UOFG_CYBER_SECURITY
By: michal wozniak
Lecture 1 - Introduction, Lecture 2 - Networks, Lecture 3 - Access Control Basics ...18Decks236Flashcards1Learner -
(6) CompTia Security+ SY0-601 Definitions
(6) CompTia Security+ SY0-601 Definitions
By: Maciej Węgrzynowski
1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application Attacks ...47Decks1,691Flashcards29Learners -
Sec+
Sec+
By: Zach Harvey
Ports and protocols, Social Engineering, Attack types ...37Decks577Flashcards3Learners -
CS449 Exam 2
CS449 Exam 2
By: Geno Brown
The Discipline of Internet Forensics, Bruce Schneier on Future Digital Threats, A Protocol Layer Survey of Network Security ...6Decks74Flashcards1Learner -
Computer Forensics
Computer Forensics
By: Anna Speigner
Book One-Chapter One, Book One-Chapter Two, Book One-Chapter Three ...19Decks219Flashcards18Learners -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
1.1 Social Engineering, 1.2 Attack Types, 1.3 Application Attacks ...35Decks722Flashcards18Learners -
Security+
Security+
By: Gary Hartzell
Threats, Offensive Security, Cloud ...10Decks90Flashcards1Learner -
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
By: Alex valentine
Malware and Indicators of Compromise, Attacks, Threat Actors ...29Decks412Flashcards5Learners -
Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations
By: Clayton Littell
Understanding the Digital Forensics Profession and Investigations1Decks27Flashcards4Learners -
Security+ 601
Security+ 601
By: Will Schmidt
Sec+ Chapter 01: Today's Security Professional, Sec+ Chapter 02: Cybersecurity Threat Landscape, Sec+ Chapter 03: Malicious Code ...18Decks921Flashcards4Learners -
Security+
Security+
By: Jonathan Russial
Chapter 1 - General Concepts, Chapter 2 - Threat Landscape, Chapter 3 - Malicious Code ...20Decks622Flashcards1Learner -
Sec+ 601 Practice Questions
Sec+ 601 Practice Questions
By: Kris G
Lesson 1: Comparing Security Roles and Security Controls, Lesson 2: Explaining Threat Actors and Threat Intelligence, Lesson 3: Performing Security Assessments ...21Decks305Flashcards126Learners -
Comptia
Comptia
By: Russell Davis
Social Engineering, Determine type of attack via indicators, Application Attacks ...35Decks1,194Flashcards22Learners -
CyberOPS
CyberOPS
By: Chris Northrup
Module 1, Module 2, Module 3 ...20Decks473Flashcards1Learner -
Comptia SEC+
Comptia SEC+
By: Shawn Mosby
Section 2.2 Virtualization and Cloud Computing Concepts, Section 2.3 Secure Application development, deployment, and automation concepts, Section 2.4 Authentication and Authorization Design concepts ...27Decks1,865Flashcards11Learners -
Guide to Computer Forensics and Investigations: Fifth Edition
Guide to Computer Forensics and Investigations: Fifth Edition
By: Cynthia Anan
Chapter 5: Working with Windows and CLI Systems, Chapter 6: Current Digital Forensics Tools, Chapter 7: Linux and Macintosh File Systems ...4Decks45Flashcards6Learners -
Cyber
Cyber
By: Skylar Melis
Types of Hackers, Ethical Hacking vs. Penetration Testing vs. Auditing, Common Hacking Methodologies ...13Decks53Flashcards2Learners -
CompTIA Sec+
CompTIA Sec+
By: James Camp
Social Engineering Techniques, Types of Attacks/Malware, Application Attacks ...29Decks377Flashcards5Learners -
4.0 - Operations and Incident Response
4.0 - Operations and Incident Response
By: Melissa Andrews
4.1 Operations and Incident Response (IR), 4.2 IR Policies, Processes, and Procedures, 4.3 Data Sources for Investation ...5Decks122Flashcards2Learners -
Security+
Security+
By: Zoubida Regzal
1.1 Social engineering attacks, 1.2 Malware & common attacks, 1.3 Application attacks ...35Decks859Flashcards6Learners -
CASP+
CASP+
By: Odin Boseth
Section 2: Data Considerations, Section 3: Risk Management, Section 4: Policies and Frameworks ...26Decks172Flashcards1Learner -
Certified Cyber Forensic Professional
Certified Cyber Forensic Professional
By: Keith Beastrom
Domain 1 - Legal And Ethical Principles, Domain 2 - Investigations, Domain 3 - Forensic Science ...6Decks50Flashcards3Learners -
CSF
CSF
By: Maria Beatriz Martins
1-Overview, 2 - Legal framework, 3 - Digital Investigation Process ...8Decks58Flashcards2Learners -
FSC300
FSC300
By: Emily Love
Photography: Intro, History, Basic Camera Function, Photography: Digital, Lenses and Exposure, Fingerprint History and Pioneers ...11Decks413Flashcards1Learner