Learn Digital Forensic
Study Digital Forensic using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(22)
Decks
Flashcards
Learners
-
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...35Decks546Flashcards18Learners -
CySA+
CySA+
By: Brandon R
Cryptography, Managing Risk, Public Key Infrastructure ...28Decks234Flashcards3Learners -
CySA+ 2023
CySA+ 2023
By: Thomas Hollinghurst
1A. Identify Security Control Types obj 5.3, 1B. Importance of Threat Data and Intelligence obj 1.1, 1.2, 2A. Threats and Threat Actor Types ...15Decks209Flashcards4Learners -
Major Investigations
Major Investigations
By: Joana Gaspar
Intell, Evaluating intell, The value of intelligence and recap of models/ processes ...9Decks138Flashcards1Learner -
CISSP - Domain 7
CISSP - Domain 7
By: Floyd Mayfield
BCP (Business Continuity Plan), Incident Management 8 step lifecycle, Key Terms ...15Decks75Flashcards2Learners -
USNA Cyber
USNA Cyber
By: Kris Medina
Cyber Domain & Pillars of Cyber Security, Risk, Computer Architecture ...30Decks240Flashcards5Learners -
CSC2004: Cyber Security Fundamentals
CSC2004: Cyber Security Fundamentals
By: Jun Xian Lim
Summary: Lecture 13, Intro to Cryptography & Asymmetric Cryptography: Lecture 1, Access Control: Lecture 2 ...11Decks56Flashcards2Learners -
Sec+
Sec+
By: GiGi C.
1.1 social engineering techniques, 1.2 analyze potential indicators to determine the type of attack, 1.3 potential indicators associated with application attacks ...38Decks387Flashcards1Learner -
SOC Analyst HackTheBox Academy Path
SOC Analyst HackTheBox Academy Path
By: Kelly Martin
Introduction to Digital Forensics1Decks58Flashcards1Learner -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. ...40Decks663Flashcards1Learner -
Applied Security Methods
Applied Security Methods
By: Precious Precious
Introduction to Penetration Testing, Open Source Intelligence and Reconnaissance, Password Security ...7Decks62Flashcards1Learner -
Security+ Continuation
Security+ Continuation
By: Wisdom Eke
3.5 Given a scenario, implement secure mobile solutions., 3.6 Given a Scenario, apply Cybersecurity Solutions to the cloud, 3.7 Given a Scenarior, Implement Identity and account management controls ...15Decks463Flashcards1Learner -
4.0 Operations and Incident Response
4.0 Operations and Incident Response
By: E. Slate
4.1 Organizational Security, 4.2 Policies / Processes Incident Response, 4.3 Incident Investigation ...5Decks25Flashcards2Learners -
Criminology
Criminology
By: Chloe Wren
W2: Green Criminology, W2: Understanding Crime, W3: Digital Forensics3Decks34Flashcards1Learner -
Incident Response
Incident Response
By: Jonathan Nuqui
Incident Response Process, Threat Hunting, Root Cause Analysis ...6Decks43Flashcards1Learner -
Forensic Science
Forensic Science
By: Emily French
History, Trace Evidence, Bodily Fluids ...9Decks23Flashcards1Learner -
Infosec
Infosec
By: Xeroxis Labz
CEH, Digital Forensics, Cryptography3Decks21Flashcards1Learner -
SEC+
SEC+
By: Kevin Watke
1.5: Threat Actors and Vectors, 1.6: Vulnerabilities, 1.7: Security Assessments ...31Decks65Flashcards2Learners -
Percepio Security +
Percepio Security +
By: Beth Hosek
Social Engineering Techniques & Other Attack Types, Implementing Identity and Account Management & AAA Solutions, Physical Security Controls ...12Decks38Flashcards1Learner -
Sec+ -> 4.0 Operations and Incident Response (16%)
Sec+ -> 4.0 Operations and Incident Response (16%)
By: Isabelle S
4.1 - Given a scenario, use the appropriate tool to assess organizational security., 4.2 - Summarize the importance of policies, processes, and procedures for incident response., 4.3 - Given an incident, utilize appropriate data sources to support an investigation. ...5Decks41Flashcards1Learner -
CipherTechs
CipherTechs
By: Nicholas Leask
Governance, Risk & Compliance, Offensive Security Services, Defensive & Managed Services ...5Decks25Flashcards1Learner -
Security+
Security+
By: Anne Leach
1. Malware and IOC, 2. Attacks, 3. Threat Actors ...29Decks66Flashcards1Learner