Learn Digital Investigations
Study Digital Investigations using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(13)
Decks
Flashcards
Learners
-
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. ...40Decks663Flashcards1Learner -
Product Design
Product Design
By: Miss Smith
1.1 Mechanical & Physical Properties of Materials, 1.2 Classification of Materials, 1.3 Methods for Investigating and Testing Materials ...26Decks171Flashcards2Learners -
Psychology - cognitive psychology
Psychology - cognitive psychology
By: Ella Packham
2.1.1 - the working memory model (Baddeley and Hitch, 1974), 2.1.2 - the multi-store model of memory, 2.1.6 - developmental psychology in memory (dyslexia and working memory) ...20Decks209Flashcards1Learner -
Security+ Continuation
Security+ Continuation
By: Wisdom Eke
3.5 Given a scenario, implement secure mobile solutions., 3.6 Given a Scenario, apply Cybersecurity Solutions to the cloud, 3.7 Given a Scenarior, Implement Identity and account management controls ...15Decks463Flashcards1Learner -
4.0 Operations and Incident Response
4.0 Operations and Incident Response
By: E. Slate
4.1 Organizational Security, 4.2 Policies / Processes Incident Response, 4.3 Incident Investigation ...5Decks25Flashcards2Learners -
ICT A Level
ICT A Level
By: Darren Nott
1b Investigation methods, 1c Prototyping & RAD *, 1d Testing & Test Plans * ...54Decks164Flashcards8Learners -
SGreene
SGreene
By: Andrew Levine
1.1 Understand, Adhere, and Promote Professional Ethics, 1.2 Understand and Apply Security Concepts, 1-4.3 Privacy Principles ...126Decks622Flashcards1Learner -
SEC+
SEC+
By: Kevin Watke
1.5: Threat Actors and Vectors, 1.6: Vulnerabilities, 1.7: Security Assessments ...31Decks65Flashcards2Learners -
Percepio Security +
Percepio Security +
By: Beth Hosek
Social Engineering Techniques & Other Attack Types, Implementing Identity and Account Management & AAA Solutions, Physical Security Controls ...12Decks38Flashcards1Learner -
Y4 SA - MSK
Y4 SA - MSK
By: Lucy Butler
Investigation & management of the juvenile lame animal, Elbow imaging, MSK diagnostics review & interpretation of orthopaedic radiographs ...17Decks50Flashcards1Learner -
Summative Two
Summative Two
By: Ann Bennett
Road Traffic Act 1988, Police powers in relation to Drivers, Drink Driving and ASB ...10Decks66Flashcards1Learner -
DT : Technical Principles
DT : Technical Principles
By: Tyler Jag
Materials and their application, Classification of materials, Methods for investigating and testing materials ...29Decks109Flashcards1Learner -
Sec+ -> 4.0 Operations and Incident Response (16%)
Sec+ -> 4.0 Operations and Incident Response (16%)
By: Isabelle S
4.1 - Given a scenario, use the appropriate tool to assess organizational security., 4.2 - Summarize the importance of policies, processes, and procedures for incident response., 4.3 - Given an incident, utilize appropriate data sources to support an investigation. ...5Decks41Flashcards1Learner