Learn Enterprise Computing
Study Enterprise Computing using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(29)
Decks
Flashcards
Learners
-
Procedures and Policies
Procedures and Policies
By: Jeremy Dowling
IS0001-04 Information Security Plan, QS0001-03: Quality Statement and Principles, QS0002-02: Controlled Document Procedures ...35Decks186Flashcards25Learners -
Grundlagen der IT- und ERP-Systeme
Grundlagen der IT- und ERP-Systeme
By: Max Mustermann
Lektion 1 - Grundlagen zur IT-Unternehmensarchitektur, Lektion 2 - Bestandteile einer erfolgreichen IT-Unternehmensarchitektur, Lektion 3 - Informationssicherheit ...6Decks104Flashcards1Learner -
MIS
MIS
By: Cornelius Krug
McAfee mastering three worlds of IT, Will Humans go the way of horses?, Roch, IS development ...23Decks145Flashcards1Learner -
2.0 Architecture and Design
2.0 Architecture and Design
By: Justin Doring
2.1 Explain the importance of security concepts in an enterprise environment, 2.2 Summarize virtualization and cloud computing concepts, 2.3 Summarize secure application development, deployment, and automation concepts ...8Decks257Flashcards3Learners -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types ...41Decks1,670Flashcards17Learners -
Information Systems in E-Business & Online Commerce
Information Systems in E-Business & Online Commerce
By: M K
Lecture 1 (Role of IS in E-Business & Online Commerce), Lecture 2 (No-code & Low-code platforms), Lecture 4 (Information Systems Complexity and Enterprise Architecture) ...9Decks97Flashcards1Learner -
AIS
AIS
By: Frederik Jakobsen
CHAPTER 1 Accounting Information Systems: An Overview, CHAPTER 2 Overview of Transaction Processing and Enterprise Resource Planning Systems, CHAPTER 3 Systems Documentation Techniques ...19Decks189Flashcards27Learners -
M362 Frequent Exam Topics
M362 Frequent Exam Topics
By: Amy Barrett
Mobile Computing, Remote Method Invocation, Remote Procedure Calls ...11Decks74Flashcards4Learners -
ACC 401
ACC 401
By: Calvin Shaw
Chapter 1 - Accounting Information Systems: An Overview, Chapter 2 - Overview of Transaction Processing and Enterprise Resource Planning Systems, Chapter 8 - Fraud and Errors ...10Decks278Flashcards1Learner -
SYO-601
SYO-601
By: Maria Ouvarova
Social Engineering, Types of Attack, Computing Architecture ...10Decks600Flashcards1Learner -
DOMAIN 2 Sec+
DOMAIN 2 Sec+
By: I J
2.1 Explain the importance of security concepts in an enterprise environment, 2.2 Summarize virtualization and cloud computing concepts, 2.3 Summarize secure application development, deployment, and automation concepts ...8Decks212Flashcards1Learner -
MIS
MIS
By: Luca Ben
SESSION 2 - Mastering the three worlds of information technology, SESSION 3 - Info systems for business and beyond, SESSION 3 - Humans vs. Horses ...32Decks192Flashcards4Learners -
Official Cisco Dev Net
Official Cisco Dev Net
By: Kerry Gambrel
2.0 Software Design and Development, 3.0 Intro to python, 8.0 Cisco Enterprise Networking Management Platforms and API ...4Decks69Flashcards2Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...35Decks546Flashcards18Learners -
Infosys 110
Infosys 110
By: Macy Watson
Topics 1 - 7, Enteprise Architecture - topic 7, Hardware and Networks ...12Decks166Flashcards2Learners -
Sec+
Sec+
By: GiGi C.
1.1 social engineering techniques, 1.2 analyze potential indicators to determine the type of attack, 1.3 potential indicators associated with application attacks ...38Decks387Flashcards1Learner -
Security+
Security+
By: Artur Varvashin
General Concepts, 1.1 Compare and contrast various types of security controls, 1.2 Summarize fundamental security concepts. ...29Decks160Flashcards1Learner -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. ...40Decks663Flashcards1Learner -
Sec+ -> 2.0 Architecture and Design (21%)
Sec+ -> 2.0 Architecture and Design (21%)
By: Isabelle S
2.1 - Explain the importance of security concepts in an enterprise environment., 2.2 - Summarize virtualization and cloud computing concepts., 2.3 - Summarize secure application development, deployment, and automation concepts. ...8Decks201Flashcards1Learner -
AIS
AIS
By: Frederik Jakobsen
Chapter 1 – ‘Accounting Information Systems: An Overview’, Chapter 2 – ‘Overview of Transaction Processing and Enterprise Resource Planning Systems’, Chapter 3 – ‘Systems documentation Techniques’ ...19Decks190Flashcards4Learners -
Security Plus 701
Security Plus 701
By: Zoning Unknown
Exam Note, 1.1 Compare and contrast various types of security controls, 1.2 Summarize fundamental security concepts ...30Decks70Flashcards5Learners -
CSA CCSK
CSA CCSK
By: Breanna Lowery
DOMAIN 1 - DEFNITIONS OF CLOUD COMPUTING, DOMAIN 1 - CLOUD SECURITY SCOPE, RESPONSIBILTIES, AND MODELS, DOMAIN 2 - TOOLS OF CLOUD GOVERNANCE ...23Decks227Flashcards1Learner -
SEC+
SEC+
By: Kevin Watke
1.5: Threat Actors and Vectors, 1.6: Vulnerabilities, 1.7: Security Assessments ...31Decks65Flashcards2Learners -
Management Information Systems
Management Information Systems
By: Kristen Graves
Chapter 1 - Introduction to Information System Organizations, Chapter 2 - Hardware and Software, Chapter 3 - Database Systems and Big Data ...10Decks146Flashcards1Learner -
MIS
MIS
By: Gabriel E Longoria
EXCEL_Unit 1 - 2 Introduction and Formatting, EXCEL_Unit 3 - Performing Calculations with Formulas and Functions, EXCEL_Unit 4 - Analyzing and Charting Financial Data ...9Decks15Flashcards2Learners -
Security+
Security+
By: Brandon R
Practical Cryptography, Identity and Access Management, Architecture & Infrastructure Concepts ...16Decks127Flashcards1Learner -
Softwaretechnik II
Softwaretechnik II
By: Moritz Br
Clean Code, Architecture, Components ...6Decks32Flashcards1Learner -
NN_AWZ_Platform1.0
NN_AWZ_Platform1.0
By: Nigel N3
AWS Global Infrastructure, Networking, Compute ...13Decks64Flashcards1Learner -
IT Governance
IT Governance
By: James Boyd
Risks and Controls in a computer based Accounting Info Systems, COBIT Model of IT and Governance and Management, Introduction to Enterprise Wide and Cloud-Based systems ...4Decks16Flashcards1Learner