Learn Enterprise Computing
Study Enterprise Computing using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(22)
Decks
Flashcards
Learners
-
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types ...41Decks1,670Flashcards6Learners -
ACC 401
ACC 401
By: Calvin Shaw
Chapter 1 - Accounting Information Systems: An Overview, Chapter 2 - Overview of Transaction Processing and Enterprise Resource Planning Systems, Chapter 8 - Fraud and Errors ...10Decks278Flashcards1Learner -
AIS
AIS
By: Frederik Jakobsen
CHAPTER 1 Accounting Information Systems: An Overview, CHAPTER 2 Overview of Transaction Processing and Enterprise Resource Planning Systems, CHAPTER 3 Systems Documentation Techniques ...19Decks189Flashcards22Learners -
DOMAIN 2 Sec+
DOMAIN 2 Sec+
By: I J
2.1 Explain the importance of security concepts in an enterprise environment, 2.2 Summarize virtualization and cloud computing concepts, 2.3 Summarize secure application development, deployment, and automation concepts ...8Decks212Flashcards1Learner -
MIS
MIS
By: Luca Hallet
SESSION 2 - Mastering the three worlds of information technology, SESSION 3 - Info systems for business and beyond, SESSION 3 - Humans vs. Horses ...32Decks192Flashcards4Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...35Decks546Flashcards19Learners -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. ...40Decks663Flashcards1Learner -
Sec+
Sec+
By: GiGi C.
1.1 social engineering techniques, 1.2 analyze potential indicators to determine the type of attack, 1.3 potential indicators associated with application attacks ...38Decks387Flashcards1Learner -
Sec+ -> 2.0 Architecture and Design (21%)
Sec+ -> 2.0 Architecture and Design (21%)
By: Isabelle S
2.1 - Explain the importance of security concepts in an enterprise environment., 2.2 - Summarize virtualization and cloud computing concepts., 2.3 - Summarize secure application development, deployment, and automation concepts. ...8Decks201Flashcards1Learner -
arqui
arqui
By: Diego Emanuel Civini
Atributos de calidad, Estilos arquitectonicos, Web y REST ...7Decks102Flashcards1Learner -
Official Cisco Dev Net
Official Cisco Dev Net
By: Kerry Gambrel
2.0 Software Design and Development, 3.0 Intro to python, 8.0 Cisco Enterprise Networking Management Platforms and API ...4Decks69Flashcards1Learner -
CSA CCSK
CSA CCSK
By: Breanna Lowery
DOMAIN 1 - DEFNITIONS OF CLOUD COMPUTING, DOMAIN 1 - CLOUD SECURITY SCOPE, RESPONSIBILTIES, AND MODELS, DOMAIN 2 - TOOLS OF CLOUD GOVERNANCE ...23Decks227Flashcards1Learner -
AIS
AIS
By: Frederik Jakobsen
Chapter 1 – ‘Accounting Information Systems: An Overview’, Chapter 2 – ‘Overview of Transaction Processing and Enterprise Resource Planning Systems’, Chapter 3 – ‘Systems documentation Techniques’ ...19Decks190Flashcards3Learners -
SEC+
SEC+
By: Kevin Watke
1.5: Threat Actors and Vectors, 1.6: Vulnerabilities, 1.7: Security Assessments ...31Decks65Flashcards2Learners -
Management Information Systems
Management Information Systems
By: Kristen Graves
Chapter 1 - Introduction to Information System Organizations, Chapter 2 - Hardware and Software, Chapter 3 - Database Systems and Big Data ...10Decks146Flashcards1Learner -
Security+
Security+
By: Brandon R
Practical Cryptography, Identity and Access Management, Architecture & Infrastructure Concepts ...16Decks127Flashcards1Learner -
Softwaretechnik II
Softwaretechnik II
By: Moritz Br
Clean Code, Architecture, Components ...6Decks32Flashcards1Learner -
Security+
Security+
By: Artur Varvashin
General Concepts, 1.1 Compare and contrast various types of security controls, 1.2 Summarize fundamental security concepts. ...29Decks32Flashcards1Learner -
Security Plus 701
Security Plus 701
By: Zoning Unknown
Exam Note, 1.1 Compare and contrast various types of security controls, 1.2 Summarize fundamental security concepts ...30Decks70Flashcards1Learner -
NN_AWZ_Platform1.0
NN_AWZ_Platform1.0
By: Nigel N3
AWS Global Infrastructure, Networking, Compute ...13Decks64Flashcards1Learner -
MIS
MIS
By: Gabriel E Longoria
EXCEL_Unit 1 - 2 Introduction and Formatting, EXCEL_Unit 3 - Performing Calculations with Formulas and Functions, EXCEL_Unit 4 - Analyzing and Charting Financial Data ...9Decks15Flashcards1Learner -
IT Governance
IT Governance
By: James Boyd
Risks and Controls in a computer based Accounting Info Systems, COBIT Model of IT and Governance and Management, Introduction to Enterprise Wide and Cloud-Based systems ...4Decks16Flashcards1Learner