Learn It Security
Study It Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Cyber Security
Cyber Security
By: Alicia Fanning
Foundations of Cyber Security, Play it safe: Manage security risks, Connect and Protect: Networks and Network Security ...8Decks593Flashcards1Learner -
06. CISM - Chapter 6 - Information Security Program Management
06. CISM - Chapter 6 - Information Security Program Management
By: C MC
01. Information Security Control Design and Selection (240), 02. Information Security Control Implementation and Integrations (265), 03. Cryptography (299) ...10Decks261Flashcards5Learners -
RCDD
RCDD
By: Grant Kuhn
Ch. 7 * (Telecommunications Spaces), Ch. 1 * (Principles of Transmission), Ch. 2 (Electromagnetic Compatibility) ...24Decks857Flashcards326Learners -
Computer Information Systems 5620
Computer Information Systems 5620
By: Yvette Amaral
Chapter 1: Information Systems in Global Business Today, Chapter 2: Global E-business and Collaboration, Chapter 3: Information Systems, Organzations, and Strategy ...14Decks624Flashcards735Learners -
Learning Goals MIS
Learning Goals MIS
By: Johannes Stoffel
Tutorial 1 Mastering three Worlds of IT, System Aquisition & Development & The Future of Jobs, The impact of IT on organizations and markets & IT Fashions ...9Decks112Flashcards6Learners -
AWS Cloud Practitioner
AWS Cloud Practitioner
By: Logan Walter
AWS Practice Questions, AWS Key Services - "Technology" 36%, AWS Cloud Architectural Principles ...9Decks194Flashcards40Learners -
CISM Exam Prep
CISM Exam Prep
By: Bryan Scott
Information Security Governance, Business Continuity & Security, Incident Response ...20Decks186Flashcards1Learner -
CEH Exam Guide 3rd Ed, for CEH Exam v9
CEH Exam Guide 3rd Ed, for CEH Exam v9
By: Stephen Holden
Chapter 1 - Essential Knowledge (Introduction to Ethical Hacking), Chapter 2 - Reconnaissance (Footprinting and Reconnaissance), Chapter 3 - Scanning and Enumeration (Scanning Networks) ...17Decks545Flashcards43Learners -
ISACA CISA Online Review
ISACA CISA Online Review
By: Ethan Arismendez
DM1: Planning Audits, DM1: Conducting Audits, DM2: IT Governance ...11Decks390Flashcards2Learners -
Security Case Development and Design Good Practice
Security Case Development and Design Good Practice
By: Daniel Franklin
1.2, 1.3 - IT Security Design principles and Facets of Trusworthiness, 2.2 - Describe the features of common frameworks for security architectures, 3 - Common Criteria ...10Decks169Flashcards7Learners -
Business Computing
Business Computing
By: Michael Conti
Intro, Week 2, Systems Thinking & Business Analytics ...16Decks490Flashcards8Learners -
Security (Part 1)
Security (Part 1)
By: Hana Chong
IT Risk and Risk Assessment, Cryptography, IT Controls ...6Decks125Flashcards3Learners -
Business CTech Unit 2 Working in a business (Exam)
Business CTech Unit 2 Working in a business (Exam)
By: Deb Spencer
LO1 Business Protocols, LO1.1 Authority Protocols, LO1.2 Confidentiality Protocols ...6Decks30Flashcards8Learners -
History 😭
History 😭
By: Ameline Poussier
Schlieffen Plan And Its Failure, Why Was There A Stalemate On The Western Front, How Important Were Other Fronts ...10Decks452Flashcards8Learners -
CCA
CCA
By: Rose Smith
The role of the cosec, The directors, Effective board practices ...16Decks365Flashcards1Learner -
Copied RCDD
Copied RCDD
By: Moutasim Mousaad
Ch. 7 * (Telecommunications Spaces), Ch. 1 * (Principles of Transmission), Ch. 2 (Electromagnetic Compatibility) ...24Decks857Flashcards19Learners -
Geography paper 3: future of food
Geography paper 3: future of food
By: Mollie Beavan
13.1 – What is food security and why is it of global significance?, 13.1 Globalisation of the food industry, 13.2 What are the causes of inequality in global good security? ...11Decks130Flashcards5Learners -
8610: Information Management Systems - Pearlson
8610: Information Management Systems - Pearlson
By: John Wezner
Introduction, Chapter 1: The Information Systems Strategy Triangle, Chapter 2: Strategic Use of Information Resources ...13Decks490Flashcards6Learners -
MIS Test 2
MIS Test 2
By: Carson Parks
Data Mining, Analytics/SQL, Design Thinking and Bus Model ...10Decks216Flashcards8Learners -
System Security
System Security
By: Joel Cantoral
Introduction, Terminology, Security Design Principles ...16Decks195Flashcards1Learner -
cs 490
cs 490
By: Micah Bai
Chapter 5 - IT Arch & Distributed Systems, Chapter 7 - Managing Information Resources, Chapter 8 - IT Ops & Outsourcing ...12Decks292Flashcards1Learner -
CISA Review Questions, Answers & Explanations Manual 12th edition
CISA Review Questions, Answers & Explanations Manual 12th edition
By: Yao Zhang
1.Information Security Auditing Process(21%), 2.Governance and Management of IT(17%), 3.Information System Acquisition,Development and Implemenation(12%) ...5Decks1,077Flashcards7Learners -
Geography Human
Geography Human
By: Louis Gillam
Changing places, GLOBALISATION, Global commons and Antartica case study ...31Decks380Flashcards2Learners -
DTDDB Eksamen
DTDDB Eksamen
By: Rasmus Hilligsøe
1. General - Intro to the topic, 2. Use of Digital Technologies, 3. Organization and strategy ...10Decks196Flashcards5Learners -
POITMGMT
POITMGMT
By: Wieland Schlehufer
General Knowledge, IT and Digital Business Strategy, IT-organization and controlling ...6Decks145Flashcards2Learners -
IS 323
IS 323
By: Karen Campos
Chapter 7: IT Infrastructure, Chapter 9: Building Information Systems, Chapter 15: Enterprise Applications ...5Decks141Flashcards11Learners -
CIA PART 3 - Surgent
CIA PART 3 - Surgent
By: Aurélie BERRAJAH
Domain I – Business Acumen – Section A : Organizational Objectives, Behaviour, and Performance, Domain I – Business Acumen – Section A : Organizational Objectives, Behaviour, and Performance - Bis, Domain I – Business Acumen – Section B: Organizational Structure and Business Processes ...17Decks469Flashcards14Learners -
ITU
ITU
By: Nikolaj Mattrup
Digital Innovation, Digital Innovation 1, Digital Innovation 2 ...24Decks296Flashcards1Learner -
Information Management
Information Management
By: Adam Greaney
Information management, Cyber security issues + defence mechanisms, Main people/organisations responsible for cyber attacks ...6Decks58Flashcards1Learner -
Year 12 - Unit 2 Exam
Year 12 - Unit 2 Exam
By: Temilade Adesola
2 - the styles, classification and the management of global information, 4 - Legal And Regulatory Framework Governing The Storage And Use Of Global information, 6 - The Principals Of Infomation Security ...6Decks158Flashcards11Learners