Learn Malware
Study Malware using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
A+ Core 2
A+ Core 2
By: Jamin Camp
Management Console, Operating Systems, Browser Security ...8Decks116Flashcards1Learner -
Informática
Informática
By: Guilherme Oliveira
Introdução, Hardware, Linux ...15Decks173Flashcards2Learners -
CEH
CEH
By: Alex Santiago
MOD 16 - Hacking Wireless, MOD 17 - Hacking Mobile Platforms, MOD 18 - Iot and OT Hacking ...13Decks164Flashcards1Learner -
Threats, Vulnerability, Mitigations
Threats, Vulnerability, Mitigations
By: Chauncey Taylor
Threat actors, Common threat Vectors, Memory injection ...14Decks76Flashcards2Learners -
Core 2
Core 2
By: Andrew Boos-Hartig
Acronyms, Steps For malware removal2Decks225Flashcards1Learner -
A Computer Science : Unit 1
A Computer Science : Unit 1
By: ww ww
1.1.1 Architecture Introduction, 1.1.2 Von Neumann Architecture, 1.1.3 Factors affecting CPU performance ...26Decks253Flashcards2Learners -
CompTIA Sec+
CompTIA Sec+
By: SERGIO FETTER
Malware, Logs2Decks32Flashcards2Learners -
COSC362
COSC362
By: Hayley Krippner
Lecture 1: Course introduction, Lecture 2: Course overview (key definitions), [TODO] Lecture 3: Number Theory and Finite Fields -- Discrete Mathematics (basic number theory, modular arithmetic, groups and fields, boolean algebra) ...21Decks1,305Flashcards3Learners -
Security
Security
By: Ted Mosby
Cryptography, Crypto Protocols, Software Security ...10Decks141Flashcards1Learner -
Computing - Organised
Computing - Organised
By: Zayd IMRAN
Computer Systems - Translators, Data Representation - Logic Gates, Data Representation - Units ...22Decks361Flashcards1Learner -
Computer Science IB
Computer Science IB
By: Unknown Unknown
Sensors, ASCII and Unicode, Protocols and DNS ...42Decks450Flashcards5Learners -
Sec+
Sec+
By: Mikołaj Szala
Chapter 6 - Malware, Chapter 7 - Data Protection, Chapter 8 - Encryption ...4Decks92Flashcards1Learner -
Computer Science
Computer Science
By: Libby Simpson
Necessary vocan for describing programming, CPU and Memory, Hardware and Software ...7Decks157Flashcards1Learner -
Computer Security
Computer Security
By: Sherissa Pinnock
Lecture 2, Cryptography, Authentication ...5Decks56Flashcards1Learner -
Networking 2
Networking 2
By: Clay Casassa
Malware, Folders, and Printers, Misc, Computer Management ...18Decks111Flashcards10Learners -
C394
C394
By: Alex Lau
Windows 7, Windows 8, Windows 10 ...20Decks96Flashcards1Learner -
BTEC cybersecurity
BTEC cybersecurity
By: baconblock gt
keywords for ports and malware1Decks30Flashcards2Learners -
IS4560 HACKING AND COUNTERMEASURES
IS4560 HACKING AND COUNTERMEASURES
By: Barbara Crable
IS4560 CH 1 "Evolution of Hacking", IS4560 CH 2 TCP/IP Review, IS4560 CH 3 Cryptographic Concepts ...15Decks160Flashcards24Learners -
QRS A+ Core 2
QRS A+ Core 2
By: Elizabeth Perez
3.0 Software Troubleshooting QRS, 4.0 Operational Proceedures, 1.1 Compare and contrast common operating system types and their purposes. ...24Decks640Flashcards47Learners -
Security+
Security+
By: a a
Ports, Hashing Algorithms, Symmetric Encryption ...16Decks167Flashcards3Learners -
IT
IT
By: Tarik - Greatest of All Time
Powerpoint 1, Hardware Malfunctions, Misuse ...11Decks56Flashcards1Learner -
CompTIA A+ 1102
CompTIA A+ 1102
By: RICARDO VILLETA
CompTIA A+ 1102 Windows (Set 1), CompTIA A+ 1102 Windows Networking, CompTIA A+ 1102 Windows (Set 2) ...18Decks373Flashcards2Learners -
Computing
Computing
By: Ethan Turner
Computer Systems and CPU, Von Neumann Architecture, The Fetch-Decode-Execute Cycle ...19Decks233Flashcards3Learners -
Security +
Security +
By: Blayne Ehrenzeller
Social Engineering and Security Fundamentals, Malware, Password Attacks ...16Decks195Flashcards1Learner -
Security + 601
Security + 601
By: Carlos Rosado
Attacks, Threats, Vulnerabilities, Malware Variants, Types of Attacks ...18Decks265Flashcards1Learner -
BTEC IT Compnent 3
BTEC IT Compnent 3
By: George Derrick
Setting Up Ad Hoc Networks, Network Security And Performance, Issues Afftecting Network Availability ...7Decks32Flashcards4Learners -
Cybersecurity
Cybersecurity
By: Machias Boschman
Basisbegrippen van cybersecurity, Malware en Kwaadaardige code, Misleiding en oplichting ...6Decks70Flashcards1Learner -
C2
C2
By: Randy Michael
Windows System Editing Tools, Windows 10 version Recommendations, Malware definitions ...12Decks69Flashcards1Learner -
Sistemi e Reti
Sistemi e Reti
By: SARA MATTIATO
Indirizzi IPv4, Indirizzi IPv6, Protocolli e Servizi ...14Decks106Flashcards2Learners -
Firewall
Firewall
By: Leslie Book
Firewall Basics, Identify and Malware, CLI Commands ...4Decks66Flashcards1Learner