Learn Malware
Study Malware using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Core 2
Core 2
By: Sherika Jones
MANAGING WINDOWS NETWORKING, Managing linux and macOS, Windows Control Panel ...14Decks343Flashcards1Learner -
Data Security
Data Security
By: Tatiana Marin
CH-7 Industrial Espionage, CH-6 Techniques Used by Hackers, CH-5 Malware ...5Decks143Flashcards2Learners -
Security +
Security +
By: Jon-Paul Brune
Chapter 2 - Monitoring & Diagnosing Networks, Chapter 1 - Measuring & Weighing Risk, Chapter 3 - Understanding Devices & Infrastructure ...12Decks397Flashcards13Learners -
Digital Literacy
Digital Literacy
By: Daniel Plunkett
Data Protection/GDPR, Hardware, Software ...5Decks82Flashcards3Learners -
BICEP CP
BICEP CP
By: Patrick R
Hardware, Operating Systems, File Allocation ...9Decks162Flashcards4Learners -
Real World Cyber SIT182
Real World Cyber SIT182
By: Jason Galletti
Building Blocks W1, Malware, Access Control ...7Decks137Flashcards2Learners -
CompTIA Security+
CompTIA Security+
By: Salewa Aderonmu
Lesson 7 - Questions, Lesson 8 - Questions, Lesson 9 - Questions ...28Decks1,104Flashcards38Learners -
Security 601
Security 601
By: Marlon M
1.1 Social Engineering Techniques, 1.2 Malware Types, 1.3 Application Attacks ...16Decks385Flashcards1Learner -
CompTIA Security+
CompTIA Security+
By: John Giordano
Basics and Fundamentals, Threat Intelligence and Sources, Threat Hunting ...9Decks133Flashcards1Learner -
Security+ 701
Security+ 701
By: Charlie Aligaen
Sample Exam 1, 1.1 Compare and contrast various types of security controls, 1.2 Summarize fundamental security concepts. ...28Decks777Flashcards3Learners -
Comptia A+
Comptia A+
By: Jose Mercedes
CPU'S, Memory pin sizes, M.2 keying characteristics ...34Decks456Flashcards5Learners -
Security+
Security+
By: Hayley Smith
Social Engineering Techniques, Types of Malware &Their Indicators, Acronyms ...5Decks61Flashcards1Learner -
Comp TIA A+ 220 1002 Chris
Comp TIA A+ 220 1002 Chris
By: chris carnaffin
1.1 - Compare and contrast common operating system types and their purposes., 1.2 - Compare and contrast features of Microsoft Windows versions., 1.3 - Summarise general OS installation considerations and upgrade methods. ...33Decks497Flashcards114Learners -
Computer Security
Computer Security
By: Pall Magnusson
Computer security and malware, Network security, Operating system security ...7Decks73Flashcards1Learner -
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
By: Alex valentine
Malware and Indicators of Compromise, Attacks, Threat Actors ...29Decks412Flashcards6Learners -
Professor Messer CompTIA Security+ SYO-601ty +
Professor Messer CompTIA Security+ SYO-601ty +
By: Matt R
Phishing, Control Types, Principles of Social Engineering ...5Decks48Flashcards4Learners -
ICT theory
ICT theory
By: Anna Westwood
Data, Quality of information, Encryption ...13Decks130Flashcards1Learner -
Sec+
Sec+
By: Brendan McNulty
FOS, Security Controls, Threat Actors ...14Decks231Flashcards1Learner -
Stuff I Don't Know 1012
Stuff I Don't Know 1012
By: Sam Stone
Malware Removal Steps, Windows 10 Minimum Requirements, Windows 11 Minimum Requirements ...21Decks146Flashcards1Learner -
Comptia Security + SY0-501
Comptia Security + SY0-501
By: Nerf D
Networking, Securing systems, policies, plans, and procedures ...11Decks160Flashcards5Learners -
Sec+
Sec+
By: Derrick Gubson
Ports to memorize, Network threats, Authentication ...20Decks533Flashcards1Learner -
INFORMATICA
INFORMATICA
By: Jociele Wieczynski
REDES DE COMPUTADORES, Dispositivos, Hardware e Software ...7Decks42Flashcards1Learner -
IntroSec
IntroSec
By: Elsa N
SB 3: Security Basics, SB 4: A Language for Security, SB 5: Policy Languages and Policy Types ...21Decks188Flashcards1Learner -
Sec+ 601 Practice Questions
Sec+ 601 Practice Questions
By: Kris G
Lesson 1: Comparing Security Roles and Security Controls, Lesson 2: Explaining Threat Actors and Threat Intelligence, Lesson 3: Performing Security Assessments ...21Decks305Flashcards150Learners -
Comptia A+ Core 2
Comptia A+ Core 2
By: Sr Leigh
Operating systems overview( Comptia Objective 1.1), An Overview Of Windows 7( Comptia Objective 1.2), An Overview of Windows 8 and 8.1(Comptia Objective 1.2) ...57Decks647Flashcards14Learners -
ICT
ICT
By: Evie Brown
L03-Data And Data Types, LO1-1.5, 4.6- Validity,reliabilty And Bias ...16Decks262Flashcards4Learners -
Informática
Informática
By: Gabriel Campos
Redes de Computadores, Navegadores Web, Segurança da Informação ...11Decks202Flashcards1Learner -
C701 Certified Ethical Hacking
C701 Certified Ethical Hacking
By: Angela Little
Malware Analysis, CEH Tools2Decks36Flashcards3Learners -
OCR GCSE Computer Science
OCR GCSE Computer Science
By: Raees Saqib
mock, All content - simplified definitions, 1.1 CPU and embedded systems ...7Decks411Flashcards1Learner -
CompTIA Sec+ Practice (501)
CompTIA Sec+ Practice (501)
By: Raaay Shell
1.5 Explain vulnerability scanning concepts, 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks ...14Decks442Flashcards82Learners