Learn Malware
Study Malware using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
professionalism in practice
professionalism in practice
By: Somto Azubuike
professional responsibilities, system development lifecycle, requirements and requirements engineering16Decks199Flashcards1Learner -
Security + 601
Security + 601
By: Carlos Rosado
Attacks, Threats, Vulnerabilities, Malware Variants, Types of Attacks18Decks265Flashcards1Learner -
Core 2
Core 2
By: Andrew Boos-Hartig
Acronyms, Steps For malware removal2Decks225Flashcards1Learner -
Security +
Security +
By: Blayne Ehrenzeller
Social Engineering and Security Fundamentals, Malware, Password Attacks16Decks195Flashcards1Learner -
Networking 2
Networking 2
By: Clay Casassa
Malware, Folders, and Printers, Misc, Computer Management18Decks111Flashcards10Learners -
QRS A+ Core 2
QRS A+ Core 2
By: Elizabeth Perez
3.0 Software Troubleshooting QRS, 4.0 Operational Proceedures, 1.1 Compare and contrast common operating system types and their purposes.24Decks640Flashcards47Learners -
C394
C394
By: Alex Lau
Windows 7, Windows 8, Windows 1020Decks96Flashcards1Learner -
Y7 revision
Y7 revision
By: Adam Knowlton
Science Biology orginisation, Science Biology reproduction, Science chemistry matter21Decks197Flashcards2Learners -
IS4560 HACKING AND COUNTERMEASURES
IS4560 HACKING AND COUNTERMEASURES
By: Barbara Crable
IS4560 CH 1 "Evolution of Hacking", IS4560 CH 2 TCP/IP Review, IS4560 CH 3 Cryptographic Concepts15Decks160Flashcards24Learners -
Computing
Computing
By: Ethan Turner
Computer Systems and CPU, Von Neumann Architecture, The Fetch-Decode-Execute Cycle19Decks233Flashcards3Learners -
Security+
Security+
By: a a
Ports, Hashing Algorithms, Symmetric Encryption16Decks167Flashcards3Learners -
Ceh
Ceh
By: m m
Ports, nMap commands, HPing switches23Decks131Flashcards2Learners -
BTEC cybersecurity
BTEC cybersecurity
By: baconblock gt
keywords for ports and malware1Decks30Flashcards2Learners -
Security +
Security +
By: Johnny Regalado
Chapter 1, Key Loggers, Spyware & Adware12Decks61Flashcards1Learner -
Sec
Sec
By: Stephen Kane
1.0 Malware types, 1.1 Social engineered attacks, 1.2 Application/Service attacks10Decks111Flashcards1Learner -
Cybersecurity
Cybersecurity
By: Machias Boschman
Basisbegrippen van cybersecurity, Malware en Kwaadaardige code, Misleiding en oplichting6Decks70Flashcards1Learner -
Sistemi e Reti
Sistemi e Reti
By: SARA MATTIATO
Indirizzi IPv4, Indirizzi IPv6, Protocolli e Servizi14Decks106Flashcards2Learners -
CompTIA Sec+
CompTIA Sec+
By: SERGIO FETTER
Malware, Logs2Decks32Flashcards1Learner -
COMPUTER SCIENCE REVAMPED IGCSE
COMPUTER SCIENCE REVAMPED IGCSE
By: Unknown Unknown
Sensors, ASCII and Unicode, Protocols and DNS21Decks135Flashcards4Learners -
CompTIA Security+ SY0-501 - Based on Objectives X
CompTIA Security+ SY0-501 - Based on Objectives X
By: xavier Xavier
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks.45Decks887Flashcards13Learners -
Firewall
Firewall
By: Leslie Book
Firewall Basics, Identify and Malware, CLI Commands4Decks66Flashcards1Learner -
CompTIA Security+ SY0-501 - Objectives
CompTIA Security+ SY0-501 - Objectives
By: Eliza Hazard
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks.45Decks887Flashcards8Learners -
CompTIA Security+ SYO-701
CompTIA Security+ SYO-701
By: Melissa Curylo
Security+ Port Numbers, Security+ Acronyms, J.Dion Sec. 2 Security Fundamentals7Decks260Flashcards1Learner -
Security+ 501
Security+ 501
By: maria spinosa
1.1 Malware, 2.2, 2.18Decks139Flashcards1Learner -
Sec+
Sec+
By: Brendan McNulty
FOS, Security Controls, Threat Actors14Decks61Flashcards1Learner -
security +
security +
By: larry neville
Chapter 1 Measuring and Weighing Risk, Chapter 2 Monitoring and Diagnosing Networks, Chapter 3 Understanding Devices and Infrastructure12Decks238Flashcards2Learners -
CAT theory
CAT theory
By: Yoliswa Xhamfu
Cat theory term 3(Malware), Interpretation of Computer Adverts, Social Engineering5Decks54Flashcards1Learner -
CyberSecurity
CyberSecurity
By: Mauro Vitamia
Vulnerability Assessment, I Malware, Gli Attacchi3Decks54Flashcards1Learner -
Digital Literacy
Digital Literacy
By: Daniel Plunkett
Data Protection/GDPR, Hardware, Software5Decks81Flashcards1Learner -
Security+ Study Pts
Security+ Study Pts
By: Carmen Menéndez
X- Security+ Exam 411, 1- Mastering the Basics, 2- Exploring Control Types/ Methods12Decks124Flashcards3Learners