Learn Mobile Security
Study Mobile Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Operating Systems Security
Operating Systems Security
By: sreenith r
Lecture 01 - Introduction to OSS, Lecture 02 - Basic Concepts of OSS, Lecture 03 - Access Controls...11Decks155Flashcards71Learners -
Security+
Security+
By: Graham Roderick
Module 4 - Endpoint and Application Development Security, Module 3 - Threats & Attacks on Endpoints, Module 2 - Threat Management & Cybersecurity Resources...6Decks247Flashcards12Learners -
Network Defense Essentials
Network Defense Essentials
By: Barbara Workman
Administrative Controls, Physical Controls, Technical Controls...10Decks130Flashcards17Learners -
A+ Exam Prep 801-802
A+ Exam Prep 801-802
By: Denzil Bennett
Ch1 Intro Troubleshooting, Ch2 Motherboards, Ch3 CPU...19Decks843Flashcards5Learners -
AWS Final Exam
AWS Final Exam
By: Jacqueline Huynh
Module 1 - Introduction to Amazon Web Services, Module 2 - Compute in the Cloud, Module 3 - Global Infrastructure and Reliability...50Decks541Flashcards74Learners -
Security+ exam
Security+ exam
By: Nick Barber
Secure Protocols, Symmetric vs Asymmetric, Encryption and stenography...74Decks586Flashcards1Learner -
ethical hacking
ethical hacking
By: Barbara Workman
Information Security Fundamentals, Ethical Hacking Fundamentals, Information Security Threats and Vulnerability Assessment...13Decks222Flashcards117Learners -
KTN
KTN
By: Kevin M
Chapter 1, 1.2, 1.3...21Decks743Flashcards2Learners -
Sec 601
Sec 601
By: Mer Gimeno
Mobile Device, Hardening, Supply Chain Management...8Decks218Flashcards2Learners -
DAT153
DAT153
By: Jobjørn Røkenes Myren
Terminology, Views, layouts og fragments, Android Jetpack...15Decks381Flashcards1Learner -
Security+
Security+
By: Ethan Bigelow
Chapter 1: Intro to Information Security, Chapter 2: Pervasive Attack Surfaces & Controls, Chapter 3: Fundamentals of Cryptography...13Decks296Flashcards1Learner -
Comptia A+ Core 1
Comptia A+ Core 1
By: Jordan Cartwright
Chapter 1 - Safety and Professionalism, Chapter 2 - Visible Computer, Chapter 3 - CPUS...26Decks666Flashcards11Learners -
Wireless
Wireless
By: Vanessa Larivei
Basic concepts and security at the physical layer, GNSS, WiFi...6Decks222Flashcards1Learner -
A+
A+
By: Jon-Paul Brune
Chapter 1 - Motherboards, Processors & Memory, Chapter 2 - Storage Devices & Power Supplies, Chapter 3 - Peripherals and Expansion...20Decks580Flashcards42Learners -
Malware Analysis and Exploits 2
Malware Analysis and Exploits 2
By: Al Ordu
Week 1, Week 2 - Mobile Forensics, Week 3 - Mobile Forensics...11Decks208Flashcards3Learners -
Cyber
Cyber
By: Bob OBrien
Section 1: Understanding Security Fundamentals, Section 2: Implementing Public Key Infrastructure, Section 3: Investigating Identity and Access Management...12Decks489Flashcards4Learners -
CompTIA A+ 220-1101
CompTIA A+ 220-1101
By: Haylee Harvey
Hardware, Hardware and Network Troubleshooting, Mobile Devices...10Decks231Flashcards3Learners -
Google Certification
Google Certification
By: Dusty Fraser
Databases, Data Warehouse, Google Cloud Services...17Decks265Flashcards4Learners -
ITE final exam
ITE final exam
By: Zhenia Ryönä
first 30, 31-58, RAID levels...14Decks337Flashcards5Learners -
Fundamentals in Nursing - Lecture
Fundamentals in Nursing - Lecture
By: christine tin
Concept of Nursing, Nursing as an Art and Science, Nursing as a Profession...10Decks694Flashcards2Learners -
acg prac
acg prac
By: Ser Jaime
aws funadmentals, IAM, s3...29Decks826Flashcards1Learner -
Yr 9 ICT Revision
Yr 9 ICT Revision
By: Langley Grammar Geography Teachers
L1 - Types of Networks incl WLAN and LAN, L1/2 - Advantages and Disadvantages of network computers, L3 - Types of network devices...7Decks94Flashcards18Learners -
StRUT Test Answers
StRUT Test Answers
By: Dylan B 2019
Domain 1 Lesson 1 Post Assessment Questions, Domain 2 Session 1 Networking, Domain 3 Session 1 Mobile Devices...11Decks566Flashcards98Learners -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks....40Decks663Flashcards1Learner -
A+ Computer Course
A+ Computer Course
By: Rida Shaikh
Chapter 4 Display Devices, Chapter 5 Custom Configurations, Chapter 6 Network Fundaments...15Decks324Flashcards11Learners -
Cdc 2
Cdc 2
By: Jennifer Salazar
Application Of Force, Non-lethal Tactics And Tools, Incident Response, Tactics, And Procedures...5Decks357Flashcards9Learners -
KTN
KTN
By: Yuvika mira Rampal
chapter 1- Computer Networks and the Internet, chapter 2 - application layer, chapter 3 - transport layer...10Decks298Flashcards1Learner -
Comp TIA Chapter Reviews
Comp TIA Chapter Reviews
By: Sue-Ann Welch
Chapter 2 Review: Operational Procedures, Chapter 3 Review: The Visible Computer, Chapter 4 Review: Microprocessors...28Decks758Flashcards22Learners -
comptia a+
comptia a+
By: brian grimm
Chapter 1: Motherboards, Processors, Memory, Chapter 2: Storage, Devices & Power Supplies, Chapter 3: Peripherals & Expansion...20Decks428Flashcards27Learners -
Kommunikasjon - Tjenester og nett
Kommunikasjon - Tjenester og nett
By: Agnes Ulltveit-Moe
Chapter 1: Introduction, Chapter 2: Application layer, Chapter 3: Transport layer...9Decks731Flashcards2Learners