Learn Secure Software Design
Study Secure Software Design using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CISSP - Udemy
CISSP - Udemy
By: Stephen Holden
Cryptography Concepts, Cryptography History, Cryptography Cryptosystem Features ...21Decks589Flashcards50Learners -
Higher Computing
Higher Computing
By: Harrison Rice
Systems, Software Development, Web Design ...8Decks174Flashcards10Learners -
Computer Science GCSE
Computer Science GCSE
By: Stephen Althorp
Computer Systems, CPU, Von Neumann Architecture ...38Decks797Flashcards958Learners -
CIE iGCSE Computer Science
CIE iGCSE Computer Science
By: Mia Hickman
Software, The internet and its uses, Automated and Emerging technologies ...15Decks332Flashcards23Learners -
CASP+
CASP+
By: keegz Whodis?
(Udemy CASP+ (CAS-004): Practice Exam #1 - Results), Udemy CASP Practice Exam 2, Udemy CASP Practice Exam 3 ...36Decks1,559Flashcards21Learners -
CSC3003S
CSC3003S
By: Maryam Sonnie
Project management, PM2, Software engineering triangle ...17Decks328Flashcards2Learners -
Cisco Devnet
Cisco Devnet
By: Wayne Knight
Software Dev and Design, Using APIs, Application deployment and Security ...5Decks165Flashcards21Learners -
AS Digital Technology
AS Digital Technology
By: kate kelly
2.3.1 Architecture, Fetch Execute Cycle, 2.4.2 Website Development ...22Decks365Flashcards29Learners -
Security+
Security+
By: Taimoor Fayyaz
Ports, Basics, Malware ...22Decks583Flashcards1Learner -
CISSP Power Notes
CISSP Power Notes
By: Dola Sang
Chapter 6- Cryptography and Symmetric Key Algorithms, Chapter 7: PKI and Cryptographic Applications, Chapter 8- Security Models, Design and Capabilities ...14Decks1,367Flashcards4Learners -
CISSP Sybex Study Guide
CISSP Sybex Study Guide
By: Rebecca Ma
Chapter 1 - Security Governance Through Principles And Policies, Chapter 2 - Personnel Security And Risk Management Concepts, Chapter 3 - Business Continuty Planning ...22Decks455Flashcards237Learners -
Cyber Security
Cyber Security
By: Josh Davidson
Week 1 - Intro, Lecture 2 - Network Security, 2 - IDS ...15Decks288Flashcards2Learners -
CISSP
CISSP
By: Patrick Lim
Access Control, Physical Security, Info Security Governance and Risk Management ...8Decks272Flashcards14Learners -
a - cs
a - cs
By: b m
chapter 1 - information representation, chapter 2 - networks, chapter 2 - internet ...20Decks642Flashcards2Learners -
CompTIA Security+ SY0-501 - Based on Objectives X
CompTIA Security+ SY0-501 - Based on Objectives X
By: xavier Xavier
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards13Learners -
CompTIA Security+ SY0-501 - Objectives
CompTIA Security+ SY0-501 - Objectives
By: Eliza Hazard
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards9Learners -
C178 - Security+ SYO-601
C178 - Security+ SYO-601
By: Jonathan Maner
Section 1: Security Overview, Section 2: Malware, Section 3: Malware Infections ...30Decks635Flashcards4Learners -
CISSP
CISSP
By: Daniel Handley
Access Control, Telecommunications & Network Security, Information Security Governance & Risk Management ...10Decks736Flashcards6Learners -
Cisco DevNet Associates
Cisco DevNet Associates
By: Kerry Gambrel
Software Development - Software Design, Version Control, Coding Basics ...10Decks250Flashcards10Learners -
DevNet Associate Exam
DevNet Associate Exam
By: Mark Breedlove
1.0 Software Development and Design, 2.0 Understanding and Using APIs, 3.0 Cisco Platforms and Development ...5Decks396Flashcards30Learners -
National 5 Computing Science
National 5 Computing Science
By: Ruth McDermaid
Computer Systems (Data Representation), Software Design and Development - Analysis and Design, Web design and development ...10Decks76Flashcards24Learners -
Security +
Security +
By: Ben Moore
overview of Security, Threat Intelligence and Sources, Attack Frameworks ...32Decks669Flashcards1Learner -
CYSA+
CYSA+
By: Chad Wilson
Chapter 1 Defending Against Cybersecurity Threats, Chapter 2 Reconnaissance and Intelligence Gathering, Chapter 3 Designing a Vulnerability Management Program ...14Decks513Flashcards80Learners -
CISSP
CISSP
By: Mark Sigsbee
Access Control - Domain 1, Telecommunications - Domain 2, Software Development Security - Domain 4 ...7Decks725Flashcards11Learners -
CISSP OSG
CISSP OSG
By: Sad Summertron
Chapter 3: Business Continuity Planning, Chapter 4: Laws, Regulations, and Compliance, Chapter 5: Protecting Security of Assets ...19Decks477Flashcards43Learners -
CompSci
CompSci
By: Gleb Butyagin
Data Transmission and Data representation, Security Aspects and Internet Technologies, Computer Architecture and Languages ...15Decks361Flashcards7Learners -
Computer science AS level
Computer science AS level
By: Nandor Vilmos
Chapter 1 Information representation, Chapter 2 Communication and Internet Technologies, Chapter 3 Hardware ...15Decks343Flashcards183Learners -
Software Testing (Paulk)
Software Testing (Paulk)
By: scott johnson
Software Testing Preliminaries, Debugging, Test Generation Strategies ...17Decks421Flashcards16Learners -
Security+
Security+
By: Sean Shirley
Basics and fundamentals, General Security threats, Generally Mitigating Threats ...41Decks807Flashcards1Learner -
National 5 Computing
National 5 Computing
By: Maia Bateman
Topic 1a : Structures and Links (Databases), Topic 1b: Structures and links (Websites), Topic 2: User Interface ...20Decks312Flashcards361Learners