Learn Secure Software Design
Study Secure Software Design using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CISSP
CISSP
By: Chad Wilson
Domain 1: Legal and Regulatory Issues, Domain 1: Risk Analysis, Domain 1: Everything Else ...30Decks1,036Flashcards50Learners -
CompTIA Security Notes
CompTIA Security Notes
By: Hyun Rim
CH01 Overview of Security, CH02 Malware, CH03 Maware Infections ...32Decks886Flashcards3Learners -
CISSP
CISSP
By: valerie quintanilla
Secure Design Principles, Cloud Security Audit, Practice Test 1 ...29Decks1,201Flashcards2Learners -
CIE iGCSE Computer Science
CIE iGCSE Computer Science
By: Mia Hickman
Software, The internet and its uses, Automated and Emerging technologies ...15Decks332Flashcards30Learners -
Higher Computing
Higher Computing
By: Harrison Rice
Systems, Software Development, Web Design ...8Decks174Flashcards9Learners -
Computer Science GCSE
Computer Science GCSE
By: Stephen Althorp
Computer Systems, CPU, Von Neumann Architecture ...38Decks797Flashcards992Learners -
Cisco Devnet
Cisco Devnet
By: Wayne Knight
Software Dev and Design, Using APIs, Application deployment and Security ...5Decks165Flashcards23Learners -
CSC3003S
CSC3003S
By: Maryam Sonnie
Project management, PM2, Software engineering triangle ...17Decks328Flashcards2Learners -
Computer Science (Year 2)
Computer Science (Year 2)
By: Daniel Hole
Software Development, Computer Languages and Representations, Network and Computer Security ...6Decks1,643Flashcards2Learners -
AS Digital Technology
AS Digital Technology
By: kate kelly
2.3.1 Architecture, Fetch Execute Cycle, 2.4.2 Website Development ...22Decks365Flashcards34Learners -
CISSP Sybex Study Guide
CISSP Sybex Study Guide
By: Rebecca Ma
Chapter 1 - Security Governance Through Principles And Policies, Chapter 2 - Personnel Security And Risk Management Concepts, Chapter 3 - Business Continuty Planning ...22Decks455Flashcards239Learners -
CISSP Power Notes
CISSP Power Notes
By: Dola Sang
Chapter 6- Cryptography and Symmetric Key Algorithms, Chapter 7: PKI and Cryptographic Applications, Chapter 8- Security Models, Design and Capabilities ...14Decks1,367Flashcards4Learners -
CASP+
CASP+
By: keegz Whodis?
(Udemy CASP+ (CAS-004): Practice Exam #1 - Results), Udemy CASP Practice Exam 2, Udemy CASP Practice Exam 3 ...36Decks1,577Flashcards30Learners -
Security+
Security+
By: Taimoor Fayyaz
Ports, Basics, Malware ...22Decks583Flashcards1Learner -
Computer Science
Computer Science
By: Proud Mutata
Chapter 1. Information Representation, Chapter 2. Communication, Chapter 3. Hardware ...16Decks405Flashcards3Learners -
CompTIA Security+ SY0-501 - Based on Objectives X
CompTIA Security+ SY0-501 - Based on Objectives X
By: xavier Xavier
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards15Learners -
CISSP
CISSP
By: Patrick Lim
Access Control, Physical Security, Info Security Governance and Risk Management ...8Decks272Flashcards14Learners -
Cisco DevNet Associates
Cisco DevNet Associates
By: Kerry Gambrel
Software Development - Software Design, Version Control, Coding Basics ...10Decks250Flashcards11Learners -
National 5 Computing Science
National 5 Computing Science
By: Ruth McDermaid
Computer Systems (Data Representation), Software Design and Development - Analysis and Design, Web design and development ...10Decks76Flashcards24Learners -
CISSP
CISSP
By: Daniel Handley
Access Control, Telecommunications & Network Security, Information Security Governance & Risk Management ...10Decks736Flashcards7Learners -
CYSA+
CYSA+
By: Chad Wilson
Chapter 1 Defending Against Cybersecurity Threats, Chapter 2 Reconnaissance and Intelligence Gathering, Chapter 3 Designing a Vulnerability Management Program ...14Decks513Flashcards99Learners -
CompTIA Security+ SY0-501 - Objectives
CompTIA Security+ SY0-501 - Objectives
By: Eliza Hazard
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards10Learners -
Computer science AS level
Computer science AS level
By: Nandor Vilmos
Chapter 1 Information representation, Chapter 2 Communication and Internet Technologies, Chapter 3 Hardware ...15Decks343Flashcards294Learners -
Cyber Security
Cyber Security
By: Josh Davidson
Week 1 - Intro, Lecture 2 - Network Security, 2 - IDS ...15Decks288Flashcards2Learners -
DevNet Associate Exam
DevNet Associate Exam
By: Mark Breedlove
1.0 Software Development and Design, 2.0 Understanding and Using APIs, 3.0 Cisco Platforms and Development ...5Decks396Flashcards32Learners -
C178 - Security+ SYO-601
C178 - Security+ SYO-601
By: Jonathan Maner
Section 1: Security Overview, Section 2: Malware, Section 3: Malware Infections ...30Decks635Flashcards5Learners -
CISSP
CISSP
By: Mark Sigsbee
Access Control - Domain 1, Telecommunications - Domain 2, Software Development Security - Domain 4 ...7Decks725Flashcards11Learners -
CISSP OSG
CISSP OSG
By: Sad Summertron
Chapter 3: Business Continuity Planning, Chapter 4: Laws, Regulations, and Compliance, Chapter 5: Protecting Security of Assets ...19Decks477Flashcards43Learners -
Security +
Security +
By: Ben Moore
overview of Security, Threat Intelligence and Sources, Attack Frameworks ...32Decks669Flashcards1Learner -
OCR GCSE Computer Science J277
OCR GCSE Computer Science J277
By: Kit Burtenshaw
1.1 Systems Architecture, 1.2 Memory and Storage, 1.3 Computer Networks ...11Decks401Flashcards20Learners