Learn Social Engineering
Study Social Engineering using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Security 601
Security 601
By: Marlon M
1.1 Social Engineering Techniques, 1.2 Malware Types, 1.3 Application Attacks ...16Decks385Flashcards1Learner -
Study Guide SY0-601
Study Guide SY0-601
By: Dakota Edmunds
1.1 Compare and contrast different types of social engineering techniques., 1.5 Explain Different Threat Actors, Vectors And Intelligence Sources, 1.2 Given a scenario, analyze potential indicators to determine the type of attack ...20Decks620Flashcards168Learners -
ECSA - Certified Security Analyst
ECSA - Certified Security Analyst
By: Abran Tapia
1 - Intro 2 Pen Testing, 2 - Pen Testing Scope and Engagement, 3 - OSINT Methodology ...12Decks153Flashcards3Learners -
Ethical Hacking
Ethical Hacking
By: Halima Ali
1 - Ethical Hacking Concepts, 2 - TCP/IP Concepts, 3 - Network and Computer Attacks ...5Decks56Flashcards10Learners -
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH)
By: Jeff Corbett
Introduction to Ethical Hacking, Ethics, and Legality, Footprinting and Social Engineering, Scanning and Enumeration ...16Decks82Flashcards73Learners -
CompTIA: A+ C2 (110-1102)
CompTIA: A+ C2 (110-1102)
By: Rachael Carling
1.5: Windows Settings, 2.2: Wireless Security, ~ 1.2: Given a scenario, use the appropriate Microsoft command-line tool ...11Decks168Flashcards1Learner -
E-marketing ht-19
E-marketing ht-19
By: Anna M
E-commerce and advertising, Social, global and local marketing & Pricing information, Programmatics - guestlecture ...6Decks108Flashcards7Learners -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
1.1 Social Engineering, 1.2 Attack Types, 1.3 Application Attacks ...35Decks722Flashcards23Learners -
Pentest+ 5.3 Tools
Pentest+ 5.3 Tools
By: Chris Antoine
Scanners, Credential Testing Tools, Debuggers ...12Decks75Flashcards2Learners -
Security+
Security+
By: Hayley Smith
Social Engineering Techniques, Types of Malware &Their Indicators, Acronyms ...5Decks61Flashcards1Learner -
Security+
Security+
By: Jonathan Russial
Chapter 1 - General Concepts, Chapter 2 - Threat Landscape, Chapter 3 - Malicious Code ...20Decks650Flashcards1Learner -
ICT
ICT
By: Evie Brown
L03-Data And Data Types, LO1-1.5, 4.6- Validity,reliabilty And Bias ...16Decks262Flashcards4Learners -
Sec+
Sec+
By: Brendan McNulty
FOS, Security Controls, Threat Actors ...14Decks231Flashcards1Learner -
Critical systems Engineering
Critical systems Engineering
By: Benedict Matovu
Lecture 1 - Overview, Lecture 1 Dependability and Security, Social-Technical Systems ...12Decks194Flashcards1Learner -
Sec+ 601 Practice Questions
Sec+ 601 Practice Questions
By: Kris G
Lesson 1: Comparing Security Roles and Security Controls, Lesson 2: Explaining Threat Actors and Threat Intelligence, Lesson 3: Performing Security Assessments ...21Decks305Flashcards145Learners -
Comptia
Comptia
By: Russell Davis
Social Engineering, Determine type of attack via indicators, Application Attacks ...35Decks1,194Flashcards27Learners -
CyberSAFE: Exam CBS-410
CyberSAFE: Exam CBS-410
By: 3DPD Unknown
Identifying Security Compliance Measures, Recognizing and Addressing Social Engineering Attacks, Securing Devices ...5Decks224Flashcards3Learners -
Security+
Security+
By: Justin Lane
Security Basics, Social Engineering Techniques, Potential Indicators of Attacks3Decks82Flashcards1Learner -
Security+ 601
Security+ 601
By: Will Schmidt
Sec+ Chapter 01: Today's Security Professional, Sec+ Chapter 02: Cybersecurity Threat Landscape, Sec+ Chapter 03: Malicious Code ...18Decks921Flashcards4Learners -
CSCI 4174
CSCI 4174
By: Eric Desjardins
Module 0: Review of Networking Concepts, Module 1: Introduction to Network Security, Module2: Denial of Service and Social Engineering ...4Decks118Flashcards4Learners -
GCSE Geography
GCSE Geography
By: Ethan Retish
Ecosystems, Nutrient cycle, Changes to ecosystem ...53Decks347Flashcards6Learners -
Information Systems Security
Information Systems Security
By: Aimee Robinson
Week 1:Introduction to the Module. What is Security?, Week 2: Security policies. Safety and security usability., Week 3: Psychology and Social Engineering ...9Decks143Flashcards2Learners -
Access
Access
By: Devin Squiers
Access, social engineering, Excel Unit I ...5Decks78Flashcards2Learners -
CompTIA Security+_SY0-601
CompTIA Security+_SY0-601
By: Nick Keenan
1.1 Compare and contrast different types of social engineering techniques., 1.2Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. ...6Decks129Flashcards9Learners -
ag-CEH-V10 - Certified Ethical Hacker
ag-CEH-V10 - Certified Ethical Hacker
By: Anti Gondu
Chapter 1 Introduction to Ethical Hacking, Chapter 0 Random Terms, Chapter 2 System Fundamentals ...25Decks922Flashcards2Learners -
Miscellaneous Stuff Not for Studying
Miscellaneous Stuff Not for Studying
By: Kerry Gambrel
Regulations, standards, and frameworks, Security Controls and stuff, 4A Compare and Contrast Social Engineering Techniques ...9Decks237Flashcards1Learner -
ITN 260
ITN 260
By: Joe Schmoe
Chapter 1 - introduction To Security, Chapter 15 - Risk Mitigation, Chapter 8 - Wireless Network Security ...15Decks567Flashcards5Learners -
COMPTIA Security +
COMPTIA Security +
By: Zac Shook
Chapter 1: Controls, Chapter 2: Public Key Infrastructure, Chapter 3: Identity and Access Management ...21Decks584Flashcards1Learner -
ag-CEH v10
ag-CEH v10
By: Anti Gondu
Module 1 - Intro to Ethical Hacking, Module 2 - Footprinting and Reconnaissance, Module 3 - Scanning Networks ...25Decks772Flashcards6Learners -
Professor Messer CompTIA Security+ SYO-601ty +
Professor Messer CompTIA Security+ SYO-601ty +
By: Matt R
Phishing, Control Types, Principles of Social Engineering ...5Decks48Flashcards3Learners