Learn Social Engineering
Study Social Engineering using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CompTIA Security+
CompTIA Security+
By: Sara Sofia
Social Engineering, Attack Types, Recognizing Application Attacks ...7Decks163Flashcards1Learner -
CAT theory
CAT theory
By: Yoliswa Xhamfu
Cat theory term 3(Malware), Interpretation of Computer Adverts, Social Engineering ...5Decks54Flashcards2Learners -
CISM Exam Prep
CISM Exam Prep
By: Bryan Scott
Information Security Governance, Business Continuity & Security, Incident Response ...20Decks186Flashcards1Learner -
Security+
Security+
By: Nick Bishop
Ports, Managing Risk, Monitoring and Diagnosing Networks ...12Decks452Flashcards1Learner -
Online Marketing Course - Duke
Online Marketing Course - Duke
By: andre cummings
SEO Foundations: Introduction To SEO, SEO Foundations: A model of Search Engines, Social Media Foundations: Understanding Social Media Strategy ...14Decks88Flashcards4Learners -
Geography
Geography
By: Sophia Stewart
Global Urban Change, Lagos, Olusosun Landfill + Informal Economy ...26Decks267Flashcards2Learners -
SEC+
SEC+
By: Nerdie Productions
Fundamental of Security, Threat Actor, Physical Security ...9Decks259Flashcards1Learner -
CompTIA A+ 1002 Concepts
CompTIA A+ 1002 Concepts
By: Mr. Victor B.
Basic Linux Commands, Microsoft Command Line Tool, The Windows Control Panel ...27Decks344Flashcards3Learners -
YEAR 8 ICT TERM1
YEAR 8 ICT TERM1
By: kaydence !!
CYBERSECURITY: L1 YOU & YOUR DATA, CYBERSECURITY: L2 SOCIAL ENGINEERING, CYBERSECURITY: SCRIPT KIDDIES ...8Decks45Flashcards1Learner -
ECSA - Certified Security Analyst
ECSA - Certified Security Analyst
By: Abran Tapia
1 - Intro 2 Pen Testing, 2 - Pen Testing Scope and Engagement, 3 - OSINT Methodology ...12Decks153Flashcards3Learners -
My Lexicon
My Lexicon
By: Nguyen Ba Phong
Abstract Qualities and Concepts, Actions and Activities, Arts, Humanities and Recreation ...41Decks268Flashcards1Learner -
Cyber Security
Cyber Security
By: Robert Livingston
Fundamentals of Security, Threat Actors, Physical Security ...6Decks217Flashcards1Learner -
CEH
CEH
By: Alex Santiago
MOD 16 - Hacking Wireless, MOD 17 - Hacking Mobile Platforms, MOD 18 - Iot and OT Hacking ...13Decks164Flashcards1Learner -
A Computer Science : Unit 1
A Computer Science : Unit 1
By: ww ww
1.1.1 Architecture Introduction, 1.1.2 Von Neumann Architecture, 1.1.3 Factors affecting CPU performance ...26Decks253Flashcards2Learners -
INSY440
INSY440
By: Matt Gu
Strategy & Business Models, E-commerce Infrastructure: The Internet, Web, and Mobile Platform (I), E-commerce Infrastructure: The Internet, Web, and Mobile Platform (II) ...19Decks427Flashcards4Learners -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types ...41Decks1,670Flashcards22Learners -
General Paper
General Paper
By: ohhelloo me
Advertising, Censorship, Unity ...21Decks111Flashcards7Learners -
Computing - Organised
Computing - Organised
By: Zayd IMRAN
Computer Systems - Translators, Data Representation - Logic Gates, Data Representation - Units ...22Decks361Flashcards1Learner -
Security +
Security +
By: Kennedy Taylor
CompTIA Security+: Social Engineering Techniques & Other Attack Types, CompTIA Security+: Implementing Cybersecurity Resilience2Decks115Flashcards1Learner -
QRS A+ Core 2
QRS A+ Core 2
By: Elizabeth Perez
3.0 Software Troubleshooting QRS, 4.0 Operational Proceedures, 1.1 Compare and contrast common operating system types and their purposes. ...24Decks640Flashcards47Learners -
CompTIA A+ Core 2 (220-1102)
CompTIA A+ Core 2 (220-1102)
By: John Vargas
Operating System 3 revision, Security, Software and Trouble Shooting ...50Decks1,075Flashcards40Learners -
CompTIA A+ CORE 2
CompTIA A+ CORE 2
By: Jared Oliver
Mobile Operating Systems, Windows OS, Installation Requirements ...30Decks306Flashcards4Learners -
Computer Science
Computer Science
By: Libby Simpson
Necessary vocan for describing programming, CPU and Memory, Hardware and Software ...7Decks157Flashcards1Learner -
ENGGEN 204
ENGGEN 204
By: Mardee Bayron
Introduction To ENGGEN 204, Teamwork: Team Lifecycle & Dysfunction, Teamwork: Negotiation And Compromise ...24Decks221Flashcards2Learners -
Security +
Security +
By: Matheus Fernandes
Threat and attack terminology, Cryptographic, Ports and Protocols ...10Decks202Flashcards1Learner -
Theories of Marketing
Theories of Marketing
By: Puk slewe
1.1 Knowledge clip Customer experience management, 1.2 kc: network paradigm, 1.3 lecture 1 ...40Decks516Flashcards2Learners -
Security+
Security+
By: a a
Ports, Hashing Algorithms, Symmetric Encryption ...16Decks167Flashcards3Learners -
Security +
Security +
By: Blayne Ehrenzeller
Social Engineering and Security Fundamentals, Malware, Password Attacks ...16Decks195Flashcards1Learner -
CompTIA PenTest+
CompTIA PenTest+
By: Grayden Odum
PenTest Methodologies, Rules of Engagement, White Box Support Resources ...30Decks195Flashcards9Learners -
Pentest+
Pentest+
By: Zoubida Regzal
1 Planning & scoping, 2.1 Information gathering & Vulnerability scanning: passive reconnaissance, 2.2.1 Information gathering & Vulnerability scanning: active reconnaissance/ scanning & recon ...28Decks781Flashcards4Learners