Learn Social Engineering
Study Social Engineering using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Sec
Sec
By: Stephen Kane
1.0 Malware types, 1.1 Social engineered attacks, 1.2 Application/Service attacks ...10Decks111Flashcards1Learner -
1.0 Threats, Attacks, and Vulnerabilities
1.0 Threats, Attacks, and Vulnerabilities
By: Justin Doring
1.1 Compare and contrast different types of social engineering techniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...8Decks206Flashcards1Learner -
CompTIA Security+ SY0-601
CompTIA Security+ SY0-601
By: Nindum Chiamba
1.1 Compare and contrast different types of social engineering techniques, 1.2 Given a scenario, analyze potential indicators to determine the type of attack2Decks24Flashcards2Learners -
Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401)
Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401)
By: Aaron Patty
Module 3 - Basics of Security - Q&A, Module 4 - Understanding Security Governance - Q&A, Module 5 - Risk Management - Q&A ...40Decks415Flashcards43Learners -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. ...40Decks663Flashcards1Learner -
CompTIA Security + (SY0-701)
CompTIA Security + (SY0-701)
By: Amreek Paul
Section 2.5 Threats and Vulnerabilities, Section 2.6 Confidentiality, Section 2.7 Integrity ...238Decks1,693Flashcards15Learners -
Digi Marketing
Digi Marketing
By: Unknown Unknown
Multichannel Marketing, Email Marketing & Mobile Marketing, Social Media Marketing & Management (Part A) ...8Decks46Flashcards1Learner -
A+ Technical Training
A+ Technical Training
By: Mark Straley
Chapter 1: Operational Procedures, Chapter 2: Planning and Professionalism, Chapter 3: Operating System Fundamentals ...22Decks120Flashcards3Learners -
HCS
HCS
By: Pa Broon
insider threat, Social Engineering, Security Policy ...6Decks55Flashcards1Learner -
CompTIA Security+ Cert Prep: 1 Threats, Attacks, and Vulnerabilities
CompTIA Security+ Cert Prep: 1 Threats, Attacks, and Vulnerabilities
By: Joe Fu
1. Malware, 6. Vulnerability Types, 7. Vulnerability Scanning ...8Decks112Flashcards1Learner -
Computer Science Paper two stuff
Computer Science Paper two stuff
By: gusy edwards
The Computer System's Architecture, Embedded Systems, Memory ...11Decks89Flashcards1Learner -
Security+
Security+
By: Pain Unknown
1.1 Social Engineering Techniques, 1.2 Malware, 1.2 Password Attacks3Decks55Flashcards1Learner -
Cyber Security
Cyber Security
By: Aiden Beck
Risk Management, Internet Of Things, Pen Testing ...19Decks86Flashcards2Learners -
Security Blue - Phishing Analysis
Security Blue - Phishing Analysis
By: ola sijuwola
Introduction to Phishing and Emails, Anatomy of an Email, What is Phishing? ...62Decks236Flashcards4Learners -
CEH v12
CEH v12
By: Chastity Benton
Module 1 - Introduction to Ethical Hacking, Module 2 - Footprinting and Reconnaissance, Module 3 - Scanning Networks ...21Decks161Flashcards1Learner -
Comptia A+ Core 2
Comptia A+ Core 2
By: Andrew Dieppa
1.1 An Overview of Windows, 1.1 - Windows Features, 1.1 - Windows Upgrades ...69Decks528Flashcards1Learner -
security plus
security plus
By: tessen p
chapter 1 intro to security, chapter 2 malware and social engineering attacks, PORTS3Decks39Flashcards1Learner -
chapter 1
chapter 1
By: RedWarH Gaming
Basics, Types of Malware, Types of Social Engineering ...4Decks37Flashcards1Learner -
FLE
FLE
By: Brillianne Mae Ballasio
CVSTODES SYLVARVM_Forest Ecosystem, CVSTODES SYLVARVM_Forest Governance and Social Forestry, CVSTODES SYLVARVM_Forest Utilization and Engineering ...4Decks104Flashcards1Learner -
Computing
Computing
By: Jesus Christ
Network Security and the Ethernet, CPU and Computer System, Malware and Social Engineering ...5Decks52Flashcards1Learner -
Security+
Security+
By: Blistery Grub
Security Controls 1.1, The CIA Triad 1.2, Non-Repudiation 1.2 ...67Decks356Flashcards1Learner -
UCWD
UCWD
By: Sebastian Kampe
01 Web 2.0 + Social software, 02 Strategic Planning, 03 Interfaces and Technology ...8Decks73Flashcards1Learner -
Other
Other
By: Scott Barnes
Social Engineering1Decks25Flashcards1Learner -
Excel
Excel
By: Xavier Link
Excel Unit A, Excel Unit B, Excel Unit C ...6Decks61Flashcards1Learner -
EQ4 coasts
EQ4 coasts
By: Vini goyal
2B.10a economic and social losses from coastal recession, 2B.10b impacts of coastal flooding and storm surge events, 2B.11a hard engineering approaches ...9Decks35Flashcards2Learners -
Cybersecurity
Cybersecurity
By: Valencia Lowhur
2.2 Social Engineering, 1.2 Security Controls, Exam #13Decks32Flashcards1Learner -
Risk Reliability and Safety
Risk Reliability and Safety
By: Jeremy Robertson
Lecture 2 - What is risk?, Lecture 2 - What is the risk management process?, Lecture 2 - Likelihood and Consequences ...38Decks287Flashcards1Learner -
SY0-602 Acronyms
SY0-602 Acronyms
By: Kendra Lohmeyer
1.1 Social Engineering Techniques, 1.2, 1.3 ...6Decks26Flashcards1Learner -
COMPTIA SEC+
COMPTIA SEC+
By: arlena lainy
Lesson 1 - Security Roles and Controls, Lesson 2 - Threat Actors & Threat Intelligence, Lesson 3 - Security Assessments ...5Decks58Flashcards1Learner -
Economic and Social Change in Southern Africa
Economic and Social Change in Southern Africa
By: Ferg Giv
General, L9:An African Success Story? Trade and conflicting narratives in Mozambique, Harrison (2010) Neoliberal Africa: The impact of global social engineering3Decks26Flashcards1Learner