Learn Social Engineering
Study Social Engineering using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
GCSE Geography AQA A The Coastal Zone
GCSE Geography AQA A The Coastal Zone
By: Christopher Cooper
Weathering - different types, Mass Movement, Destructive & Constructive Waves...18Decks85Flashcards17Learners -
CompTIA Security+ SY0-601
CompTIA Security+ SY0-601
By: Nindum Chiamba
1.1 Compare and contrast different types of social engineering techniques, 1.2 Given a scenario, analyze potential indicators to determine the type of attack2Decks24Flashcards2Learners -
Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401)
Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401)
By: Aaron Patty
Module 3 - Basics of Security - Q&A, Module 4 - Understanding Security Governance - Q&A, Module 5 - Risk Management - Q&A...40Decks415Flashcards46Learners -
Security+
Security+
By: Pain Unknown
1.1 Social Engineering Techniques, 1.2 Malware, 1.2 Password Attacks3Decks55Flashcards1Learner -
Computer Science Paper two stuff
Computer Science Paper two stuff
By: gusy edwards
The Computer System's Architecture, Embedded Systems, Memory...11Decks89Flashcards1Learner -
CompTIA Security + (SY0-701)
CompTIA Security + (SY0-701)
By: Amreek Paul
Section 2.5 Threats and Vulnerabilities, Section 2.6 Confidentiality, Section 2.7 Integrity...238Decks1,693Flashcards18Learners -
Security Blue - Phishing Analysis
Security Blue - Phishing Analysis
By: ola sijuwola
Introduction to Phishing and Emails, Anatomy of an Email, What is Phishing?...62Decks236Flashcards5Learners -
A+ Technical Training
A+ Technical Training
By: Mark Straley
Chapter 1: Operational Procedures, Chapter 2: Planning and Professionalism, Chapter 3: Operating System Fundamentals...22Decks120Flashcards3Learners -
security plus
security plus
By: tessen p
chapter 1 intro to security, chapter 2 malware and social engineering attacks, PORTS3Decks39Flashcards1Learner -
Cyber Security
Cyber Security
By: Aiden Beck
Risk Management, Internet Of Things, Pen Testing...19Decks86Flashcards2Learners -
Comptia A+ Core 2
Comptia A+ Core 2
By: Andrew Dieppa
1.1 An Overview of Windows, 1.1 - Windows Features, 1.1 - Windows Upgrades...69Decks528Flashcards1Learner -
chapter 1
chapter 1
By: RedWarH Gaming
Basics, Types of Malware, Types of Social Engineering...4Decks37Flashcards1Learner -
Computing
Computing
By: Jesus Christ
Network Security and the Ethernet, CPU and Computer System, Malware and Social Engineering...5Decks52Flashcards1Learner -
Other
Other
By: Scott Barnes
Social Engineering1Decks25Flashcards1Learner -
UCWD
UCWD
By: Sebastian Kampe
01 Web 2.0 + Social software, 02 Strategic Planning, 03 Interfaces and Technology...8Decks73Flashcards1Learner -
Excel
Excel
By: Xavier Link
Excel Unit A, Excel Unit B, Excel Unit C...6Decks61Flashcards1Learner -
Security+
Security+
By: Blistery Grub
Security Controls 1.1, The CIA Triad 1.2, Non-Repudiation 1.2...67Decks356Flashcards1Learner -
SY0-602 Acronyms
SY0-602 Acronyms
By: Kendra Lohmeyer
1.1 Social Engineering Techniques, 1.2, 1.3...6Decks26Flashcards1Learner -
EQ4 coasts
EQ4 coasts
By: Vini goyal
2B.10a economic and social losses from coastal recession, 2B.10b impacts of coastal flooding and storm surge events, 2B.11a hard engineering approaches...9Decks35Flashcards2Learners -
COMPTIA SEC+
COMPTIA SEC+
By: arlena lainy
Lesson 1 - Security Roles and Controls, Lesson 2 - Threat Actors & Threat Intelligence, Lesson 3 - Security Assessments...5Decks58Flashcards1Learner -
Cybersecurity
Cybersecurity
By: Valencia Lowhur
2.2 Social Engineering, 1.2 Security Controls, Exam #13Decks32Flashcards1Learner -
Security+
Security+
By: Jonathan Smith
1.1 Compare and contrast different types of social engineering techniques1Decks22Flashcards1Learner -
Web Science
Web Science
By: Yannick Epstein
Advanced Web Engineering, Cloud Computing, Signed Networks and Social Balance3Decks30Flashcards1Learner -
core 2 diffic
core 2 diffic
By: Adepele Aina
Set 1 (Windows Admin, Updates, Services, Tools, Printing), Set 2 (Security, Policies, Social Engineering, Data Handling, Access Control) – CSV2Decks60Flashcards1Learner -
Risk Reliability and Safety
Risk Reliability and Safety
By: Jeremy Robertson
Lecture 2 - What is risk?, Lecture 2 - What is the risk management process?, Lecture 2 - Likelihood and Consequences...38Decks287Flashcards1Learner -
Economic and Social Change in Southern Africa
Economic and Social Change in Southern Africa
By: Ferg Giv
General, L9:An African Success Story? Trade and conflicting narratives in Mozambique, Harrison (2010) Neoliberal Africa: The impact of global social engineering3Decks26Flashcards1Learner -
Percepio Security +
Percepio Security +
By: Beth Hosek
Social Engineering Techniques & Other Attack Types, Implementing Identity and Account Management & AAA Solutions, Physical Security Controls...12Decks38Flashcards1Learner -
CompTIA Security+
CompTIA Security+
By: Beth Hosek
1A: Compare and Contrast Information Security Roles, 1B: Compare and Contrast Security Control and Framework Types, 2A: Explain Threat Actor Types and Attack Vectors...61Decks103Flashcards3Learners -
CompTIA Sec+ SYP-601
CompTIA Sec+ SYP-601
By: Jordan Prescott
Section 1 – Attacks, Threats, and Vulnerabilities 1.1 – Social Engineering, Section 1 – Attacks, Threats, and Vulnerabilities / 1.2 – Attack Types2Decks22Flashcards1Learner -
CompTIA Security+ SY0-701 Module 1:
CompTIA Security+ SY0-701 Module 1:
By: Mehdi Ouhtit
Slide 1: General Security Concepts, Slide 2: Defense in Depth, Slide 3: Essential Terminology...39Decks59Flashcards3Learners