Learn Social Network
Study Social Network using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
IT
IT
By: Wesley Mabutho
LS, Networks, Social Implications3Decks41Flashcards1Learner -
ITN 260
ITN 260
By: Joe Schmoe
Chapter 1 - introduction To Security, Chapter 15 - Risk Mitigation, Chapter 8 - Wireless Network Security ...15Decks567Flashcards5Learners -
Computing
Computing
By: Ben Coombner
Social Networking, Data representation, Python / turtle ...4Decks28Flashcards1Learner -
Animal Social Behaviour
Animal Social Behaviour
By: Emilia Cole
Neurobiology, neurotransmitters and brain structure, Brains and Epigenetics, Hormones and Social Behaviour ...11Decks170Flashcards3Learners -
DV400 Concepts
DV400 Concepts
By: Ewa Dunin-Borkowska
Week 1: Development in an Era of Crisis, Week 2: States and Markets in Early Development, Week 3 - Colonialism and the Persistence of Colonial Legacies ...20Decks2,609Flashcards2Learners -
CEH
CEH
By: Andrew Parker
Chapter 1 - Essential Knowledge, Chapter 2 - Reconaissance, Chapter 3 - Scanning & Enumeration ...13Decks813Flashcards30Learners -
BUS 550 Final
BUS 550 Final
By: Tracy Trieu
Ch. 7 Network Effects, Ch. 8 Social Media, Ch. 9 The Sharing Economy ...5Decks92Flashcards31Learners -
IS 414 Security
IS 414 Security
By: Sarah Walker
Risk, Fraud, Vulnerability Management & System Hardening ...7Decks107Flashcards1Learner -
ECSA - Certified Security Analyst
ECSA - Certified Security Analyst
By: Abran Tapia
1 - Intro 2 Pen Testing, 2 - Pen Testing Scope and Engagement, 3 - OSINT Methodology ...12Decks153Flashcards3Learners -
English Proficiency
English Proficiency
By: Tri Minh
Vocabulary 1, Prepositions, Business vocabulary ...5Decks87Flashcards2Learners -
CSF Finals
CSF Finals
By: Justin Ooi
Cryptography, Access Control, Steganography ...13Decks161Flashcards1Learner -
Steno
Steno
By: Kelly Willcut
Punctuation, Medical, Food ...60Decks7,152Flashcards14Learners -
HR 512, 514, 516, 521, 522
HR 512, 514, 516, 521, 522
By: John Walter
HR 512, HR 514 Grievance system, HR 516 Usage Social Media and Social Networking ...5Decks63Flashcards10Learners -
A+ 1002
A+ 1002
By: Unknown Unknown
Physical Security, Logical Security, Wireless Security ...29Decks564Flashcards5Learners -
Meu CEH
Meu CEH
By: FabS Pam
Module 1 - Intro to Ethical Hacking, Module 2 - Footprinting and Reconnaissance, Module 3 - Scanning Networks ...22Decks366Flashcards30Learners -
(6) CompTia Security+ SY0-601 Definitions
(6) CompTia Security+ SY0-601 Definitions
By: Maciej Węgrzynowski
1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application Attacks ...47Decks1,691Flashcards32Learners -
Computing - Organised
Computing - Organised
By: Zayd IMRAN
Computer Systems - Translators, Data Representation - Logic Gates, Data Representation - Units ...22Decks361Flashcards1Learner -
Sociology 1020
Sociology 1020
By: Uma Jacoby
Chapter 3 - Culture, Chapter 4 - Socialization, Chapter 5 - Social Interaction ...15Decks436Flashcards7Learners -
New Media Challenges
New Media Challenges
By: Verena Visser
Lecture 1, Lecture 2: An introduction to privacy, Lecture 3: Personalization, Privacy concerns and Information sharing ...20Decks329Flashcards2Learners -
OAM
OAM
By: Sarah Idris
week 1, decision making I, Decision Making II ...21Decks582Flashcards2Learners -
Essential Words
Essential Words
By: Hossein Ahmadian
U1-Environmental, OX-24, OX-23 ...28Decks683Flashcards6Learners -
PenTest+
PenTest+
By: Laurence Toje
Penetration Testing, Planning and Scoping Penetration Tests, Information Gathering ...13Decks340Flashcards1Learner -
CND
CND
By: Alex Bachman
PORT SCANNING PEs, Packet Analysis 1 PEs, Packet Analysis 2 PEs ...11Decks288Flashcards5Learners -
IT
IT
By: Daniel Klette
Basic Concepts of Computing, Hardware vs Software, Shareware, Freeware, Free Open Source Software, Proprietary Software ...11Decks166Flashcards2Learners -
my CEH - Certified Ethical Hacker
my CEH - Certified Ethical Hacker
By: Roger Pharr
Chapter 1 Introduction to Ethical Hacking, Chapter 0 Random Terms, Chapter 2 System Fundamentals ...19Decks406Flashcards23Learners -
Sociology
Sociology
By: Quintin Hicks
Chapter 1: The Sociological Imanation: An Introduction, Chapter 2: Methods, Chapter 3: Culture, & Media ...7Decks255Flashcards13Learners -
CEH Exam Guide 3rd Ed, for CEH Exam v9
CEH Exam Guide 3rd Ed, for CEH Exam v9
By: Stephen Holden
Chapter 1 - Essential Knowledge (Introduction to Ethical Hacking), Chapter 2 - Reconnaissance (Footprinting and Reconnaissance), Chapter 3 - Scanning and Enumeration (Scanning Networks) ...17Decks545Flashcards42Learners -
Study Guide SY0-601
Study Guide SY0-601
By: Dakota Edmunds
1.1 Compare and contrast different types of social engineering techniques., 1.5 Explain Different Threat Actors, Vectors And Intelligence Sources, 1.2 Given a scenario, analyze potential indicators to determine the type of attack ...20Decks620Flashcards168Learners -
Pentest+ PT0-002
Pentest+ PT0-002
By: Steven Brumley
Planning and Engagement, Information Gathering and Vulnerability Scanning, Network-Based Attacks ...9Decks290Flashcards13Learners -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
1.1 Social Engineering, 1.2 Attack Types, 1.3 Application Attacks ...35Decks722Flashcards25Learners