Tags: Computer Programming, Cryptography, Technology & Engineering
Study Cryptography
Interested in solving codes? Or are you already studying Cryptography? Learn how to convert ordinary plain text into coded or unintelligible text & vice-versa.
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CISSP
CISSP
By: Cort Hacker
Access Control, Vocabulary1, Vocabulary211Decks1,665Flashcards23Learners -
KCL Discrete Mathematics
KCL Discrete Mathematics
By: tyrion lannister
Arithmetic, Recurrence relation, Arithmetical Algorithms9Decks241Flashcards1Learner -
WGU
WGU
By: lshan x
A+ Cert Core 2, Network+, Security+ K110Decks324Flashcards2Learners -
cybersecurity
cybersecurity
By: russell Rader
google hacks, Reconnaissance, Sniffing and Evasion22Decks560Flashcards21Learners -
Security+ SY601
Security+ SY601
By: f z
1 - 1: Malware, 1 - 2: Understanding Attackers, 1 - 3: Threat Intelligence29Decks757Flashcards37Learners -
Comptia A+ 1102
Comptia A+ 1102
By: Jerry Garcia
Linux, Filesystems, Windows12Decks453Flashcards12Learners -
SY0-601
SY0-601
By: Alican Demirtas
Acronyms, 2.4 Authentication and Session Management Issues, 2.4 Secure Coding Practices5Decks209Flashcards28Learners -
COSC362
COSC362
By: Hayley Krippner
Lecture 1: Course introduction, Lecture 2: Course overview (key definitions), [TODO] Lecture 3: Number Theory and Finite Fields -- Discrete Mathematics (basic number theory, modular arithmetic, groups and fields, boolean algebra)21Decks1,305Flashcards3Learners -
Information Security
Information Security
By: Felix Hüneburg
Introduction, L2 - Securicy Policies, Social Engineering11Decks230Flashcards88Learners -
Security+ Study Guide 7th Edition SY501
Security+ Study Guide 7th Edition SY501
By: Curtis Padgett
Risk Assessment & Mangement Terms (Ch. 1), Monitoring & Diagnosing Networks Terms (Ch. 2), Port Numbers13Decks310Flashcards107Learners -
ag-CISA 3.0 - ISACA
ag-CISA 3.0 - ISACA
By: Anti Gondu
Domain 5 Task Statements, Chapter 5 Self Assessment 2019, Domain 5: Protection of Information Assets (Part 5A)43Decks1,427Flashcards5Learners -
CSE 127: Intro to Security
CSE 127: Intro to Security
By: Lea Lacson
Lec 1: Intro, Lec 2: Security Principals, Sample Midterm Fall 201219Decks827Flashcards20Learners -
CompTIA Security+ SY0-501
CompTIA Security+ SY0-501
By: Deanna Medina
Vocabulary/Acronyms, Ch. 12 Disaster Recovery & Incident Response, Ch. 11 Security Administration8Decks324Flashcards73Learners -
CEH v11 Revision
CEH v11 Revision
By: A Red
Essential Knowledge, Security in Cloud Computing, Linux15Decks558Flashcards26Learners -
CEH
CEH
By: Ijeoma Mowete
Hacking Wireless Networks, Cloud Computing, Malware8Decks258Flashcards1Learner -
CEH v10
CEH v10
By: Nicholas Phelps
Module 1 - Intro to Ethical Hacking, Module 2 - Footprinting and Reconnaissance, Module 3 - Scanning Networks25Decks772Flashcards1,023Learners -
My Notes of CISSP CBK
My Notes of CISSP CBK
By: Susan Bowers
Chapter 1 - Access Control, Chapter 2 - Telecommunications and Network Security, Chapter 3 - Info Sec Governance & Risk Management10Decks924Flashcards105Learners -
Security+ Practice exams
Security+ Practice exams
By: Alan Malone
Professor Messer Practice questions, CompTia practice questions, Comptia review questions38Decks2,776Flashcards124Learners -
Révisions
Révisions
By: Léo Dorn
Histoire de l'informatique, Blockchain, Cybersécu40Decks1,131Flashcards1Learner -
CEH - Certified Ethical Hacker
CEH - Certified Ethical Hacker
By: Abran Tapia
15 - SQL Injection, 16 - Hacking Wireless Networks, 17 - Hacking Mobile Platforms13Decks391Flashcards28Learners -
Security+
Security+
By: Thomas Reinecke
Security Overview, Malware, Malware Infections36Decks795Flashcards12Learners -
ag-Cybersecurity Bootcamp Study Aid
ag-Cybersecurity Bootcamp Study Aid
By: Anti Gondu
1.1_ Cybersecurity Mindset, 1.2_ Surveying Cyberspace, 1.3_ Certifications and Security+55Decks1,358Flashcards5Learners -
► CISSP CBK
► CISSP CBK
By: 💜 Languages
Chapter 1 - Access Control, Chapter 2 - Telecommunications and Network Security, Chapter 3 - Info Sec Governance & Risk Management10Decks924Flashcards126Learners -
ISSO
ISSO
By: Jay Reinhardt
TCP PORTS w/Clues, NIST Control Families, Numbers10Decks216Flashcards15Learners -
CISSP Exam
CISSP Exam
By: Oliver Crawford
Access Control, Telecommunications and Network Security, Information Security Guidelines and Risk Managerment32Decks1,092Flashcards2,509Learners -
(3) CompTIA Security+ (SY0-601)
(3) CompTIA Security+ (SY0-601)
By: Maciej Węgrzynowski
Security Overview, Malware, Malware Infections35Decks745Flashcards13Learners -
Security Plus
Security Plus
By: Josh Parker
Mastering the Basics of Security, Exploring Control Types and Methods, Understanding Basic Network Security19Decks555Flashcards257Learners -
CISSP
CISSP
By: Jeff S
CISSP (Chapter 1), CISSP (Chapter 2 - Information Security Governance and Risk Management), CISSP (Chapter 3 - Access Control)9Decks302Flashcards553Learners -
3RD YEAR - SECOND SEM
3RD YEAR - SECOND SEM
By: Mary Forro
Information Security 1, Information Security 2, Cisco 125Decks947Flashcards2Learners -
CompTIA Security+
CompTIA Security+
By: Kodama Chameleon
Threats, Attacks, And Vulnerabilities, Technologies And Tools, Architecture & Design6Decks697Flashcards6Learners
-
Entrance Exams
-
Professional Certifications
-
Foreign Languages
-
Science
-
English
-
Humanities & Social Studies
-
Mathematics
-
Medical & Nursing
-
Vocations
-
Law
-
Health & Fitness
-
Business & Finance
-
Technology & Engineering
-
Food & Beverage
-
Fine Arts
-
Random Knowledge
-
Architecture
-
Biotechnology
-
Computer Programming
-
Computer Science
-
Engineering
-
Graphic Design
-
Information Security
-
Information Technology
-
Management Information Systems