Learn Hack
Study Hack using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CEH
CEH
By: Alex Santiago
MOD 16 - Hacking Wireless, MOD 17 - Hacking Mobile Platforms, MOD 18 - Iot and OT Hacking ...13Decks164Flashcards1Learner -
Computer Science
Computer Science
By: s e
Hashtables vs HashMaps, ArrayLists, Multithreading in Java ...16Decks217Flashcards27Learners -
Computer Science
Computer Science
By: Christine Nguyen
Python - How to think like a computer scientist, The Odin Project, Arrays ...14Decks273Flashcards2Learners -
Autumn 2024
Autumn 2024
By: Siri P
Cloud computing, Ethical Hacking, Computer Networks and Internets3Decks291Flashcards1Learner -
cloud
cloud
By: Gustavo Passarella
cloud exam, ethical hacking exam2Decks107Flashcards1Learner -
FMV2
FMV2
By: Txsdl Sdl
Certified Hacking Forensic Investigator1Decks180Flashcards2Learners -
Cyber Security Fundamentals
Cyber Security Fundamentals
By: kai heng Loh
1. Introduction to Cyber Security, 2. Access Control, 3. Steganography ...11Decks168Flashcards11Learners -
Tecnologias Digitales
Tecnologias Digitales
By: andre vega
Ciberseguridad, Hacktivismo, Hackers ...8Decks34Flashcards2Learners -
Google Interview Prep
Google Interview Prep
By: Daniel Peirano
Total - Information taken from Wikipedia, Google Website, "Hacking a Google Interview" by Bill Jacobs and Curtis Fonger, Topcoder.com Data Science Tutorials, Design Patterns Explained Simply1Decks221Flashcards55Learners -
Computer Science
Computer Science
By: James Jenner
Computer Network, Ethics, Network security ...11Decks110Flashcards4Learners -
CEH SEP -24
CEH SEP -24
By: Ludvig Frick
Chapter 3 - Security foundations, Chapter 4 - Footprinting and Reconnaissance, Chapter 5 - Scanning the networks ...7Decks142Flashcards2Learners -
COMP41580 VoIP and Wireless Investigations
COMP41580 VoIP and Wireless Investigations
By: Christopher Smith
Introduction to Wireless Networking, Analysing Wireless Network Traffic, Wirless Security ...11Decks109Flashcards38Learners -
Prep Business Case
Prep Business Case
By: Manon Ampe
Case in Point, Hacking the Case Interview2Decks80Flashcards2Learners -
English
English
By: Sávio Freitas Castro
Aniversário e Datas, Checking In At The Airport, Pronunciation Pro ...9Decks310Flashcards1Learner -
CODZIENNIE 1A ... 1As
CODZIENNIE 1A ... 1As
By: Aleks Ander
Medycyna 1A, jak lepiej ogarnac MASE "shitu" do zapamietania, TAŃCE 1A ...8Decks71Flashcards1Learner -
Cyber Security
Cyber Security
By: Josh Davidson
Week 1 - Intro, Lecture 2 - Network Security, 2 - IDS ...15Decks288Flashcards2Learners -
Einführung in die Psychologie
Einführung in die Psychologie
By: Charlett W
1. VL - Einführung, 2. VL - Was ist Psychologie?, 3. VL - Emotionen Fridlund ...14Decks268Flashcards1Learner -
Spanish A1+A2
Spanish A1+A2
By: Jonas J
Basic to-go Verbs, Reflexive Verben, Gemischtes Hack ...6Decks359Flashcards1Learner -
Customer Management
Customer Management
By: Sophia Weißkopf
Article: Selling Internationally, Article: Blockchain and the Economics of Customer Satisfaction, Article: Online advertising fraud ...8Decks42Flashcards6Learners -
Boram
Boram
By: Boram Lee
D1 - Laboratory, S1, D2 - Disaster ...7Decks150Flashcards2Learners -
Molecular Biology 1
Molecular Biology 1
By: Harriet Phelan
Dr Hack's Lectures, Dr Hack's Lectures 2, Dr Boswell's lectures 13Decks214Flashcards2Learners -
CSF Finals
CSF Finals
By: Justin Ooi
Cryptography, Access Control, Steganography ...13Decks161Flashcards1Learner -
Legal Spanish
Legal Spanish
By: Jefferson coulter
Time and place, Hacks, La Terminología Jurídica ...37Decks1,389Flashcards31Learners -
20/8/24
20/8/24
By: maylamviec100% tainha
HACK NÃO 3-1TR1-2, HACK NÃO 3-2TR3, EMOTION B1 ...4Decks141Flashcards1Learner -
Spanish fundamentals
Spanish fundamentals
By: Joshua Houston
Question Words To Remember, Prepositions and adverbs, Pronouns ...23Decks1,169Flashcards1Learner -
Cybersecurity
Cybersecurity
By: Riad Moudjahed
Networking, Security tools, Ethical hacking ...11Decks176Flashcards1Learner -
Cyber
Cyber
By: Skylar Melis
Types of Hackers, Ethical Hacking vs. Penetration Testing vs. Auditing, Common Hacking Methodologies ...13Decks53Flashcards2Learners -
ECH
ECH
By: Victor Larsen
01: Introduction to Ethical Hacking, 02: Footprinting and Reconnaissance, 03: Scanning Networks ...4Decks44Flashcards1Learner -
Cognitive
Cognitive
By: Tilly Phillips
Introduction, Introduction to sensation and perception, Vision- from retina to cortex ...22Decks641Flashcards1Learner -
VI Editor
VI Editor
By: Ray Zou
Vim 101 Hacks1Decks38Flashcards4Learners