Learn Hack
Study Hack using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Global issues in environmental science
Global issues in environmental science
By: Ella Koski
Intro lecture, Intro to atmosphere, Atmospheric composition and climate ...28Decks448Flashcards12Learners -
Auditing
Auditing
By: Ruel Morgan
Hack 1, Harder Concepts, Ratios to Know and Analytical Procedures ...31Decks541Flashcards16Learners -
History
History
By: Sara Jovanovic
1848 Hack, Section A Evidence, Oct, 1917 EVIDENCE ...10Decks219Flashcards1Learner -
foundation - ict
foundation - ict
By: kai goedee
foundation, ethical hacking2Decks73Flashcards2Learners -
Professional Issues
Professional Issues
By: Josh Davidson
Part 1 - Ethical Analysis, Part 2 - Code Of Ethics, Week 2 - Information Governance ...11Decks162Flashcards2Learners -
CSY3062 - Cybersecurity and Applied Cryptography
CSY3062 - Cybersecurity and Applied Cryptography
By: Sean Creighan
1. Cybersecurity, 1.2 - Cybersecurity Attack Framework, 2. Ethical Hacking and Penetration Testing ...6Decks72Flashcards4Learners -
YR2 Cognitive psychology
YR2 Cognitive psychology
By: Em Brocklesby
1. Introduction, 2. Intro to sensation and perception, 3. From retina to cortex ...22Decks437Flashcards2Learners -
Habits
Habits
By: Bernie Sanders
No Excuses, Skinny Rules, Drew Williams ...17Decks173Flashcards12Learners -
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH)
By: Christoph Todd
Common Terms, Zero Day Attack, Miscellaneous Computer Processes (stuff I find and look up along the way) ...66Decks320Flashcards6Learners -
Cognitive Psychology
Cognitive Psychology
By: Jiana Canson
Low level Vision, High level of vision, Vision: Development of Scene Perception ...17Decks323Flashcards1Learner -
MIT 6.172 Performance Engineering of Software Systems, Fall 2018
MIT 6.172 Performance Engineering of Software Systems, Fall 2018
By: Thomas Reddy
Introduction and Matrix Multiplication, Bentley Rules for Optimizing Work, Bit Hacks3Decks212Flashcards1Learner -
Marketing Management
Marketing Management
By: Trocil Matej
Lecture 1, Lecture 2, Lecture 3 ...5Decks58Flashcards3Learners -
1 Life Lessons - Master Memory
1 Life Lessons - Master Memory
By: Kyle Fendick
As A Man Thinketh - Core, 49 Laws Of Power, Tai’s 12 Foundations ...10Decks101Flashcards10Learners -
TryHackMe
TryHackMe
By: René Martin Kuda
Introductory Networking, Network Services, Web Hacking Fundamentals ...4Decks26Flashcards3Learners -
Kemjar
Kemjar
By: Azka Nabihan
Network Monitoring & Information Gathering, System Hacking, Malware Threats3Decks60Flashcards1Learner -
Global Current Affairs
Global Current Affairs
By: Courtney Hayes
Russia and The New Cold War, Nuclear Proliferation, Cyber Warfare and Cyber Crime ...5Decks235Flashcards3Learners -
Cognitive Psychology
Cognitive Psychology
By: Grace Marshall
Week 1- Intro, Lecture 4- Visual Development, Week 2- High level Vision ...20Decks454Flashcards4Learners -
Think Well
Think Well
By: Saravanaraj Velusamy
Srikumar Rao Creativity and Personal Mastery, Mindset Hacks, Cognitive Distortions3Decks58Flashcards3Learners -
Knowledge
Knowledge
By: George MacGill
Mental Models, Life Hacks, Javascript ...5Decks121Flashcards1Learner -
CEH
CEH
By: Brian White
Scanning, Foot Printing, Trojans And Other Attacks ...7Decks32Flashcards4Learners -
PSYC234: Research Methods And Statistics 3
PSYC234: Research Methods And Statistics 3
By: Meg A
Week 1- P Hacking and Harking, Week 2-Multiple regression, Week 3-Hierarchical Regression ...9Decks171Flashcards1Learner -
CEH
CEH
By: Seize Sterke
1. HACKING ETICO, 1. GLOSARIO, 2. FUNDAMENTOS DE NETWORKING ...4Decks132Flashcards1Learner -
FAR
FAR
By: Brittney O
Bonds Debt Restructure, Accounting Changes, Current Assets & Liabilities ...18Decks523Flashcards1Learner -
I40(0/1/2) Computer Science Bsc Year 1
I40(0/1/2) Computer Science Bsc Year 1
By: Aria Noroozi
ECM 1407 Electronic Machines, ECM 1407 The History of Computing, ECM 1407 Encryption ...40Decks731Flashcards2Learners -
CEH
CEH
By: Chris Quinn
Module 1 - Introduction to Ethical Hacking, Module 2 - Footprinting & Reconaissance, Module 03: Scanning Networks ...9Decks150Flashcards1Learner -
SAT Vocab
SAT Vocab
By: John Zalar
Hack The SAT Vocab1Decks167Flashcards2Learners -
Virality&Influence
Virality&Influence
By: Mariyam Shamshidova
Growth Hacking @Holiday, Tribes @Godin, Contagious Content @Jumpcut ...4Decks31Flashcards2Learners -
CPSA 2024
CPSA 2024
By: sweet •
A2 - Law and Compliance, B1 - IP Protocols, B2 - Network Architectures ...16Decks187Flashcards4Learners -
SSR 2
SSR 2
By: Lauranne Kloos
Errors, Level of measurement, P hacking ...7Decks40Flashcards1Learner -
GERMAN
GERMAN
By: Camila Mojica
Adjektiv, Unregelmäßige, Modelverben ...9Decks167Flashcards1Learner