Learn It Security
Study It Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
IT security
IT security
By: Jonathan Aka
Malicious attacks ,Threats and vulnerabilities, malicious attacks,threats andvulnerabilities2Decks23Flashcards1Learner -
Lesson 7: Configuring SOHO Network Security. I T Applications. Con.
Lesson 7: Configuring SOHO Network Security. I T Applications. Con.
By: Sophia G
Lesson 7 A, Lesson 7 B Compare Wireless Security Protocols, Lesson 7 C Configure SOHO Router Security ...5Decks61Flashcards1Learner -
IT Security Basics
IT Security Basics
By: Paula Wangai
Introduction to IT Security, Cryptography2Decks24Flashcards1Learner -
IT - Unit 2 - Cyber Security
IT - Unit 2 - Cyber Security
By: Jordan Carter
Internal policies and the law1Decks17Flashcards1Learner -
IT Unit 3- Cyber Security Personal.
IT Unit 3- Cyber Security Personal.
By: Anthony Miles
1.1- Cyber Security Aims., 1.2- Types of Cyber Security Incidents, 1.3- The importance of Cyber Security ...6Decks38Flashcards1Learner -
Social And Prof Issues
Social And Prof Issues
By: marites dimagiba
IT Security, IT Professionals, Data Privacy3Decks20Flashcards1Learner -
IT Security
IT Security
By: Kinzi Catalano
Cryptography Applications, 3 As, Secure Network Architecture ...6Decks25Flashcards1Learner -
Cambridge Technicals Level 3 IT
Cambridge Technicals Level 3 IT
By: Harry Symes
Cambridge Technicals Level 3 IT LO5.5 Digital Security, Cambridge Technicals Level 3 IT LO1.4 Connectivity, Cambridge Technicals Level 3 IT LO2.3 Utility Software ...6Decks69Flashcards1Learner -
08 Put it to work
08 Put it to work
By: Amreek Paul
MD1 Event and incident detection: Security as a mindset, MD1 Data and Asset classification, MD1 Your impact on data protection: Detect and protect without neglect ...36Decks105Flashcards1Learner -
A-ICT- IB- Tom
A-ICT- IB- Tom
By: Tom Z
Processing technology, input devices, output devices ...33Decks1,456Flashcards43Learners -
TU 2 IT-Sicherheit
TU 2 IT-Sicherheit
By: Sophia Weißkopf
Einführung, Software Security, IT-Recht ...17Decks274Flashcards2Learners -
GOOGLE CYBER SECURITY CERTIFICATE - COURSE 2
GOOGLE CYBER SECURITY CERTIFICATE - COURSE 2
By: Nahman L
Foundations of Cybersecurity Module 1, Foundations of Cybersecurity Module 2, Foundations of Cybersecurity Module 3 ...12Decks1,177Flashcards14Learners -
CIA PT 3
CIA PT 3
By: William Russell
IA Knowledge I, IA Knowledge II, IA Knowledge III ...28Decks1,506Flashcards59Learners -
SFC
SFC
By: Lee Jordan
MBITR, Range Exstension, 112G ...14Decks575Flashcards71Learners -
Security
Security
By: Trevor Christie-Taylor
Communication and network security, Software Development Security, Security Assessment and Training ...8Decks859Flashcards1Learner -
IT 360T
IT 360T
By: Hzzi Sanders
IT: Chapter 1: Business Information Systems in your Career, IT: Chapter 2: Global E-Business and Collaboration, IT: Chapter 3: Achieving Competitive Advantage with Informaiton Systems ...10Decks849Flashcards41Learners -
BEC Flash Cards
BEC Flash Cards
By: Sarah Godfrey
Corporate Governance and Internal Controls, COSO (Committee of Sponsoring Organizations), Microeconomics ...25Decks852Flashcards12Learners -
Computer Security
Computer Security
By: Zoey Sheffield
1. Network security: Networking Principles, 2. Network security: ARP, TCP/IP and its vulnerabilities, 3. Cryptography: introduction ...18Decks267Flashcards30Learners -
RSTO's
RSTO's
By: user delete
A&P, Vp, Security Threats ...25Decks533Flashcards12Learners -
GCSE Computer Science
GCSE Computer Science
By: Meghan Pereira
Algorithms, Computer Hardware, Software ...14Decks304Flashcards51Learners -
Intro to Information Security
Intro to Information Security
By: Noel Mora
Intro to IS, IT APPLICATIONS, IT APPLICATIONS PART 2 ...11Decks195Flashcards2Learners -
IT
IT
By: Piotr Tru
IT, Security2Decks25Flashcards1Learner -
Information Systems Auditing
Information Systems Auditing
By: Ruel Morgan
Information System Auditing - Planning, Information Systems Auditing - Planning 2, Information System Implementation ...21Decks365Flashcards3Learners -
AWS Cloud Practictioner
AWS Cloud Practictioner
By: Host Mom
Domain 1: Cloud Concepts (26%), Domain 2: Security and Compliance (25%), Domain 3: Technology (33%) ...55Decks1,010Flashcards411Learners -
Job
Job
By: Stefan Ewald
Thomas Cook, IT Security Manager, Resume ...7Decks140Flashcards1Learner -
Work
Work
By: How High
Chap 1 - information & Sec environment, Chap 2 - Information asset security, Chap 3 - Identity Access Mgmt ...9Decks584Flashcards1Learner -
Foundations
Foundations
By: Guam Ko'ko'
Business of bank supervision, FRB BASE banking and supervision elements, Mortgage Securities ...29Decks1,380Flashcards23Learners -
Informations und Wissensmanagement
Informations und Wissensmanagement
By: Andreas Hein
Chapter1: What do “information” & “knowledge” really mean?, Chapter 2: Strategy and Information Management (Business IT Alignment), Tutorial 1: Analyzing IT-Strategy ...21Decks252Flashcards11Learners -
IGCSE CS
IGCSE CS
By: Anna Sapoznik
Data Representation, Data Transmission, Error Detection ...15Decks375Flashcards3Learners -
IT Management
IT Management
By: Jan Svrčina
Security Policies and Governance, Risk Management, Security Controls ...10Decks333Flashcards2Learners