Learn Network And Cloud Security
Study Network And Cloud Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Azure Foundations
Azure Foundations
By: Steve G
Describe Cloud Concepts, Core Azure Architectural Components, Describe core solutions and management tools on Azure ...7Decks114Flashcards9Learners -
Cisco CCNA
Cisco CCNA
By: Kevin P
Host to Host Communications, Cisco IOS Operating System, OSI Layer 4 - Transport Layer ...38Decks654Flashcards18Learners -
Security +
Security +
By: Jon-Paul Brune
Chapter 2 - Monitoring & Diagnosing Networks, Chapter 1 - Measuring & Weighing Risk, Chapter 3 - Understanding Devices & Infrastructure ...12Decks397Flashcards13Learners -
AZ-900
AZ-900
By: Rod Wellmann
Describe cloud concepts, Describe the core architectural components of Azure, Glosario de términos de Azure ...9Decks303Flashcards8Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...35Decks546Flashcards19Learners -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types ...41Decks1,670Flashcards6Learners -
CCEA GCSE Digital Technology Unit 1
CCEA GCSE Digital Technology Unit 1
By: Alan Templeton
Chapter 1 - Digital Data, Chapter 2 - Software, Chapter 3 - Database Applications ...10Decks280Flashcards28Learners -
Network+ Certification
Network+ Certification
By: Brady Molnar
Chapter 2 - Network Models, Chapter 3 - Cabling and Technology, Chapter 4 - Ethernet Basics ...18Decks582Flashcards9Learners -
AZ-900
AZ-900
By: Jonathan Rodriguez
Cloud Concepts (15-20%), Core Azure Services (30%-35%), Azure Pricing ...13Decks304Flashcards2Learners -
AWS SAA Certification
AWS SAA Certification
By: Bryan Butler
Getting started with AWS Cloud, Security in the AWS Cloud, Identity and Access Management ...18Decks341Flashcards2Learners -
CompTIA A+ 220-1101
CompTIA A+ 220-1101
By: Haylee Harvey
Hardware, Hardware and Network Troubleshooting, Mobile Devices ...10Decks231Flashcards1Learner -
Security + 501 - FHSU - Feb 3 - 13
Security + 501 - FHSU - Feb 3 - 13
By: Casey Tozier
Domain 1.1 - Given a scenario, analyze indicators of compromise and determine the type of malware., Domain 1.2 - Compare and contrast types of attacks., Domain 1.3 - Explain threat actor types and attributes. ...39Decks773Flashcards6Learners -
AWS Cloud Practitioner (Digital Cloud)
AWS Cloud Practitioner (Digital Cloud)
By: Josh Cheung
AWS Analytics, AWS Monitoring and Logging Services, AWS Content Delivery and DNS Services ...19Decks696Flashcards2Learners -
azure
azure
By: Wesley Cesar
Describe general security and network security features, Describe Cloud Concepts, Describe identity, governance, privacy, and compliance features ...6Decks251Flashcards3Learners -
Digital Marketing strategy
Digital Marketing strategy
By: Alice Wachtmeister
introduction and network effects, Fundamental Technologies, Strategy and business models ...11Decks137Flashcards37Learners -
Cantril
Cantril
By: Ser Jaime
Fundamentals, AWS accounts, IAM Basics ...38Decks967Flashcards5Learners -
CCNA 200-301 Vol 2
CCNA 200-301 Vol 2
By: Alexandre Menetre
Chapitre 1 - Introduction to TCP/IP Transport and Applications, Chapitre 2 - Basics IPv4 Access Control Lists, Chapitre 3 - Avanced IPv4 Access Control Lists ...19Decks244Flashcards17Learners -
ITS
ITS
By: Magnus Storm
M1: Security concepts and principles - C.1, M2: Cryptographic building blocks - C2, M3: User authentication, IAM - C.3 & C.5 ...14Decks411Flashcards2Learners -
COMPTIA Security +
COMPTIA Security +
By: Zac Shook
Chapter 1: Controls, Chapter 2: Public Key Infrastructure, Chapter 3: Identity and Access Management ...21Decks584Flashcards1Learner -
Microsoft Azure ⭐️⭐️ Developer Associate (AZ-204)
Microsoft Azure ⭐️⭐️ Developer Associate (AZ-204)
By: Denis C
(AZ-900 topic) Understand Cloud Concepts, (AZ-900 topic) Describe Core Azure Services, (AZ-900 topic) Describe core solutions and management tools on Azure ...15Decks677Flashcards13Learners -
ethical hacking
ethical hacking
By: Barbara Workman
Information Security Fundamentals, Ethical Hacking Fundamentals, Information Security Threats and Vulnerability Assessment ...13Decks222Flashcards92Learners -
azure fundamentals
azure fundamentals
By: Danielle Wilson
Describe cloud concepts, Describe the benefits of using cloud service, Cloud Service Types ...14Decks534Flashcards2Learners -
AWS Cert
AWS Cert
By: Ashley Burleson
Cloud Computing, EC2, High Availability ...9Decks135Flashcards1Learner -
Security+ exam
Security+ exam
By: Nick Barber
Secure Protocols, Symmetric vs Asymmetric, Encryption and stenography ...74Decks586Flashcards1Learner -
A+ Certification
A+ Certification
By: Nicholas McCarthy
1101: Chap 1 - Mobile Devices, 1101: Chap 2 - Networking, 1101: Chap 3 - Hardware ...11Decks452Flashcards1Learner -
Microsoft Azure Fundamentals
Microsoft Azure Fundamentals
By: Marian Ratajczak
Cloud Computing, Benefits of Cloud Computing, Cloud Service Types ...13Decks226Flashcards1Learner -
Geo
Geo
By: Cornelia Malou
F.1 measuring Food and health, 1.2 changing populations and places., Unit one; economic classifications. ...42Decks1,154Flashcards3Learners -
Amazon Web Services (Whitepaper)
Amazon Web Services (Whitepaper)
By: Bari Ryczek
*Cloud Computing Models*, *Cloud Computing Deployment Models*, *AWS Services & Application Access* ...29Decks274Flashcards6Learners -
CP2501 Cloud Computing
CP2501 Cloud Computing
By: Reece Kelly
Week 1 - Cloud Concepts Overview, Week 2 - Cloud Global Infrastructure Overview, Week 3 - Cloud Security ...9Decks141Flashcards3Learners -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. ...40Decks663Flashcards1Learner