Learn Network And Security
Study Network And Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
3rd Year_2nd Sem
3rd Year_2nd Sem
By: Prince Gian Caranza Robles
Micro 2-4, Micro 5-7, Networks 1st PDF ...10Decks556Flashcards13Learners -
CCNP Core
CCNP Core
By: Jeff Detwiler
Chap 1 - Forwarding, Chap 2 - Spanning Tree Protocol, Chap 3 - Advanced STP Tuning ...46Decks2,185Flashcards113Learners -
IS3440 LINUX SECURITY
IS3440 LINUX SECURITY
By: Barbara Crable
IS3440 CHAP 1 SECURITY THREATS TO LINUX, IS3440 CHAP 2 BASIC COMPONENTS OF LINUX SECURITY, IS3440 CHAP 3 BASIC SECURITY: FACILITIES THROUGH THE BOOT PROCESS ...15Decks616Flashcards110Learners -
CompTIA ITF+
CompTIA ITF+
By: Raven K
Hardware, Software and Operating Systems, Networking ...7Decks240Flashcards121Learners -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
1.1 Social Engineering, 1.2 Attack Types, 1.3 Application Attacks ...35Decks722Flashcards23Learners -
CompTIA Security+ SY0-501 - Based on Objectives
CompTIA Security+ SY0-501 - Based on Objectives
By: Tánh Phạm
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards502Learners -
Information Systems Security
Information Systems Security
By: Vanessa Larivei
Intro, Cryptography, Authentication ...7Decks382Flashcards3Learners -
CISSP Power Notes
CISSP Power Notes
By: Dola Sang
Chapter 6- Cryptography and Symmetric Key Algorithms, Chapter 7: PKI and Cryptographic Applications, Chapter 8- Security Models, Design and Capabilities ...14Decks1,367Flashcards4Learners -
07 - Spring 2019 - CET-2830C_Information Security
07 - Spring 2019 - CET-2830C_Information Security
By: Brian Smith
Chapter 01 – Quiz Introduction to Security, Chapter 02 Quiz – Malware and Social Engineering Attacks, Chapter 03 Quiz – Basic Cyprography ...7Decks147Flashcards348Learners -
CISSP
CISSP
By: Jerry McGlynn
Access Control, Cards from Book, Network Architecture ...9Decks830Flashcards31Learners -
Cyber Warrior Program
Cyber Warrior Program
By: Brandon Hibner
A+ 1101 Exam Review, A+1102 Exam Review, Network + Exam Review ...15Decks1,316Flashcards5Learners -
My Notes of CISSP CBK
My Notes of CISSP CBK
By: Susan Bowers
Chapter 1 - Access Control, Chapter 2 - Telecommunications and Network Security, Chapter 3 - Info Sec Governance & Risk Management ...10Decks924Flashcards106Learners -
Sec+ 601 Practice Questions
Sec+ 601 Practice Questions
By: Kris G
Lesson 1: Comparing Security Roles and Security Controls, Lesson 2: Explaining Threat Actors and Threat Intelligence, Lesson 3: Performing Security Assessments ...21Decks305Flashcards145Learners -
Security + SY0-301
Security + SY0-301
By: alison harrington
Network Security, Organizational Security, Cryptology ...8Decks1,100Flashcards65Learners -
CSE 127: Intro to Security
CSE 127: Intro to Security
By: Lea Lacson
Lec 1: Intro, Lec 2: Security Principals, Sample Midterm Fall 2012 ...19Decks827Flashcards21Learners -
SP4
SP4
By: Josh Selkirk
Domain 1 - Security and Risk Management, Domain 2 - Asset Security, Domain 3 - Security Engineering ...9Decks400Flashcards298Learners -
Network+ N10-008 Todd Lammle
Network+ N10-008 Todd Lammle
By: Stephen Lawson
1. Introduction to Networks, 2. The Open Systems Interconnection Specifications, 3. Networking Connectors and Wiring Standards ...33Decks1,063Flashcards11Learners -
Network Admin II
Network Admin II
By: Autumn Williams
11) Network Applications, 10) Explaining Network Services, 9) Explaining Transport Layer Protocols ...16Decks209Flashcards72Learners -
Sysops
Sysops
By: Mark Sarge
Security, Compute, Networking ...14Decks1,251Flashcards81Learners -
Network Foundations
Network Foundations
By: Joshua Lane
TCP/IP, OSI, Network Devices ...9Decks548Flashcards1Learner -
CISSP
CISSP
By: Louay Karadsheh
Phyiscal Security, Access Control, Operation Security ...12Decks646Flashcards19Learners -
Security Knowledge Bank
Security Knowledge Bank
By: Amie Gray
Abbreviations, Attack Mitigations, Whats that Attack ...23Decks875Flashcards12Learners -
N10-008
N10-008
By: Jonathan Maner
Ports and Protocols, Information I Think is Worth Knowing, Cabling ...21Decks532Flashcards3Learners -
CISSP FlashCards 2021 CBK (in progress)
CISSP FlashCards 2021 CBK (in progress)
By: Brent Larson
Domain 1 - Security and Risk Management, Domain 1 - Laws and Regulations, Domain 2: Asset Security ...15Decks1,261Flashcards27Learners -
CISSP
CISSP
By: Jason Shaffer
Domain 1 - Security and Risk Management, Domain 2 - Asset Security, Domain 3 - Security Engineering ...9Decks841Flashcards88Learners -
GCSE OCR Computer Science
GCSE OCR Computer Science
By: Jaiden Malhotra
1.1 System Architecture, 1.2 Memory, 1.3 Storage ...13Decks259Flashcards1,180Learners -
COMPTIA - Sec+ Textbook
COMPTIA - Sec+ Textbook
By: Rachelle Pestanas
Lesson 1: Comparing & Contrasting Attacks, Lesson 2: Comparing and Contrasting Security Controls, Lesson 3: Assessing Security Posture with Software Tools ...16Decks951Flashcards22Learners -
IT GCSE
IT GCSE
By: Kathryn Bright
General Stuff, Hardware, Logic ...10Decks712Flashcards14Learners -
IT Applications - WGU
IT Applications - WGU
By: Jason Z
Operating Systems, Linux Commands, Windows Management ...16Decks558Flashcards13Learners -
CCT
CCT
By: Casey Wilfling
01 - InfoSec Threats, 02 - Information Security Attacks, 03 - Information Security Fundamentals ...22Decks291Flashcards1Learner