Learn Application Security
Study Application Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Software security
Software security
By: E Mi
Information security, concepts and principles, OWASP part 1, OWASP part 2 ...16Decks600Flashcards2Learners -
AWS Certified Data Engineer
AWS Certified Data Engineer
By: Hải Yến Trịnh
Data Engineering Fundamentals, Storage, Database ...14Decks482Flashcards13Learners -
CS4203: Computer Security
CS4203: Computer Security
By: Seamus Bonner
Introduction, Cryptography, Hashing ...19Decks522Flashcards16Learners -
Sem 1-AHEAD_Cyber_Security
Sem 1-AHEAD_Cyber_Security
By: Hemant Kumar
Python Modules Types, Python Methods, Memory & Learning ...27Decks585Flashcards4Learners -
Security + Messer
Security + Messer
By: Blayne Ehrenzeller
1.1 - Social Engineering, 1.2 - Attack Types, 1.3 - Application Attacks ...24Decks622Flashcards1Learner -
Security+
Security+
By: Sean Shirley
Basics and fundamentals, General Security threats, Generally Mitigating Threats ...41Decks807Flashcards1Learner -
Security + 601
Security + 601
By: Sean Suga
Security+ 601 Acronyms, Lesson 3: Performing Security Assessments, Lesson 4: Identifying Social Engineering and Malware ...13Decks854Flashcards20Learners -
CISSP - Security Management
CISSP - Security Management
By: Tim Pelland
CIA Triad, Control Types, OSI Models ...12Decks831Flashcards29Learners -
Next Gig
Next Gig
By: Jamila Duckett
Security Primer, Cloud Concepts, Architecture and Design, Cloud Data Security ...17Decks883Flashcards1Learner -
A Cloud Guru - AWS
A Cloud Guru - AWS
By: Srinivasan J
IAM, Infra, S3 ...11Decks682Flashcards4Learners -
1_Security+ Exam Essentials
1_Security+ Exam Essentials
By: Rebecca Speirs
1 Today's Security Professional, 2 Cybersecurity Threat Landscape, 3. Malicious code ...17Decks279Flashcards1Learner -
CompTIA Security+
CompTIA Security+
By: Josef Mengele
Chapter 1 Measuring and Weighing Risk, Chapter 2 Monitoring and Diagnosing Networks, Chapter 3 Understanding Devices and Infrastructure ...12Decks378Flashcards231Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...35Decks546Flashcards18Learners -
Google Cloud Digital Leader
Google Cloud Digital Leader
By: Katherine Malewski
Intro to Digital Transformation, Innovating with Google Cloud, Infrastructure & Application Modernization with Google CLoud ...5Decks94Flashcards116Learners -
Security+
Security+
By: Dillan Beckelheimer
Chapter 2: Monitoring and Diagnosing Networks, Security+ Questions, Chapter 3: Understanding Devices and Infrastructure ...8Decks297Flashcards100Learners -
Security+
Security+
By: Taimoor Fayyaz
Ports, Basics, Malware ...22Decks583Flashcards1Learner -
Comp TIA A+ 220 1002 Chris
Comp TIA A+ 220 1002 Chris
By: chris carnaffin
1.1 - Compare and contrast common operating system types and their purposes., 1.2 - Compare and contrast features of Microsoft Windows versions., 1.3 - Summarise general OS installation considerations and upgrade methods. ...33Decks497Flashcards114Learners -
► Security+
► Security+
By: B -
Chapter 1: Measuring and Weighing Risk, Chapter 2: Monitoring and Diagnosing Networks, Port Numbers ...13Decks484Flashcards62Learners -
CompTIA Sec+
CompTIA Sec+
By: James Camp
Social Engineering Techniques, Types of Attacks/Malware, Application Attacks ...29Decks377Flashcards5Learners -
Computer Science IGCSE
Computer Science IGCSE
By: SL ng
CS Key Terms, Networking and the Internet, Revision notes AQA ...9Decks246Flashcards465Learners -
Security+
Security+
By: Richard Romick
Chapter 3: Cryptography, Common Ports, Chapter 4: Network Connectivity ...9Decks388Flashcards1Learner -
OCP Java SE 17 (1Z0-829)
OCP Java SE 17 (1Z0-829)
By: Mikołaj Telus
Chapter 1, Chapter 2, Chapter 3 ...21Decks1,014Flashcards86Learners -
9569 H2 Computing
9569 H2 Computing
By: Ng Jun Siang
Data Structures and Abstract Data Types, Object Oriented Programming, Recursion ...15Decks156Flashcards45Learners -
CPE109
CPE109
By: Ayen A
Module 1: Computer Networks and Security, Module 2: Applications and Layered Architectures, Module 3: Internetworks: Principles of Internetworking, Architectures, IP Addressing ...9Decks708Flashcards12Learners -
SEC +
SEC +
By: D N
Acronyms, Vocab, Summary Q & A ...19Decks1,414Flashcards1Learner -
Comptia A+ 1102
Comptia A+ 1102
By: Jerry Garcia
Linux, Filesystems, Windows ...12Decks453Flashcards17Learners -
COMPUTER NETWORKS
COMPUTER NETWORKS
By: Sifa Ngari
INTRODUCTION TO COMPUTER NETWORKS, TYPES OF NETWORKS, NETWORKING EQUIPMENT ...23Decks463Flashcards133Learners -
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
By: Alex valentine
Malware and Indicators of Compromise, Attacks, Threat Actors ...29Decks412Flashcards6Learners -
Introduction to IT Security
Introduction to IT Security
By: Mathias Unknown
Goals and Principles - What Is Security, Goals and Principles - Privacy, Goals and Principles - Design Principles for Secure Systems ...11Decks127Flashcards26Learners -
Security+
Security+
By: Angelina Hart
Security+ Practice Tests 1-5, Security+ Practice Tests 6-10, Udemy Sections 1-3: Overview, Malware, and Malware Infections ...10Decks1,371Flashcards3Learners