Learn Application Security
Study Application Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
COMP30023
COMP30023
By: Caiti and Commerce of Reynard
Definitions, Exam Questions, Introduction...17Decks727Flashcards15Learners -
Certified Kubernetes Administrators Certification (CKA)
Certified Kubernetes Administrators Certification (CKA)
By: Collin Sanford
Core Concepts, Scheduling, Logging and Monitoring...8Decks220Flashcards28Learners -
Certified Ethical Hacker
Certified Ethical Hacker
By: James Carrion
Essential Knowledge, Reconnaissance, Scanning and Enumeration...13Decks789Flashcards18Learners -
CompTIA Security+ SY0-501 - Objectives
CompTIA Security+ SY0-501 - Objectives
By: Eliza Hazard
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks....45Decks887Flashcards11Learners -
Salesforce Admin study 06152019
Salesforce Admin study 06152019
By: Tina Mccauley - OIT
Orgainiation Setup, Sales and marketing applications, Activity management and collaboration...10Decks243Flashcards57Learners -
Exam 70-480: Programming in HTML5 with JavaScript and CSS3
Exam 70-480: Programming in HTML5 with JavaScript and CSS3
By: Bryan Phillips
Implement and manipulate document structures and objects (24%), Implement program flow (25%), Access and secure data (26%)...4Decks477Flashcards107Learners -
Introduction to IT Security
Introduction to IT Security
By: Mathias Unknown
Goals and Principles - What Is Security, Goals and Principles - Privacy, Goals and Principles - Design Principles for Secure Systems...11Decks127Flashcards26Learners -
cpi IGCSE
cpi IGCSE
By: Saika .
computer system, input output, Storage Devices...11Decks323Flashcards5Learners -
CISSP - Security Management
CISSP - Security Management
By: Tim Pelland
CIA Triad, Control Types, OSI Models...12Decks831Flashcards29Learners -
AS Digital Technology
AS Digital Technology
By: kate kelly
2.3.1 Architecture, Fetch Execute Cycle, 2.4.2 Website Development...22Decks365Flashcards40Learners -
Computer and Network Security
Computer and Network Security
By: Kaya Stone
History of Computer Security, Access Control, Security Mechanisms of UNIX...10Decks281Flashcards4Learners -
Security+ SY0-601 Mike Chapple
Security+ SY0-601 Mike Chapple
By: Nick Z
Chapter 01 - Todays Security Professional, Chapter 02: Cyber Security Landscape, End of Chapter Questions...11Decks510Flashcards19Learners -
Data Engineer Associate
Data Engineer Associate
By: Chris Lombardi
Data Engineering Basics, Storage Technologies, Databases...8Decks502Flashcards12Learners -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks....40Decks663Flashcards1Learner -
Computer Science IGCSE
Computer Science IGCSE
By: SL ng
CS Key Terms, Networking and the Internet, Revision notes AQA...9Decks246Flashcards469Learners -
Spring professional certification
Spring professional certification
By: Tho GG
0-Notes, 10-Spring Overview, 12-Java Configuration...18Decks437Flashcards37Learners -
Computer Science (Year 2)
Computer Science (Year 2)
By: Daniel Hole
Software Development, Computer Languages and Representations, Network and Computer Security...7Decks1,754Flashcards4Learners -
Foundations
Foundations
By: Guam Ko'ko'
Business of bank supervision, FRB BASE banking and supervision elements, Mortgage Securities...29Decks1,380Flashcards24Learners -
► Security+
► Security+
By: B -
Chapter 1: Measuring and Weighing Risk, Chapter 2: Monitoring and Diagnosing Networks, Port Numbers...13Decks484Flashcards62Learners -
CCSK Practice Tests - CSA Security Guidance v4
CCSK Practice Tests - CSA Security Guidance v4
By: Chris Nadeau
Domain 1: Cloud Computing Concepts and Architectures, Domain 2: Governance and Enterprise Risk Management, Domain 3: Legal Issues, Contracts, and Electronic Discovery...16Decks329Flashcards27Learners -
Cisco Devnet
Cisco Devnet
By: Wayne Knight
Software Dev and Design, Using APIs, Application deployment and Security...5Decks165Flashcards24Learners -
CKAD Preparation
CKAD Preparation
By: Marian Ratajczak
Recap Core Concepts, Configuration, Config - ConfigMaps...35Decks401Flashcards7Learners -
HCISSP ISC2
HCISSP ISC2
By: Host Mom
Domain 1 - Healthcare Industry, 1.1 Medical Business Operations, 1.2 Healthcare Data, Data Sets And Standards...56Decks1,914Flashcards20Learners -
Digital Technology - S1
Digital Technology - S1
By: Euan Ford
Data Portability, Spreadsheets, Digital Data...14Decks380Flashcards8Learners -
AWS Architect Associate
AWS Architect Associate
By: Fernando Guerra
Resilient Architectures - Availability, Resilient Architectures - Environment setup, Resilient Architectures - CloudFormation...30Decks349Flashcards4Learners -
Salesforce - Administrator Certification
Salesforce - Administrator Certification
By: Michael Hamilton
Setup and Objects Scenarios, Setup and Objects Flashcards, Security and Data Management Scenarios...8Decks129Flashcards22Learners -
AWS Final Exam
AWS Final Exam
By: Jacqueline Huynh
Module 1 - Introduction to Amazon Web Services, Module 2 - Compute in the Cloud, Module 3 - Global Infrastructure and Reliability...50Decks541Flashcards74Learners -
Intro to Information Security
Intro to Information Security
By: Noel Mora
Intro to IS, IT APPLICATIONS, IT APPLICATIONS PART 2...11Decks195Flashcards5Learners -
AWS Review
AWS Review
By: Host Mom
Pt 1, AWS Security, Security 2...80Decks2,158Flashcards15Learners -
Security+
Security+
By: Matt Miller
Chapter 1: Measuring and Weighing Risk, Chapter 2: Monitoring and Diagnosing Networks, Port Numbers...13Decks484Flashcards124Learners