Learn Application Security
Study Application Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types ...41Decks1,670Flashcards6Learners -
OCP Java SE 17 (1Z0-829)
OCP Java SE 17 (1Z0-829)
By: Mikołaj Telus
Chapter 1, Chapter 2, Chapter 3 ...21Decks1,014Flashcards44Learners -
Java OCP 11
Java OCP 11
By: Unknown Unknown
Chapter 1, Chapter 2, Chapter 3 ...22Decks997Flashcards79Learners -
Introduction to IT Security
Introduction to IT Security
By: Mathias Unknown
Goals and Principles - What Is Security, Goals and Principles - Privacy, Goals and Principles - Design Principles for Secure Systems ...11Decks127Flashcards26Learners -
CompTIA Security+ SY0-501 - Based on Objectives X
CompTIA Security+ SY0-501 - Based on Objectives X
By: xavier Xavier
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards13Learners -
Certified Ethical Hacker
Certified Ethical Hacker
By: James Carrion
Essential Knowledge, Reconnaissance, Scanning and Enumeration ...13Decks789Flashcards16Learners -
9569 H2 Computing
9569 H2 Computing
By: Ng Jun Siang
Data Structures and Abstract Data Types, Object Oriented Programming, Recursion ...15Decks151Flashcards37Learners -
COMPUTER NETWORKS
COMPUTER NETWORKS
By: Sifa Ngari
INTRODUCTION TO COMPUTER NETWORKS, TYPES OF NETWORKS, NETWORKING EQUIPMENT ...23Decks463Flashcards82Learners -
CCEA GCSE Digital Technology Unit 1
CCEA GCSE Digital Technology Unit 1
By: Alan Templeton
Chapter 1 - Digital Data, Chapter 2 - Software, Chapter 3 - Database Applications ...10Decks280Flashcards28Learners -
Exam 70-480: Programming in HTML5 with JavaScript and CSS3
Exam 70-480: Programming in HTML5 with JavaScript and CSS3
By: Bryan Phillips
Implement and manipulate document structures and objects (24%), Implement program flow (25%), Access and secure data (26%) ...4Decks477Flashcards103Learners -
AS Digital Technology
AS Digital Technology
By: kate kelly
2.3.1 Architecture, Fetch Execute Cycle, 2.4.2 Website Development ...22Decks365Flashcards29Learners -
Patent Bar
Patent Bar
By: Mike Young
Patent Bar: The Law, Claim Drafting: 35 USC 112, Review Question Points ...27Decks780Flashcards353Learners -
Cisco Devnet
Cisco Devnet
By: Wayne Knight
Software Dev and Design, Using APIs, Application deployment and Security ...5Decks165Flashcards21Learners -
CompTIA Security+ SY0-501 - Objectives
CompTIA Security+ SY0-501 - Objectives
By: Eliza Hazard
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards9Learners -
COMP30023
COMP30023
By: Caiti and Commerce of Reynard
Definitions, Exam Questions, Introduction ...17Decks727Flashcards15Learners -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. ...40Decks663Flashcards1Learner -
Salesforce - Administrator Certification
Salesforce - Administrator Certification
By: Michael Hamilton
Setup and Objects Scenarios, Setup and Objects Flashcards, Security and Data Management Scenarios ...8Decks129Flashcards20Learners -
AWS Architect Associate
AWS Architect Associate
By: Fernando Guerra
Resilient Architectures - Availability, Resilient Architectures - Environment setup, Resilient Architectures - CloudFormation ...30Decks349Flashcards4Learners -
Spring professional certification
Spring professional certification
By: Tho GG
0-Notes, 10-Spring Overview, 12-Java Configuration ...18Decks437Flashcards32Learners -
AWS Final Exam
AWS Final Exam
By: Jacqueline Huynh
Module 1 - Introduction to Amazon Web Services, Module 2 - Compute in the Cloud, Module 3 - Global Infrastructure and Reliability ...50Decks541Flashcards68Learners -
Security
Security
By: Vitor R
Exam questions, 1 - Introduction, 2 - Physical Link ...17Decks260Flashcards6Learners -
HCISSP ISC2
HCISSP ISC2
By: Host Mom
Domain 1 - Healthcare Industry, 1.1 Medical Business Operations, 1.2 Healthcare Data, Data Sets And Standards ...56Decks1,914Flashcards18Learners -
CCSP-certification FA
CCSP-certification FA
By: Ferencz Arendt
CCSP study FA, Architectural Concepts, Architectural Concepts ...5Decks90Flashcards41Learners -
CompTIA A+ 1002
CompTIA A+ 1002
By: Kevin P
1) OS & Application Installation, 1) OS Features & Utilities, 1) Command Line ...13Decks367Flashcards11Learners -
AWS Certified Developer - Associate (Exam Pro)
AWS Certified Developer - Associate (Exam Pro)
By: Carlos Eduardo Perez Mendoza
Elastic Beanstalk (EB), Elastic Container Service (ECS) / Fargate, X-Ray ...30Decks807Flashcards392Learners -
CTS-D
CTS-D
By: Travis Stefl
Communicating Design Intent, Ergonomics in AV Design, Visual Principles of Design ...17Decks866Flashcards28Learners -
CSX-F - Cyber Security Fundamentals
CSX-F - Cyber Security Fundamentals
By: Daniel Fai
Section 1: Cybersecurity Introduction and Overview, Section 2: Cybersecurity Concepts, Section 3: Security Architecture Principles ...6Decks144Flashcards74Learners -
Advanced Computer Networks
Advanced Computer Networks
By: Hannah Foley
Transport Layer, Application Layer, Network Security3Decks306Flashcards1Learner -
Certified Kubernetes Administrators Certification (CKA)
Certified Kubernetes Administrators Certification (CKA)
By: Collin Sanford
Core Concepts, Scheduling, Logging and Monitoring ...8Decks220Flashcards16Learners -
Comptia Security+ Personal
Comptia Security+ Personal
By: Xaris A
Section 1: Overview of Security, Section 2: Malware, Section 3: Malware Infections ...9Decks418Flashcards1Learner