Learn Application Security
Study Application Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Cyber
Cyber
By: Bob OBrien
Section 1: Understanding Security Fundamentals, Section 2: Implementing Public Key Infrastructure, Section 3: Investigating Identity and Access Management ...12Decks489Flashcards4Learners -
CompTIA Security+ (SY0-701)
CompTIA Security+ (SY0-701)
By: John Vargas
General Security Concepts: Examine Security Controls Category, General Security Concepts: Examine Security Control Types, General Security Concepts: Examine the Principle of Security ...122Decks1,600Flashcards12Learners -
AWS - Dev Associate
AWS - Dev Associate
By: Rebecca Preib
Name that AWS Service, 4. IAM + AWS CLI, 5. EC2 ...22Decks520Flashcards16Learners -
Amazon Web Services (Whitepaper)
Amazon Web Services (Whitepaper)
By: Bari Ryczek
*Cloud Computing Models*, *Cloud Computing Deployment Models*, *AWS Services & Application Access* ...29Decks274Flashcards6Learners -
Comptia Security + SY0-601
Comptia Security + SY0-601
By: Kerry Gambrel
Chapter 1 Threats, Attacks, and Vulnerabilities, Chapter 2 Type of Attack Indicators, Chapter 3 Application Attack Indicators ...12Decks329Flashcards11Learners -
Civil Litigation
Civil Litigation
By: Meg Cox
General Matters (Syllabus 1)., Limitation (Syllabus 2), Pre-action Conduct (Syllabus 3). ...24Decks1,228Flashcards93Learners -
Comptia Security+
Comptia Security+
By: Cristi Náme
Attack Types, Application Attacks, Network Attacks ...8Decks169Flashcards1Learner -
Security+ GCGH Chapter 7, Protecting Against Advanced Attacks
Security+ GCGH Chapter 7, Protecting Against Advanced Attacks
By: StuffOffYouStuff .
Comparing Common Attacks, Summarizing Secure Coding, Identifying Application Attacks3Decks60Flashcards1Learner -
ITN 260
ITN 260
By: Joe Schmoe
Chapter 1 - introduction To Security, Chapter 15 - Risk Mitigation, Chapter 8 - Wireless Network Security ...15Decks567Flashcards2Learners -
Aye Dub S Ess AA Exam
Aye Dub S Ess AA Exam
By: Savvy Davis
Advanced VPC Networking, VPC Basics, AWS Fundamentals ...16Decks546Flashcards1Learner -
DTDDB 2021 SEM <3
DTDDB 2021 SEM <3
By: Julie Nielsen
Introduction to computational thinking, What is an Information System: Digital Technologies in a Global Society, How Businesses Use Digital Technologies ...11Decks235Flashcards8Learners -
Principles of Computer Networks
Principles of Computer Networks
By: Kristofer Fonagy
Chapter 1 - Network Models, Chaper 2 - Cabling and Topology, Chapter 3 - Ethernet Basics ...12Decks321Flashcards54Learners -
Patent Bar Revise - TP
Patent Bar Revise - TP
By: Terry Parks
Patent Bar: The Law, Claim Drafting: 35 USC 112, Review Question Points ...27Decks746Flashcards3Learners -
Net+
Net+
By: Brooke Kohutka
Compare And Contrast OSI Model Layers, Configure SOHO Networks, Deploying Ethernet Cabling ...18Decks434Flashcards1Learner -
ethical hacking
ethical hacking
By: Barbara Workman
Information Security Fundamentals, Ethical Hacking Fundamentals, Information Security Threats and Vulnerability Assessment ...13Decks222Flashcards92Learners -
Information Security
Information Security
By: Hanan Timraz
General Security Concepts, Cryptography, Key Management ...13Decks152Flashcards6Learners -
3. Architecture and Design
3. Architecture and Design
By: Matthew Schroeder
3.1 Use cases and purpose for frameworks, best practices, and secure configuration guides., 3.2 Implement secure network architecture concepts, 3.3 Implement secure systems design. ...8Decks124Flashcards1Learner -
ISM v5
ISM v5
By: Brock Terry
Module 1: Introduction to Information Storage, Module 2: Business Drivers of Digital Transformation, Module 3: Modern Data Center Environment (Compute + Applications) ...32Decks785Flashcards1Learner -
Computer Information Systems 5620
Computer Information Systems 5620
By: Yvette Amaral
Chapter 1: Information Systems in Global Business Today, Chapter 2: Global E-business and Collaboration, Chapter 3: Information Systems, Organzations, and Strategy ...14Decks624Flashcards735Learners -
CCSK v4 flashcards
CCSK v4 flashcards
By: Mohammed Al-Meshari
Domain 1 - Cloud Computing Concepts and Architectures, Domain 2 - Governance and Enterprise Risk Management, Domain 3 - Legal Issues, Contracts and E-discovery ...11Decks238Flashcards10Learners -
GCP Developer
GCP Developer
By: Maria A
Kubernetes & GKE, Security and Identity, GCP Basics ...12Decks166Flashcards1Learner -
Pharm 151 - self inflicted lobotomy
Pharm 151 - self inflicted lobotomy
By: Matthew Miller
Week 1, Week 2 - privacy and security, Week 3 - Foundation and Application of Health Informatics ...8Decks245Flashcards1Learner -
igcse ict
igcse ict
By: Robert Yeo
Section 1 - Types and components of computer systems, Section 2 - Input and output devices, Section 3 - Storages devices and media ...10Decks326Flashcards63Learners -
Dynatrace
Dynatrace
By: Hazaq Naeem
Introduction - Managed, Introduction - SaaS, Infrastructure Monitoring ...10Decks93Flashcards12Learners -
05 - Computer Security
05 - Computer Security
By: Gabriel Miki
x86 - Theory, Buffer Overflow - Theory, Format String Theory ...10Decks237Flashcards1Learner -
CYBR 158
CYBR 158
By: Lateefat Alimi
MOD 7 - Physical Security, MOD 1 - Security Concepts and Governance, MOD 8 - Midterm ...15Decks378Flashcards1Learner -
Devasc module 5
Devasc module 5
By: Javier Hernández
Chapter 5, Chapter 4, Chapter 6 Application deployment and security3Decks130Flashcards1Learner -
Civil Litigation
Civil Litigation
By: Estelle Chambers
Costs orders, Costs, Pre-Action Conduct ...14Decks286Flashcards6Learners -
FD1
FD1
By: Helen Lapington
Available Forms of IP, PA 1 - Patentable Inventions, PA 2 - Novelty ...86Decks1,156Flashcards10Learners -
Salesforce Advanced Administrator Exam Prep
Salesforce Advanced Administrator Exam Prep
By: David Veras
Security And Access, Objects And Applications, Auditing and Monitoring I ...10Decks112Flashcards6Learners