Learn Digital Forensic
Study Digital Forensic using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Englisch
Englisch
By: Michelle Göppinger
General Forensics, Digital Forensic, Definitionen ...4Decks346Flashcards2Learners -
CySA+ CSO-003
CySA+ CSO-003
By: Mason Fielden
Threat Intelligence Sharing, Classifying Threats, Network Forensics ...11Decks323Flashcards1Learner -
Forensic Science
Forensic Science
By: Clodagh cultra
Context and history, Trace evidence analysis, Polymers and fibres ...12Decks395Flashcards1Learner -
Security + 601
Security + 601
By: Sean Suga
Security+ 601 Acronyms, Lesson 3: Performing Security Assessments, Lesson 4: Identifying Social Engineering and Malware ...13Decks854Flashcards20Learners -
2_Security+ Study Guide book
2_Security+ Study Guide book
By: Rebecca Speirs
1 Today's Security Professional, 2 Cybersecurity Threat Landscape, 3 Malicious Code ...17Decks2,463Flashcards1Learner -
Security+
Security+
By: Karin Mayville
Acronyms, 1 - Today's Security Professional, 2 - Cybersecurity Threat Landscape ...19Decks487Flashcards12Learners -
CompTia Security+ SY0-601 Definitions
CompTia Security+ SY0-601 Definitions
By: Kiki's Kastle
1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application Attacks ...47Decks1,691Flashcards842Learners -
Exam 13 September
Exam 13 September
By: Figen Karadogan
What is Cyber Security?, Week 1 - cyber security vocabulary, Week 2- assets, vulnerabilities, threats and attacks. ...21Decks316Flashcards1Learner -
Study CompTia SY0-601
Study CompTia SY0-601
By: J Klug
Must know Items, Security+ Acronyms, Ports to Service ...24Decks746Flashcards12Learners -
CCT-121
CCT-121
By: Joshua Tharrington
Cengage Chapter 1 - Understanding the Digital Forensics Profession and Operations, Cengage Chapter 2 - The Investigator's Office and Laboratory, Cengage Chapter 3 - Data Acquisition ...15Decks313Flashcards2Learners -
Digital Evidence, computer Crime.
Digital Evidence, computer Crime.
By: Makponse Yamonche
Chapter 1: Foundations of Digital Forensics, Language of Computer Crime Investigation, Chapter 3 : Digital Evidence in the Coutroom ...5Decks61Flashcards7Learners -
Security+ SY0-601
Security+ SY0-601
By: David Wartman
1.0 Acronyms, 1.1 Social Engineering Techniques, 1.2 Malware Types ...37Decks832Flashcards399Learners -
Wall prep
Wall prep
By: Lhasa Odessa
CSS Attacks, Directory Commands, Frye vs Daubert ...11Decks270Flashcards1Learner -
FSC300
FSC300
By: Emily Love
Photography: Intro, History, Basic Camera Function, Photography: Digital, Lenses and Exposure, Fingerprint History and Pioneers ...11Decks461Flashcards1Learner -
1_Security+ Exam Essentials
1_Security+ Exam Essentials
By: Rebecca Speirs
1 Today's Security Professional, 2 Cybersecurity Threat Landscape, 3. Malicious code ...17Decks279Flashcards1Learner -
CyberOPS
CyberOPS
By: Chris Northrup
Module 1, Module 2, Module 3 ...20Decks473Flashcards11Learners -
CS449 Exam 2
CS449 Exam 2
By: Geno Brown
The Discipline of Internet Forensics, Bruce Schneier on Future Digital Threats, A Protocol Layer Survey of Network Security ...6Decks74Flashcards1Learner -
Computer Forensics
Computer Forensics
By: Anna Speigner
Book One-Chapter One, Book One-Chapter Two, Book One-Chapter Three ...19Decks219Flashcards20Learners -
(6) CompTia Security+ SY0-601 Definitions
(6) CompTia Security+ SY0-601 Definitions
By: Maciej Węgrzynowski
1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application Attacks ...47Decks1,691Flashcards32Learners -
UOFG_CYBER_SECURITY
UOFG_CYBER_SECURITY
By: michal wozniak
Lecture 1 - Introduction, Lecture 2 - Networks, Lecture 3 - Access Control Basics ...18Decks236Flashcards1Learner -
Security+
Security+
By: Gary Hartzell
Threats, Offensive Security, Cloud ...10Decks90Flashcards1Learner -
Sec+
Sec+
By: Zach Harvey
Ports and protocols, Social Engineering, Attack types ...37Decks577Flashcards3Learners -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
1.1 Social Engineering, 1.2 Attack Types, 1.3 Application Attacks ...35Decks722Flashcards25Learners -
Raj CompTIA Security+ Flashcards
Raj CompTIA Security+ Flashcards
By: Raj Jagannathan
12A - Incident Response (Analysis), 12B - Digital Forensics (Acquisition), 12C - Data Sources (Application and Endpoint logs) ...9Decks137Flashcards1Learner -
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)
By: Alex valentine
Malware and Indicators of Compromise, Attacks, Threat Actors ...29Decks412Flashcards6Learners -
Crime Scene Science
Crime Scene Science
By: Amber Foulkes
Types of bias (?), Legislation Associated With Forensics, Role of FAO, CSI and FSR ...15Decks161Flashcards1Learner -
Sec+ 601 Practice Questions
Sec+ 601 Practice Questions
By: Kris G
Lesson 1: Comparing Security Roles and Security Controls, Lesson 2: Explaining Threat Actors and Threat Intelligence, Lesson 3: Performing Security Assessments ...21Decks305Flashcards150Learners -
Comptia
Comptia
By: Russell Davis
Social Engineering, Determine type of attack via indicators, Application Attacks ...35Decks1,194Flashcards27Learners -
CPCI
CPCI
By: Village Fitness
Intro Into Criminal Investigations, Case Management, Documenting Investigations ...27Decks330Flashcards2Learners -
Security+
Security+
By: Jonathan Russial
Chapter 1 - General Concepts, Chapter 2 - Threat Landscape, Chapter 3 - Malicious Code ...20Decks650Flashcards1Learner