Learn Digital Forensics
Study Digital Forensics using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(25)
Decks
Flashcards
Learners
-
CPCI
CPCI
By: Village Fitness
Intro Into Criminal Investigations, Case Management, Documenting Investigations ...27Decks313Flashcards1Learner -
Major Investigations
Major Investigations
By: Joana Gaspar
Intell, Evaluating intell, The value of intelligence and recap of models/ processes ...9Decks138Flashcards1Learner -
Forensic IT
Forensic IT
By: Sophie Taylor
Digital crimes and digital aided crimes, ACPO and legislation, ethics ...7Decks101Flashcards1Learner -
COMP41660 Live Data Forensics
COMP41660 Live Data Forensics
By: Sunshine Stars
Week 1 - What Is LDF, Week 1 - Introduction to LDF, Week 2 - LDF Documentation & Reporting ...15Decks177Flashcards4Learners -
CySA+ 2023
CySA+ 2023
By: Thomas Hollinghurst
1A. Identify Security Control Types obj 5.3, 1B. Importance of Threat Data and Intelligence obj 1.1, 1.2, 2A. Threats and Threat Actor Types ...15Decks209Flashcards4Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...35Decks546Flashcards19Learners -
Security + SY0-601
Security + SY0-601
By: Alket Shabani
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. Given a scenario, analyze potential indicators associated with network attacks. ...24Decks258Flashcards40Learners -
USNA Cyber
USNA Cyber
By: Kris Medina
Cyber Domain & Pillars of Cyber Security, Risk, Computer Architecture ...30Decks240Flashcards4Learners -
CSC2004: Cyber Security Fundamentals
CSC2004: Cyber Security Fundamentals
By: Jun Xian Lim
Summary: Lecture 13, Intro to Cryptography & Asymmetric Cryptography: Lecture 1, Access Control: Lecture 2 ...11Decks56Flashcards2Learners -
Sec+
Sec+
By: GiGi C.
1.1 social engineering techniques, 1.2 analyze potential indicators to determine the type of attack, 1.3 potential indicators associated with application attacks ...38Decks387Flashcards1Learner -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. ...40Decks663Flashcards1Learner -
Security+ Continuation
Security+ Continuation
By: Wisdom Eke
3.5 Given a scenario, implement secure mobile solutions., 3.6 Given a Scenario, apply Cybersecurity Solutions to the cloud, 3.7 Given a Scenarior, Implement Identity and account management controls ...15Decks463Flashcards1Learner -
CISSP - Domain 7
CISSP - Domain 7
By: Floyd Mayfield
BCP (Business Continuity Plan), Incident Management 8 step lifecycle, Key Terms ...15Decks75Flashcards1Learner -
4.0 Operations and Incident Response
4.0 Operations and Incident Response
By: E. Slate
4.1 Organizational Security, 4.2 Policies / Processes Incident Response, 4.3 Incident Investigation ...5Decks25Flashcards2Learners -
Criminology
Criminology
By: Chloe Wren
W2: Green Criminology, W2: Understanding Crime, W3: Digital Forensics3Decks34Flashcards1Learner -
SOC Analyst HackTheBox Academy Path
SOC Analyst HackTheBox Academy Path
By: Kelly Martin
Introduction to Digital Forensics1Decks58Flashcards1Learner -
Year 2 - University
Year 2 - University
By: Bethany Browring
Fundamental Forensic Techniques, Digital Forensics, Analytical Chemistry3Decks22Flashcards1Learner -
Incident Response
Incident Response
By: Jonathan Nuqui
Incident Response Process, Threat Hunting, Root Cause Analysis ...6Decks43Flashcards1Learner -
Infosec
Infosec
By: Xeroxis Labz
CEH, Digital Forensics, Cryptography3Decks21Flashcards1Learner -
SEC+
SEC+
By: Kevin Watke
1.5: Threat Actors and Vectors, 1.6: Vulnerabilities, 1.7: Security Assessments ...31Decks65Flashcards2Learners -
Percepio Security +
Percepio Security +
By: Beth Hosek
Social Engineering Techniques & Other Attack Types, Implementing Identity and Account Management & AAA Solutions, Physical Security Controls ...12Decks38Flashcards1Learner -
Sec+ -> 4.0 Operations and Incident Response (16%)
Sec+ -> 4.0 Operations and Incident Response (16%)
By: Isabelle S
4.1 - Given a scenario, use the appropriate tool to assess organizational security., 4.2 - Summarize the importance of policies, processes, and procedures for incident response., 4.3 - Given an incident, utilize appropriate data sources to support an investigation. ...5Decks41Flashcards1Learner -
CipherTechs
CipherTechs
By: Nicholas Leask
Governance, Risk & Compliance, Offensive Security Services, Defensive & Managed Services ...5Decks25Flashcards1Learner -
Security+
Security+
By: Anne Leach
1. Malware and IOC, 2. Attacks, 3. Threat Actors ...29Decks66Flashcards1Learner -
Operations and Incident Response
Operations and Incident Response
By: Chauncey Taylor
Secure Baselines, Securing wireless and mobile, Wireless Security settings ...18Decks86Flashcards1Learner