Learn Enterprise Computing
Study Enterprise Computing using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Professional Machine Learning Engineer Certification
Professional Machine Learning Engineer Certification
By: Boban Djordjevic
Tensorflow on Google Cloud, Feature Stores, Machine Learning in the Enterprise...10Decks185Flashcards16Learners -
Sec+
Sec+
By: Zach Harvey
Ports and protocols, Social Engineering, Attack types...37Decks577Flashcards3Learners -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
1.1 Social Engineering, 1.2 Attack Types, 1.3 Application Attacks...35Decks722Flashcards36Learners -
(6) CompTia Security+ SY0-601 Definitions
(6) CompTia Security+ SY0-601 Definitions
By: Maciej Węgrzynowski
1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application Attacks...47Decks1,691Flashcards32Learners -
Security 601
Security 601
By: Marlon M
1.1 Social Engineering Techniques, 1.2 Malware Types, 1.3 Application Attacks...16Decks385Flashcards1Learner -
CCSK Practice Tests - CSA Security Guidance v4
CCSK Practice Tests - CSA Security Guidance v4
By: Chris Nadeau
Domain 1: Cloud Computing Concepts and Architectures, Domain 2: Governance and Enterprise Risk Management, Domain 3: Legal Issues, Contracts, and Electronic Discovery...16Decks329Flashcards27Learners -
ag-Cybersecurity Bootcamp Study Aid
ag-Cybersecurity Bootcamp Study Aid
By: Anti Gondu
1.1_ Cybersecurity Mindset, 1.2_ Surveying Cyberspace, 1.3_ Certifications and Security+...55Decks1,358Flashcards8Learners -
Study Guide SY0-601
Study Guide SY0-601
By: Dakota Edmunds
1.1 Compare and contrast different types of social engineering techniques., 1.5 Explain Different Threat Actors, Vectors And Intelligence Sources, 1.2 Given a scenario, analyze potential indicators to determine the type of attack...20Decks620Flashcards169Learners -
Reading Word
Reading Word
By: Fatih Özdemir
Fallout 4 Trailer Lets Waiting Fans Exhale, Thomas A. Edison, Enzo Ferrari...77Decks517Flashcards2Learners -
System Integration
System Integration
By: Phillip Eismark
Basics about system integration, Data Files and Serialization, Interfaces, Contracts and Protocols...13Decks145Flashcards6Learners -
Comptia
Comptia
By: Russell Davis
Social Engineering, Determine type of attack via indicators, Application Attacks...35Decks1,194Flashcards27Learners -
AIS
AIS
By: angela rullo
Confidentiality and privacy ( Topic 5), Auditing computer-based information systems ( T6), Revenue Cycle ( Topic 7 )...12Decks530Flashcards6Learners -
CCSK v4 flashcards
CCSK v4 flashcards
By: Mohammed Al-Meshari
Domain 1 - Cloud Computing Concepts and Architectures, Domain 2 - Governance and Enterprise Risk Management, Domain 3 - Legal Issues, Contracts and E-discovery...11Decks238Flashcards10Learners -
MIS 2000
MIS 2000
By: Shaun Moore
Chapter 1: Information Systems in Business, Chapter 2: Computers and Their Business Application, Chapter 3: Data and Business Intelligence...13Decks468Flashcards1Learner -
Security +
Security +
By: Ben Moore
overview of Security, Threat Intelligence and Sources, Attack Frameworks...32Decks669Flashcards1Learner -
INF2004F 2022
INF2004F 2022
By: Julia Rose 🌹
WEEK 2 TRANSACTION PROCESSING AND ENTERPRISE RESOURCE PLANNING SYSTEMS, WEEK 3 : COMPUTER FRAUD, WEEK 4: CONTROL & ACCOUNTING IS...11Decks111Flashcards2Learners -
Security + Messer
Security + Messer
By: Blayne Ehrenzeller
1.1 - Social Engineering, 1.2 - Attack Types, 1.3 - Application Attacks...24Decks622Flashcards1Learner -
arqui
arqui
By: Diego Emanuel Civini
Atributos de calidad, Estilos arquitectonicos, Web y REST...7Decks111Flashcards3Learners -
Comptia SEC+
Comptia SEC+
By: Shawn Mosby
Section 2.2 Virtualization and Cloud Computing Concepts, Section 2.3 Secure Application development, deployment, and automation concepts, Section 2.4 Authentication and Authorization Design concepts...27Decks1,865Flashcards12Learners -
MIS
MIS
By: Lara Ziegler
Task 14 Sarker et al. Managing Employees Use of Mobile Technologies to Minimise work life balance impacts, ● ● Lessons for and from Digital Workplace Transformation in Times of Crisis - Sundermeier (2022), Artificial Intelligence in the real world – Harvard Business review...32Decks618Flashcards11Learners -
Accounting Information System
Accounting Information System
By: Diep Khac
1. Accounting Information System, 2. Overview of Transaction Processing and Enterprise Resource Planing Systems., 3. System Documentation Techniques...19Decks191Flashcards16Learners -
HW-Cloud
HW-Cloud
By: Emily Mena Terrero
HW_HCIA-Cloud Service V3.0 Course, Practice test questions, HCIA v.3.5 _ Compute_Cloud_Services...19Decks449Flashcards2Learners -
NETW-190 2nd Half Chapters
NETW-190 2nd Half Chapters
By: George Joseph
CHAPTER 7: Windows 7 Security Features, CHAPTER 8: Networking, CHAPTER 9: User Productivity Tools...8Decks249Flashcards3Learners -
Learning Goals MIS
Learning Goals MIS
By: Johannes Stoffel
Tutorial 1 Mastering three Worlds of IT, System Aquisition & Development & The Future of Jobs, The impact of IT on organizations and markets & IT Fashions...9Decks112Flashcards6Learners -
Grundlagen der IT- und ERP-Systeme
Grundlagen der IT- und ERP-Systeme
By: Max Mustermann
Lektion 1 - Grundlagen zur IT-Unternehmensarchitektur, Lektion 2 - Bestandteile einer erfolgreichen IT-Unternehmensarchitektur, Lektion 3 - Informationssicherheit...6Decks104Flashcards1Learner -
BEC - IT Fundamentals & Systems
BEC - IT Fundamentals & Systems
By: Tired Pup
Data, Software, & Databases, Hardware, Transaction Processing...9Decks199Flashcards2Learners -
2.0 Architecture and Design
2.0 Architecture and Design
By: Justin Doring
2.1 Explain the importance of security concepts in an enterprise environment, 2.2 Summarize virtualization and cloud computing concepts, 2.3 Summarize secure application development, deployment, and automation concepts...8Decks257Flashcards3Learners -
FAR
FAR
By: Matt Bennett
Financial Reporting, Financial Accounting Conceptual Framework and an Introduction to Financial Reporting, Structure of an Income Statement...33Decks723Flashcards5Learners -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types...41Decks1,670Flashcards24Learners -
Information Systems in E-Business & Online Commerce
Information Systems in E-Business & Online Commerce
By: M K
Lecture 1 (Role of IS in E-Business & Online Commerce), Lecture 2 (No-code & Low-code platforms), Lecture 4 (Information Systems Complexity and Enterprise Architecture)...9Decks97Flashcards1Learner