Learn Enterprise Computing
Study Enterprise Computing using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Sec+
Sec+
By: Zach Harvey
Ports and protocols, Social Engineering, Attack types ...37Decks577Flashcards3Learners -
Security 601
Security 601
By: Marlon M
1.1 Social Engineering Techniques, 1.2 Malware Types, 1.3 Application Attacks ...16Decks385Flashcards1Learner -
Reading Word
Reading Word
By: Fatih Özdemir
Fallout 4 Trailer Lets Waiting Fans Exhale, Thomas A. Edison, Enzo Ferrari ...77Decks517Flashcards2Learners -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
1.1 Social Engineering, 1.2 Attack Types, 1.3 Application Attacks ...35Decks722Flashcards18Learners -
Professional Machine Learning Engineer Certification
Professional Machine Learning Engineer Certification
By: Boban Djordjevic
Tensorflow on Google Cloud, Feature Stores, Machine Learning in the Enterprise ...10Decks185Flashcards9Learners -
ag-Cybersecurity Bootcamp Study Aid
ag-Cybersecurity Bootcamp Study Aid
By: Anti Gondu
1.1_ Cybersecurity Mindset, 1.2_ Surveying Cyberspace, 1.3_ Certifications and Security+ ...55Decks1,358Flashcards6Learners -
CCSK v4 flashcards
CCSK v4 flashcards
By: Mohammed Al-Meshari
Domain 1 - Cloud Computing Concepts and Architectures, Domain 2 - Governance and Enterprise Risk Management, Domain 3 - Legal Issues, Contracts and E-discovery ...11Decks238Flashcards10Learners -
Study Guide SY0-601
Study Guide SY0-601
By: Dakota Edmunds
1.1 Compare and contrast different types of social engineering techniques., 1.5 Explain Different Threat Actors, Vectors And Intelligence Sources, 1.2 Given a scenario, analyze potential indicators to determine the type of attack ...20Decks620Flashcards165Learners -
AIS
AIS
By: angela rullo
Confidentiality and privacy ( Topic 5), Auditing computer-based information systems ( T6), Revenue Cycle ( Topic 7 ) ...12Decks530Flashcards5Learners -
Comptia
Comptia
By: Russell Davis
Social Engineering, Determine type of attack via indicators, Application Attacks ...35Decks1,194Flashcards22Learners -
INF2004F 2022
INF2004F 2022
By: Julia Rose 🌹
WEEK 2 TRANSACTION PROCESSING AND ENTERPRISE RESOURCE PLANNING SYSTEMS, WEEK 3 : COMPUTER FRAUD, WEEK 4: CONTROL & ACCOUNTING IS ...11Decks111Flashcards2Learners -
Security +
Security +
By: Ben Moore
overview of Security, Threat Intelligence and Sources, Attack Frameworks ...32Decks669Flashcards1Learner -
NETW-190 2nd Half Chapters
NETW-190 2nd Half Chapters
By: George Joseph
CHAPTER 7: Windows 7 Security Features, CHAPTER 8: Networking, CHAPTER 9: User Productivity Tools ...8Decks249Flashcards3Learners -
MIS 2000
MIS 2000
By: Shaun Moore
Chapter 1: Information Systems in Business, Chapter 2: Computers and Their Business Application, Chapter 3: Data and Business Intelligence ...13Decks468Flashcards1Learner -
Security + Messer
Security + Messer
By: Blayne Ehrenzeller
1.1 - Social Engineering, 1.2 - Attack Types, 1.3 - Application Attacks ...24Decks622Flashcards1Learner -
BEC - IT Fundamentals & Systems
BEC - IT Fundamentals & Systems
By: Tired Pup
Data, Software, & Databases, Hardware, Transaction Processing ...9Decks199Flashcards2Learners -
CCSK Practice Tests - CSA Security Guidance v4
CCSK Practice Tests - CSA Security Guidance v4
By: Chris Nadeau
Domain 1: Cloud Computing Concepts and Architectures, Domain 2: Governance and Enterprise Risk Management, Domain 3: Legal Issues, Contracts, and Electronic Discovery ...16Decks329Flashcards7Learners -
Infosys 110
Infosys 110
By: Macy Watson
Topics 1 - 7, Enteprise Architecture - topic 7, Hardware and Networks ...12Decks166Flashcards2Learners -
MIS
MIS
By: Lara Ziegler
Task 14 Sarker et al. Managing Employees Use of Mobile Technologies to Minimise work life balance impacts, ● ● Lessons for and from Digital Workplace Transformation in Times of Crisis - Sundermeier (2022), Artificial Intelligence in the real world – Harvard Business review ...32Decks618Flashcards10Learners -
Comptia SEC+
Comptia SEC+
By: Shawn Mosby
Section 2.2 Virtualization and Cloud Computing Concepts, Section 2.3 Secure Application development, deployment, and automation concepts, Section 2.4 Authentication and Authorization Design concepts ...27Decks1,865Flashcards11Learners -
FAR
FAR
By: Matt Bennett
Financial Reporting, Financial Accounting Conceptual Framework and an Introduction to Financial Reporting, Structure of an Income Statement ...33Decks723Flashcards4Learners -
Accounting Information System
Accounting Information System
By: Diep Khac
1. Accounting Information System, 2. Overview of Transaction Processing and Enterprise Resource Planing Systems., 3. System Documentation Techniques ...19Decks191Flashcards16Learners -
Learning Goals MIS
Learning Goals MIS
By: Johannes Stoffel
Tutorial 1 Mastering three Worlds of IT, System Aquisition & Development & The Future of Jobs, The impact of IT on organizations and markets & IT Fashions ...9Decks112Flashcards6Learners -
Comptia Security
Comptia Security
By: J Odeyemi
Domain 1 : Security Concepts, Domain 1 : General Security Concepts, Domain 1 :Explain the importance of using appropriate cryptographic solution ...21Decks785Flashcards1Learner -
Grundlagen der IT- und ERP-Systeme
Grundlagen der IT- und ERP-Systeme
By: Max Mustermann
Lektion 1 - Grundlagen zur IT-Unternehmensarchitektur, Lektion 2 - Bestandteile einer erfolgreichen IT-Unternehmensarchitektur, Lektion 3 - Informationssicherheit ...6Decks104Flashcards1Learner -
Information Systems in E-Business & Online Commerce
Information Systems in E-Business & Online Commerce
By: M K
Lecture 1 (Role of IS in E-Business & Online Commerce), Lecture 2 (No-code & Low-code platforms), Lecture 4 (Information Systems Complexity and Enterprise Architecture) ...9Decks97Flashcards1Learner -
Procedures and Policies
Procedures and Policies
By: Jeremy Dowling
IS0001-03 Information Security Plan, QS0001-03: Quality Statement and Principles, QS0002-02: Controlled Document Procedures ...36Decks190Flashcards24Learners -
SYO-601
SYO-601
By: Maria Ouvarova
Social Engineering, Types of Attack, Computing Architecture ...10Decks600Flashcards1Learner -
M362 Frequent Exam Topics
M362 Frequent Exam Topics
By: Amy Barrett
Mobile Computing, Remote Method Invocation, Remote Procedure Calls ...11Decks74Flashcards4Learners -
ACC 401
ACC 401
By: Calvin Shaw
Chapter 1 - Accounting Information Systems: An Overview, Chapter 2 - Overview of Transaction Processing and Enterprise Resource Planning Systems, Chapter 8 - Fraud and Errors ...10Decks278Flashcards1Learner