Learn Malware
Study Malware using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
COMP47380_MalwareAdvanced
COMP47380_MalwareAdvanced
By: Yves Sturzenegger
01 - Windows OS, 02 - Reverse Engineering, 03 - x86 Assembly Code ...9Decks199Flashcards37Learners -
Security Plus
Security Plus
By: Josh Parker
Mastering the Basics of Security, Exploring Control Types and Methods, Understanding Basic Network Security ...19Decks555Flashcards263Learners -
1102
1102
By: Hannah D.
Linux Commands, Exam Items, Windows Commands ...4Decks182Flashcards3Learners -
IT - Sicherheit
IT - Sicherheit
By: Denise Müller
Kryptographie, Attacken, Computer Network ...10Decks199Flashcards6Learners -
Crest CPSA
Crest CPSA
By: A Red
Acronyms, Ports (Common), Ports (Malware) ...4Decks172Flashcards18Learners -
Security+
Security+
By: John B
RAIDs, Study Questions (1 - 50), Study Questions (51 - 100) ...14Decks459Flashcards39Learners -
Security + NET Attacks
Security + NET Attacks
By: Edwin P
Security + CIAT QUESTIONS, Security + NET ATTACKS, Security + Password Attacks ...13Decks260Flashcards1Learner -
COMP41650_Malware
COMP41650_Malware
By: Yves Sturzenegger
1) Threat Landscape, Malware Types, Lab Setup & Static Analysis, 2) Blackboxing, Packers and Internet Resources, 3) Rootkits, Web Threats and Internet Forensics ...5Decks116Flashcards47Learners -
Security+
Security+
By: null void
Fundamentals of Security, Threat Actors, Social Engineering ...6Decks160Flashcards1Learner -
CEH v10
CEH v10
By: Nicholas Phelps
Module 1 - Intro to Ethical Hacking, Module 2 - Footprinting and Reconnaissance, Module 3 - Scanning Networks ...25Decks772Flashcards1,049Learners -
CEH v12 Chpt Rvw Qs
CEH v12 Chpt Rvw Qs
By: Nica *
CH 3 - Security Foundations, CH 0 - Intro Assessment, CH 4 - Footprinting & Reconnaissance ...15Decks352Flashcards58Learners -
CSF Finals
CSF Finals
By: Justin Ooi
Cryptography, Access Control, Steganography ...13Decks161Flashcards1Learner -
MTA Security 98-367
MTA Security 98-367
By: Kaya Hampton
Chapter 1 - Intro, Chapter 2 - Malware2Decks40Flashcards22Learners -
Cyber Security
Cyber Security
By: Thomas Faddegon
Practice Test 1, Social Engineering, Malware ...12Decks249Flashcards1Learner -
SEC575: Mobile Device Security
SEC575: Mobile Device Security
By: Mark Good
Dynamic Analysis, Mobile Penetration Testing, Device Architecture and App Interaction ...5Decks49Flashcards10Learners -
Comptia Security+ Personal
Comptia Security+ Personal
By: Xaris A
Section 1: Overview of Security, Section 2: Malware, Section 3: Malware Infections ...9Decks418Flashcards1Learner -
Informática Para Concursos em geral
Informática Para Concursos em geral
By: Rafael Matias
Redes de Computadores /Modo De transmissão/Definiçao De Rede, Redes De Computadores/Arquiteura De Redes /Topologia De Redes, Redes De Computadores /Meios De Transmissão ...51Decks3,603Flashcards15Learners -
07 - Spring 2019 - CET-2830C_Information Security
07 - Spring 2019 - CET-2830C_Information Security
By: Brian Smith
Chapter 01 – Quiz Introduction to Security, Chapter 02 Quiz – Malware and Social Engineering Attacks, Chapter 03 Quiz – Basic Cyprography ...7Decks147Flashcards345Learners -
EC-COUNCIL CEH
EC-COUNCIL CEH
By: Isham Mohamed
Cryptography, Common, Cloud Computing ...16Decks257Flashcards12Learners -
SEC +
SEC +
By: david Lewis
OVERVIEW OF SECURITY, Threat Intelligence and Sources, Threat Hunting ...7Decks85Flashcards1Learner -
Cybersecurity
Cybersecurity
By: Zack Robin
Monitoring and Auditing, Planning for the worst, Facilities and Physical Security ...22Decks883Flashcards5Learners -
CS6035 - Intro to Info Sec
CS6035 - Intro to Info Sec
By: Michael Mroczka
P1L1: Security Mindset, P1L2: Software Security, P1L3: Operating Systems ...23Decks715Flashcards230Learners -
C702 Forensics and Network Intrusion
C702 Forensics and Network Intrusion
By: Krystal Hughes
Hard Disks & File Systems, CHFI Online Study Notes, Data Acquisition & Duplication ...13Decks650Flashcards10Learners -
Module J: CND
Module J: CND
By: Harold Quang
J01: Port Scanners (PE), J02: Packet Analysis (PE), J03: Packet Analysis II (PE) ...16Decks305Flashcards17Learners -
CompTIA Security+
CompTIA Security+
By: Josef Mengele
Chapter 1 Measuring and Weighing Risk, Chapter 2 Monitoring and Diagnosing Networks, Chapter 3 Understanding Devices and Infrastructure ...12Decks378Flashcards231Learners -
C178 - Security+ SYO-601
C178 - Security+ SYO-601
By: Jonathan Maner
Section 1: Security Overview, Section 2: Malware, Section 3: Malware Infections ...30Decks635Flashcards4Learners -
ITT
ITT
By: Luka Drifts
OSI Modell, Malware, Informationssicherheit, PC Hardware ...11Decks167Flashcards3Learners -
Security +
Security +
By: Ben Moore
overview of Security, Threat Intelligence and Sources, Attack Frameworks ...32Decks669Flashcards1Learner -
Computer Science
Computer Science
By: Libby Simpson
Necessary vocan for describing programming, CPU and Memory, Hardware and Software ...7Decks157Flashcards1Learner -
A+ 1002
A+ 1002
By: Unknown Unknown
Physical Security, Logical Security, Wireless Security ...29Decks564Flashcards3Learners