Learn Malware
Study Malware using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Cybersecurity
Cybersecurity
By: Christopher Signorino
Networking, Intel, Forensics ...7Decks93Flashcards6Learners -
CompTIA Security+
CompTIA Security+
By: Rene Vargas
Chapter 2 - Monitoring Networks, Chapter 1 - Measuring and Weighing Risk, Chapter 3 - Understanding Devices and infrastructure ...12Decks292Flashcards51Learners -
CompTIA A+ 1002
CompTIA A+ 1002
By: Kevin P
1) OS & Application Installation, 1) OS Features & Utilities, 1) Command Line ...13Decks367Flashcards11Learners -
ssr
ssr
By: Chiara F
Politiche di sicurezza, Malware, Attacchi al modello ISO/OSI e ai servizi ...5Decks72Flashcards1Learner -
CompTIA A+ 1002 Concepts
CompTIA A+ 1002 Concepts
By: Mr. Victor B.
Basic Linux Commands, Microsoft Command Line Tool, The Windows Control Panel ...27Decks344Flashcards3Learners -
COMP 156 Computer Concepts
COMP 156 Computer Concepts
By: G M
What's In A Computer? (Week 2), Binary + Representation of Info (Week 3), Hexidecimal, CPU, and the Toy Computer (Week 4) ...12Decks381Flashcards22Learners -
Comptia A+ 1101
Comptia A+ 1101
By: Marco H
Malware, Linux, MAC OS ...12Decks70Flashcards2Learners -
ICT
ICT
By: Amber Brown
Safety Risks, Personal Data, E-Safety ...6Decks49Flashcards1Learner -
Security +syo-501
Security +syo-501
By: Willie Fair
Malware And Indicators Of Compromise, Attacks, Threat Actors ...5Decks111Flashcards6Learners -
CompTIA A+ Core 2 (220-1102)
CompTIA A+ Core 2 (220-1102)
By: John Vargas
Operating System 3 revision, Security, Software and Trouble Shooting ...51Decks1,075Flashcards18Learners -
Cyber security
Cyber security
By: Pa Broon
DES, AES, RSA, Cryptography, Kerberos ...10Decks74Flashcards6Learners -
Data Security
Data Security
By: Tatiana Marin
CH-7 Industrial Espionage, CH-6 Techniques Used by Hackers, CH-5 Malware ...5Decks143Flashcards1Learner -
Comptia A+
Comptia A+
By: Stephan Saulsbury
Windows Commands, Linux commands, Threats and Vulnerabilities ...6Decks245Flashcards1Learner -
CS407 Computer Security
CS407 Computer Security
By: Caroline Mckinlay
Week 6 - Network Secuty Defence, Week 7 - Web Security and Malware, Week 8 - Human Aspects Of Computer Security ...4Decks251Flashcards2Learners -
IST
IST
By: Dinara Dammika
Summary, Encryption, Security ...12Decks296Flashcards1Learner -
Security+ GCGH Chapter 6, Comparing Threats, Vulnerabilities, and common attacks
Security+ GCGH Chapter 6, Comparing Threats, Vulnerabilities, and common attacks
By: StuffOffYouStuff .
Understanding Threat Actors, Blocking Malware and Other Attacks2Decks20Flashcards1Learner -
CompTIA A+
CompTIA A+
By: Sergey Pigach
WiFi Standards, TCP ports, CAT Standards ...20Decks193Flashcards1Learner -
Sec+ Study Deck
Sec+ Study Deck
By: Destiny Lester
Fundamentals Of Security, Threat Actors, Physical Security ...7Decks208Flashcards1Learner -
CWO
CWO
By: Alex Nelson
Enterprise, Weaponizing, Incident Handling ...6Decks185Flashcards2Learners -
Security+ SY0-601
Security+ SY0-601
By: David Wartman
1.0 Acronyms, 1.1 Social Engineering Techniques, 1.2 Malware Types ...37Decks832Flashcards393Learners -
BTEC IT
BTEC IT
By: Jade Hickinbotham
Internal and External Threats, Mal. Ware, Networks ...9Decks120Flashcards4Learners -
SYO 501 1.0 Threats, Attacks and Vulnerabilities
SYO 501 1.0 Threats, Attacks and Vulnerabilities
By: Robert Hernandez
1.1 Malware, 1.2 Types of attacks - Social Engineering, 1.2 Types of Attacks - Application/service attacks3Decks30Flashcards2Learners -
COMPTIA - Sec+ CertMaster
COMPTIA - Sec+ CertMaster
By: Rachelle Pestanas
1.1 Compromise & Malware, 1.2 Compare and contrast types of attacks, 1.3 Explain threat actor types and attributes ...4Decks230Flashcards8Learners -
Meu CEH
Meu CEH
By: FabS Pam
Module 1 - Intro to Ethical Hacking, Module 2 - Footprinting and Reconnaissance, Module 3 - Scanning Networks ...22Decks366Flashcards28Learners -
IT-Sicherheit
IT-Sicherheit
By: Lucas Lahr
Informationssicherheit: Grundbegriffe und Definitionen, Authentifizierung, Passwörter ...24Decks281Flashcards1Learner -
CompTia A+ Software Part 2
CompTia A+ Software Part 2
By: Jacob McFarland
Networking, Network Hardware, Ethernet ...32Decks304Flashcards22Learners -
Security+ 101
Security+ 101
By: Mishi Learns
Social Engineering, Malware, Application Attacks ...6Decks179Flashcards1Learner -
ITSY-1300
ITSY-1300
By: Chris Morgan
Chapter 1: Introduction to Security, Chapter 2: Threat Management and Cybersecurity Resources, Chapter 3: Attacks Using Malware ...4Decks200Flashcards1Learner -
Computer Science
Computer Science
By: Logan Kinnaird
Cybersecurity, Malware2Decks20Flashcards1Learner -
InfsecMeme
InfsecMeme
By: Unknown Unknown
Gesetzestexte, Sicherheitsvokabular, Angriffe und nicht-technische Angriffe ...12Decks101Flashcards3Learners