Learn Malware
Study Malware using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Y7 revision
Y7 revision
By: Adam Knowlton
Science Biology orginisation, Science Biology reproduction, Science chemistry matter ...21Decks197Flashcards2Learners -
Computer science
Computer science
By: B Weston 10
CPU components, MEMORY, Images ...10Decks72Flashcards1Learner -
Cyber
Cyber
By: William Reese
Acronym, Ecosystem (Companies and what they do), Cybersecurity Attack Types ...51Decks1,210Flashcards1Learner -
Security+ 701
Security+ 701
By: Justus Walker
SEC+ Practice Test Questions (Jason Dion), CompTIA SYO-701 (ET) Test, Fundamentals of Security ...28Decks513Flashcards1Learner -
COMPUTER SCIENCE REVAMPED IGCSE
COMPUTER SCIENCE REVAMPED IGCSE
By: Unknown Unknown
Sensors, ASCII and Unicode, Protocols and DNS ...21Decks135Flashcards4Learners -
A+ Core 2
A+ Core 2
By: Jamin Camp
Management Console, Operating Systems, Browser Security ...8Decks116Flashcards1Learner -
BTEC IT Compnent 3
BTEC IT Compnent 3
By: George Derrick
Setting Up Ad Hoc Networks, Network Security And Performance, Issues Afftecting Network Availability ...7Decks32Flashcards2Learners -
CISM Exam Prep
CISM Exam Prep
By: Bryan Scott
Information Security Governance, Business Continuity & Security, Incident Response ...20Decks186Flashcards1Learner -
CompTIA Security+ SY0-501 - Based on Objectives
CompTIA Security+ SY0-501 - Based on Objectives
By: Tánh Phạm
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards499Learners -
Security
Security
By: Ted Mosby
Cryptography, Crypto Protocols, Software Security ...10Decks141Flashcards1Learner -
Cyber Security
Cyber Security
By: NS CodeWriter
Terms, Malware, General ...7Decks67Flashcards3Learners -
CompTIA A+ Core 2
CompTIA A+ Core 2
By: Birdman Jetson
1.1 Identify Basic Features of Microsoft Windows Editions, 1.2 Microsoft Command Line Tool, 1.3 Use Features & Tools of Microsoft Windows 10 Operating System (OS) ...35Decks506Flashcards5Learners -
Kierra Security
Kierra Security
By: Kierra Stephens
Ports, Access Controls, Cryptography ...6Decks85Flashcards2Learners -
Security+
Security+
By: Paul Rosario
Acronyms, Chapter 1 - Mastering Security Basics, Chapter 2 - Understanding Identity and Access Management ...5Decks492Flashcards2Learners -
CompTIA Security+ SY0-501
CompTIA Security+ SY0-501
By: L PUA
Glossary of Terms Page 1, Glossary of Terms Page 2, Glossary of Terms Page 3 ...134Decks913Flashcards6Learners -
Computing - Organised
Computing - Organised
By: Zayd IMRAN
Computer Systems - Translators, Data Representation - Logic Gates, Data Representation - Units ...22Decks361Flashcards1Learner -
COSC362
COSC362
By: Hayley Krippner
Lecture 1: Course introduction, Lecture 2: Course overview (key definitions), [TODO] Lecture 3: Number Theory and Finite Fields -- Discrete Mathematics (basic number theory, modular arithmetic, groups and fields, boolean algebra) ...21Decks1,305Flashcards3Learners -
CEH
CEH
By: Alex Santiago
MOD 16 - Hacking Wireless, MOD 17 - Hacking Mobile Platforms, MOD 18 - Iot and OT Hacking ...13Decks164Flashcards1Learner -
Core 2
Core 2
By: Andrew Boos-Hartig
Acronyms, Steps For malware removal2Decks225Flashcards1Learner -
IMT4113 Technology
IMT4113 Technology
By: Lars Veggeland
Intro, Cryptology: intro, Cryptology: Symmetric ...15Decks94Flashcards8Learners -
A Computer Science : Unit 1
A Computer Science : Unit 1
By: ww ww
1.1.1 Architecture Introduction, 1.1.2 Von Neumann Architecture, 1.1.3 Factors affecting CPU performance ...26Decks253Flashcards2Learners -
CompTIA Security Tests
CompTIA Security Tests
By: Hyun Rim
CH01 Overview of Security, CH02 Malware, CH03 Malware Infection ...56Decks2,102Flashcards1Learner -
Computing
Computing
By: Ethan Turner
Computer Systems and CPU, Von Neumann Architecture, The Fetch-Decode-Execute Cycle ...19Decks233Flashcards3Learners -
C394
C394
By: Alex Lau
Windows 7, Windows 8, Windows 10 ...20Decks96Flashcards1Learner -
Networking 2
Networking 2
By: Clay Casassa
Malware, Folders, and Printers, Misc, Computer Management ...18Decks111Flashcards10Learners -
QRS A+ Core 2
QRS A+ Core 2
By: Elizabeth Perez
3.0 Software Troubleshooting QRS, 4.0 Operational Proceedures, 1.1 Compare and contrast common operating system types and their purposes. ...24Decks640Flashcards47Learners -
BTEC cybersecurity
BTEC cybersecurity
By: baconblock gt
keywords for ports and malware1Decks30Flashcards2Learners -
Security+
Security+
By: a a
Ports, Hashing Algorithms, Symmetric Encryption ...16Decks167Flashcards3Learners -
Security + 601
Security + 601
By: Carlos Rosado
Attacks, Threats, Vulnerabilities, Malware Variants, Types of Attacks ...18Decks265Flashcards1Learner -
Security +
Security +
By: Blayne Ehrenzeller
Social Engineering and Security Fundamentals, Malware, Password Attacks ...16Decks195Flashcards1Learner