Learn Network Investigation
Study Network Investigation using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CISSP OSG
CISSP OSG
By: Sad Summertron
Chapter 3: Business Continuity Planning, Chapter 4: Laws, Regulations, and Compliance, Chapter 5: Protecting Security of Assets...19Decks477Flashcards43Learners -
CISSP
CISSP
By: David Caranfa
Risk Management, Controls, BC/DC...27Decks183Flashcards1Learner -
Comp sci paper 1
Comp sci paper 1
By: rani Gurung
1.2 Memory and Storage, 1.3 Computer Networks, 1.4 network security...8Decks113Flashcards1Learner -
CISSP- Old Flashcards
CISSP- Old Flashcards
By: C. Menendez
IS Governance & Risk Mgmt, Access Control, Security Architecture & Design...10Decks205Flashcards5Learners -
Security+
Security+
By: Zoubida Regzal
1.1 Social engineering attacks, 1.2 Malware & common attacks, 1.3 Application attacks...35Decks859Flashcards6Learners -
IT & Data Assurance I (IST293)
IT & Data Assurance I (IST293)
By: Kathryn Cox
Module 1 - Introduction to Security, Module 2: Threat Management & Cybersecurity Resources, Module 4: Endpoint & Application Development Security...15Decks655Flashcards27Learners -
CISSP 2019 (tms005)
CISSP 2019 (tms005)
By: Tuck Meng Siew
Chapter 1– Security Governance through Principles and Policies, Chapter 2– Personnel Security and Risk Management Concepts, Chapter 3– Business Continuity Planning...21Decks290Flashcards36Learners -
IS4670 CYBER CRIME FORENSICS QUESTIONS
IS4670 CYBER CRIME FORENSICS QUESTIONS
By: Barbara Crable
IS4670 CHAPTER 1 System Forensics Fundamentals, IS4670 CHAPTER 2 Overview of Computer Crime, IS4670 CHAPTER 3 Challenges of System Forensics...16Decks200Flashcards22Learners -
SMS415
SMS415
By: LaToya Grant
CH.5- Data base systems, data centers, business intelligence, Ch.6- telecommunications and networks, ch.10 Information and Decision support systems...8Decks372Flashcards7Learners -
Security+
Security+
By: Ethan Bigelow
Chapter 1: Intro to Information Security, Chapter 2: Pervasive Attack Surfaces & Controls, Chapter 3: Fundamentals of Cryptography...13Decks296Flashcards1Learner -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types...41Decks1,670Flashcards21Learners -
Body Logistics
Body Logistics
By: Emily Tao
Investigative techniques, Lecture 3: Early Embryology pt.1, Lecture 4: Early embryology pt. 2...13Decks417Flashcards1Learner -
Practice
Practice
By: Spirit Writer
(1)CyberSecurity Objectives, (1)Privacy Vs. Security, (1)Evaluating Security Risks...89Decks906Flashcards3Learners -
Cyber
Cyber
By: Bob OBrien
Section 1: Understanding Security Fundamentals, Section 2: Implementing Public Key Infrastructure, Section 3: Investigating Identity and Access Management...12Decks489Flashcards4Learners -
My CISSP Official Summary
My CISSP Official Summary
By: Unknown Unknown
Chap 11: Secure Network Architecture and Components, Chap 10: Secure Communications and Network Attacks, Chap 15: Security Assessment and Testing...7Decks121Flashcards2Learners -
Comptia SEC+
Comptia SEC+
By: Shawn Mosby
Section 2.2 Virtualization and Cloud Computing Concepts, Section 2.3 Secure Application development, deployment, and automation concepts, Section 2.4 Authentication and Authorization Design concepts...27Decks1,865Flashcards12Learners -
CISSP
CISSP
By: Eric Lekus
Chapter 1 Security Governance Through Principles and Policies, Chapter 2 Personnel Security and Risk Management, Chapter 3 Business Continuity Planning...22Decks524Flashcards1Learner -
Network And Cloud Forensics
Network And Cloud Forensics
By: M H
Module 2 - Network and Internet Resources, Module 1 - Intro to Internet and Cloud Forensics, Module 3 - Analyzing Network Traffic...6Decks81Flashcards3Learners -
Rapid Track Commands and Options
Rapid Track Commands and Options
By: Solomon Scott
Validate Network Configuration, Configure Networking from the Command Line, Edit Network Configuration Files...44Decks278Flashcards1Learner -
CISSP Study Guide
CISSP Study Guide
By: Enosh Chang
Security Governance Through Principles and Policies, Personnel Security and Risk Management Concepts, Business Continuity Planning...21Decks420Flashcards1Learner -
Information Systems
Information Systems
By: Unknown Unknown
Introduction to Information Systems, Information Systems In organization, Telecommunications & Networks...7Decks157Flashcards1Learner -
CS414 - Digital Forensics
CS414 - Digital Forensics
By: Caroline Mckinlay
Week 1 - Further Overview, Week 1 - The Place of Digital Forensics, Week 1 - The Investigative Process...30Decks316Flashcards20Learners -
Politics Unit 3 AOS2
Politics Unit 3 AOS2
By: James Hyde
Key Terms, Operation Sovereign Borders (OSB), CHAFTA...17Decks133Flashcards1Learner -
Erikson: Post-Freudian Theory
Erikson: Post-Freudian Theory
By: TRIZZA MAE ANGKE
The Ego in Post-Freudian Theory, Stages of Psychosocial Development, Erikson’s Methods of Investigation...7Decks59Flashcards1Learner -
Security + SY0-601
Security + SY0-601
By: Alket Shabani
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. Given a scenario, analyze potential indicators associated with network attacks....24Decks258Flashcards41Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks...35Decks546Flashcards19Learners -
Security Blue - Incident Respons
Security Blue - Incident Respons
By: ola sijuwola
Incident Response Introduction, Security Events vs Security Incidents, Incident Response Lifecycle...47Decks292Flashcards14Learners -
Linux+ XKO-005
Linux+ XKO-005
By: Nicholas McCarthy
Study Guide - Assessment Test, Study Guide - Chap2: Intro to Services, Study Guide - Chap3: Managing Files, Directories, and Text...45Decks1,812Flashcards1Learner -
C725 - Information Security and Assurance
C725 - Information Security and Assurance
By: S H
Chapter 2: Security Principles, Chapter 13: Software Development Security, Chapter 4: Governance and Risk Management...11Decks254Flashcards2Learners -
PPBM
PPBM
By: Cassie Williams
Code of Ethics and Rules of Conduct, FTO Program, Sworn Ranks, Titles, and Promotion Process...41Decks539Flashcards3Learners