Learn Social Engineering
Study Social Engineering using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CompTIA Security + (SY0-701)
CompTIA Security + (SY0-701)
By: Amreek Paul
Section 2.5 Threats and Vulnerabilities, Section 2.6 Confidentiality, Section 2.7 Integrity ...238Decks1,692Flashcards10Learners -
Comptia A+ Core 2
Comptia A+ Core 2
By: Andrew Dieppa
1.1 An Overview of Windows, 1.1 - Windows Features, 1.1 - Windows Upgrades ...69Decks528Flashcards1Learner -
chapter 1
chapter 1
By: RedWarH Gaming
Basics, Types of Malware, Types of Social Engineering ...4Decks37Flashcards1Learner -
security plus
security plus
By: tessen p
chapter 1 intro to security, chapter 2 malware and social engineering attacks, PORTS3Decks39Flashcards1Learner -
Security+
Security+
By: Blistery Grub
Security Controls 1.1, The CIA Triad 1.2, Non-Repudiation 1.2 ...67Decks356Flashcards1Learner -
Computing
Computing
By: Jesus Christ
Network Security and the Ethernet, CPU and Computer System, Malware and Social Engineering ...5Decks52Flashcards1Learner -
UCWD
UCWD
By: Sebastian Kampe
01 Web 2.0 + Social software, 02 Strategic Planning, 03 Interfaces and Technology ...8Decks73Flashcards1Learner -
Excel
Excel
By: Xavier Link
Excel Unit A, Excel Unit B, Excel Unit C ...6Decks61Flashcards1Learner -
Other
Other
By: Scott Barnes
Social Engineering1Decks25Flashcards1Learner -
Security Blue - Phishing Analysis
Security Blue - Phishing Analysis
By: ola sijuwola
Introduction to Phishing and Emails, Anatomy of an Email, What is Phishing? ...62Decks236Flashcards2Learners -
Cybersecurity
Cybersecurity
By: Valencia Lowhur
2.2 Social Engineering, 1.2 Security Controls, Exam #13Decks32Flashcards1Learner -
EQ4 coasts
EQ4 coasts
By: Vini goyal
2B.10a economic and social losses from coastal recession, 2B.10b impacts of coastal flooding and storm surge events, 2B.11a hard engineering approaches ...9Decks35Flashcards2Learners -
SY0-602 Acronyms
SY0-602 Acronyms
By: Kendra Lohmeyer
1.1 Social Engineering Techniques, 1.2, 1.3 ...6Decks26Flashcards1Learner -
COMPTIA SEC+
COMPTIA SEC+
By: arlena lainy
Lesson 1 - Security Roles and Controls, Lesson 2 - Threat Actors & Threat Intelligence, Lesson 3 - Security Assessments ...5Decks58Flashcards1Learner -
Economic and Social Change in Southern Africa
Economic and Social Change in Southern Africa
By: Ferg Giv
General, L9:An African Success Story? Trade and conflicting narratives in Mozambique, Harrison (2010) Neoliberal Africa: The impact of global social engineering3Decks26Flashcards1Learner -
Security+
Security+
By: Jonathan Smith
1.1 Compare and contrast different types of social engineering techniques1Decks22Flashcards1Learner -
Web Science
Web Science
By: Yannick Epstein
Advanced Web Engineering, Cloud Computing, Signed Networks and Social Balance3Decks30Flashcards1Learner -
Percepio Security +
Percepio Security +
By: Beth Hosek
Social Engineering Techniques & Other Attack Types, Implementing Identity and Account Management & AAA Solutions, Physical Security Controls ...12Decks38Flashcards1Learner -
CompTIA Security+
CompTIA Security+
By: Beth Hosek
1A: Compare and Contrast Information Security Roles, 1B: Compare and Contrast Security Control and Framework Types, 2A: Explain Threat Actor Types and Attack Vectors ...61Decks103Flashcards3Learners -
FLE
FLE
By: Brillianne Mae Ballasio
CVSTODES SYLVARVM_Forest Ecosystem, CVSTODES SYLVARVM_Forest Governance and Social Forestry, CVSTODES SYLVARVM_Forest Utilization and Engineering ...4Decks16Flashcards1Learner -
CompTIA Sec+ SYP-601
CompTIA Sec+ SYP-601
By: Jordan Prescott
Section 1 – Attacks, Threats, and Vulnerabilities 1.1 – Social Engineering, Section 1 – Attacks, Threats, and Vulnerabilities / 1.2 – Attack Types2Decks22Flashcards1Learner -
Risk Reliability and Safety
Risk Reliability and Safety
By: Jeremy Robertson
Lecture 2 - What is risk?, Lecture 2 - What is the risk management process?, Lecture 2 - Likelihood and Consequences ...38Decks287Flashcards1Learner -
PRODUCT KNOWLEDGE
PRODUCT KNOWLEDGE
By: Huang Lin
SCHOOL OF BUSINESS & ACCOUNTANCY, SCHOOL OF DESIGN & ENVIRONMENT, TALKING POINTS ...7Decks35Flashcards1Learner -
CompTIA Security+ SY0-701 Module 1:
CompTIA Security+ SY0-701 Module 1:
By: Mehdi Ouhtit
Slide 1: General Security Concepts, Slide 2: Defense in Depth, Slide 3: Essential Terminology ...39Decks59Flashcards2Learners -
Cybersecurity Module2
Cybersecurity Module2
By: Lebron Tames
Human Psychology Principle, Human Manipulation Technique, Social Engineering Attacks ...10Decks36Flashcards1Learner -
CompTIA Security +
CompTIA Security +
By: Alhagie Njie
Fundamentals of Security, Threat Actor, Physical Security ...26Decks27Flashcards1Learner -
Certified Ethical Hacker
Certified Ethical Hacker
By: Ben Moore
0. Introduction, 1. Reconnaissance and Footprinting, 2. Scanning and Enumeration ...17Decks20Flashcards1Learner -
Security_cert
Security_cert
By: John Witek
Threats, Attacks & Vulnerabilities, Social Engineering, Application/Service Attacks ...7Decks36Flashcards1Learner -
ITSSA
ITSSA
By: Conroy Magerman
Week 1 Security for Software Engineers and Roles, Week 2 Classification of Attacks, Software Weapons and Social Engineering, Week 3 Command Injection, Script Injection & Memory Injection ...9Decks44Flashcards1Learner -
CompTIA Security+ (Sy0-601)
CompTIA Security+ (Sy0-601)
By: gon rx
CertMike’s Practice Question of the Week, 1.1 Malware, 1.2 Understanding Attackers ...7Decks38Flashcards1Learner