Learn Social Network
Study Social Network using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
ECSA - Certified Security Analyst
ECSA - Certified Security Analyst
By: Abran Tapia
1 - Intro 2 Pen Testing, 2 - Pen Testing Scope and Engagement, 3 - OSINT Methodology ...12Decks153Flashcards3Learners -
BUS 550 Final
BUS 550 Final
By: Tracy Trieu
Ch. 7 Network Effects, Ch. 8 Social Media, Ch. 9 The Sharing Economy ...5Decks92Flashcards30Learners -
Computing
Computing
By: Ben Coombner
Social Networking, Data representation, Python / turtle ...4Decks28Flashcards1Learner -
CSF Finals
CSF Finals
By: Justin Ooi
Cryptography, Access Control, Steganography ...13Decks161Flashcards1Learner -
A+ 1002
A+ 1002
By: Unknown Unknown
Physical Security, Logical Security, Wireless Security ...29Decks564Flashcards3Learners -
New Media Challenges
New Media Challenges
By: Verena Visser
Lecture 1, Lecture 2: An introduction to privacy, Lecture 3: Personalization, Privacy concerns and Information sharing ...20Decks329Flashcards2Learners -
Sociology 1020
Sociology 1020
By: Uma Jacoby
Chapter 3 - Culture, Chapter 4 - Socialization, Chapter 5 - Social Interaction ...15Decks436Flashcards6Learners -
(6) CompTia Security+ SY0-601 Definitions
(6) CompTia Security+ SY0-601 Definitions
By: Maciej Węgrzynowski
1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application Attacks ...47Decks1,691Flashcards29Learners -
OAM
OAM
By: Sarah Idris
week 1, decision making I, Decision Making II ...21Decks582Flashcards2Learners -
Comptia Security+
Comptia Security+
By: Cristi Náme
Attack Types, Application Attacks, Network Attacks ...8Decks169Flashcards1Learner -
HR 512, 514, 516, 521, 522
HR 512, 514, 516, 521, 522
By: John Walter
HR 512, HR 514 Grievance system, HR 516 Usage Social Media and Social Networking ...5Decks63Flashcards10Learners -
English Proficiency
English Proficiency
By: Tri Minh
Vocabulary 1, Prepositions, Business vocabulary ...5Decks87Flashcards2Learners -
Essential Words
Essential Words
By: Hossein Ahmadian
U1-Environmental, OX-24, OX-23 ...28Decks683Flashcards4Learners -
Computer Science
Computer Science
By: Libby Simpson
Necessary vocan for describing programming, CPU and Memory, Hardware and Software ...7Decks157Flashcards1Learner -
my CEH - Certified Ethical Hacker
my CEH - Certified Ethical Hacker
By: Roger Pharr
Chapter 1 Introduction to Ethical Hacking, Chapter 0 Random Terms, Chapter 2 System Fundamentals ...19Decks406Flashcards23Learners -
Meu CEH
Meu CEH
By: FabS Pam
Module 1 - Intro to Ethical Hacking, Module 2 - Footprinting and Reconnaissance, Module 3 - Scanning Networks ...22Decks366Flashcards28Learners -
French Vocab Revision
French Vocab Revision
By: edad edad
5.2H - My Area, 6.1F - My Work, 6.1H - Why we need Corporations ...44Decks1,060Flashcards9Learners -
CND
CND
By: Alex Bachman
PORT SCANNING PEs, Packet Analysis 1 PEs, Packet Analysis 2 PEs ...11Decks288Flashcards5Learners -
English Theorists
English Theorists
By: Bethany Richardson
Social Stratification, Social Network, Accent Theories ...6Decks96Flashcards4Learners -
Sociology
Sociology
By: Quintin Hicks
Chapter 1: The Sociological Imanation: An Introduction, Chapter 2: Methods, Chapter 3: Culture, & Media ...7Decks255Flashcards13Learners -
CEH Exam Guide 3rd Ed, for CEH Exam v9
CEH Exam Guide 3rd Ed, for CEH Exam v9
By: Stephen Holden
Chapter 1 - Essential Knowledge (Introduction to Ethical Hacking), Chapter 2 - Reconnaissance (Footprinting and Reconnaissance), Chapter 3 - Scanning and Enumeration (Scanning Networks) ...17Decks545Flashcards43Learners -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
1.1 Social Engineering, 1.2 Attack Types, 1.3 Application Attacks ...35Decks722Flashcards18Learners -
[9569] computing booooo
[9569] computing booooo
By: Eugenia Ng
errr basic python theory, Social, Ethical, Legal and Economical Issues, Network + Network Security ...4Decks79Flashcards6Learners -
ITN 260
ITN 260
By: Joe Schmoe
Chapter 1 - introduction To Security, Chapter 15 - Risk Mitigation, Chapter 8 - Wireless Network Security ...15Decks567Flashcards2Learners -
Study Guide SY0-601
Study Guide SY0-601
By: Dakota Edmunds
1.1 Compare and contrast different types of social engineering techniques., 1.5 Explain Different Threat Actors, Vectors And Intelligence Sources, 1.2 Given a scenario, analyze potential indicators to determine the type of attack ...20Decks620Flashcards165Learners -
Security +
Security +
By: Jon-Paul Brune
Chapter 2 - Monitoring & Diagnosing Networks, Chapter 1 - Measuring & Weighing Risk, Chapter 3 - Understanding Devices & Infrastructure ...12Decks397Flashcards13Learners -
sociology
sociology
By: liliya Navrotska
first section of textbook, data collection, quantitative research ...9Decks160Flashcards1Learner -
BUS 115-Intro to Business
BUS 115-Intro to Business
By: Amanda Kerker
Ch. 1-The Dynamics Of Business And Economics, Chapter 2-Business Ethics and Social Responsibility, Chapter 3-Business in a Borderless World ...11Decks292Flashcards44Learners -
PenTest+
PenTest+
By: Laurence Toje
Penetration Testing, Planning and Scoping Penetration Tests, Information Gathering ...13Decks251Flashcards1Learner -
Pentest+ PT0-002
Pentest+ PT0-002
By: Steven Brumley
Planning and Engagement, Information Gathering and Vulnerability Scanning, Network-Based Attacks ...9Decks290Flashcards12Learners