Learn Social Network
Study Social Network using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
[9569] computing booooo
[9569] computing booooo
By: Eugenia Ng
errr basic python theory, Social, Ethical, Legal and Economical Issues, Network + Network Security...4Decks83Flashcards8Learners -
OAM
OAM
By: Sarah Idris
week 1, decision making I, Decision Making II...21Decks582Flashcards2Learners -
CompTIA Security+
CompTIA Security+
By: Rene Vargas
Chapter 2 - Monitoring Networks, Chapter 1 - Measuring and Weighing Risk, Chapter 3 - Understanding Devices and infrastructure...12Decks292Flashcards51Learners -
BUS 550 Final
BUS 550 Final
By: Tracy Trieu
Ch. 7 Network Effects, Ch. 8 Social Media, Ch. 9 The Sharing Economy...5Decks92Flashcards31Learners -
IT
IT
By: Wesley Mabutho
LS, Networks, Social Implications3Decks41Flashcards1Learner -
New Media Challenges
New Media Challenges
By: Verena Visser
Lecture 1, Lecture 2: An introduction to privacy, Lecture 3: Personalization, Privacy concerns and Information sharing...20Decks329Flashcards2Learners -
A+ 1002
A+ 1002
By: Unknown Unknown
Physical Security, Logical Security, Wireless Security...29Decks564Flashcards5Learners -
CSF Finals
CSF Finals
By: Justin Ooi
Cryptography, Access Control, Steganography...13Decks161Flashcards1Learner -
(6) CompTia Security+ SY0-601 Definitions
(6) CompTia Security+ SY0-601 Definitions
By: Maciej Węgrzynowski
1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application Attacks...47Decks1,691Flashcards32Learners -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
1.1 Social Engineering, 1.2 Attack Types, 1.3 Application Attacks...35Decks722Flashcards36Learners -
Meu CEH
Meu CEH
By: FabS Pam
Module 1 - Intro to Ethical Hacking, Module 2 - Footprinting and Reconnaissance, Module 3 - Scanning Networks...22Decks366Flashcards31Learners -
CND
CND
By: Alex Bachman
PORT SCANNING PEs, Packet Analysis 1 PEs, Packet Analysis 2 PEs...11Decks288Flashcards5Learners -
French Vocab Revision
French Vocab Revision
By: edad edad
5.2H - My Area, 6.1F - My Work, 6.1H - Why we need Corporations...44Decks1,060Flashcards10Learners -
Essential Words
Essential Words
By: Hossein Ahmadian
U1-Environmental, OX-24, OX-23...28Decks683Flashcards6Learners -
Sociology
Sociology
By: Quintin Hicks
Chapter 1: The Sociological Imanation: An Introduction, Chapter 2: Methods, Chapter 3: Culture, & Media...7Decks255Flashcards13Learners -
Computing
Computing
By: Ben Coombner
Social Networking, Data representation, Python / turtle...4Decks28Flashcards1Learner -
HR 512, 514, 516, 521, 522
HR 512, 514, 516, 521, 522
By: John Walter
HR 512, HR 514 Grievance system, HR 516 Usage Social Media and Social Networking...5Decks63Flashcards10Learners -
my CEH - Certified Ethical Hacker
my CEH - Certified Ethical Hacker
By: Roger Pharr
Chapter 1 Introduction to Ethical Hacking, Chapter 0 Random Terms, Chapter 2 System Fundamentals...19Decks406Flashcards23Learners -
Computer Science P2 (*)
Computer Science P2 (*)
By: Ellis Outterside
4.5 - Fundamentals of Data Representation, Number Systems and Binary, Floating point binary...27Decks402Flashcards1Learner -
Information Technology GR11 NOV
Information Technology GR11 NOV
By: Hannah Hundermark
Computer Hardware, Software, Networking: LAN...9Decks165Flashcards1Learner -
BUS 115-Intro to Business
BUS 115-Intro to Business
By: Amanda Kerker
Ch. 1-The Dynamics Of Business And Economics, Chapter 2-Business Ethics and Social Responsibility, Chapter 3-Business in a Borderless World...11Decks292Flashcards55Learners -
CEH Exam Guide 3rd Ed, for CEH Exam v9
CEH Exam Guide 3rd Ed, for CEH Exam v9
By: Stephen Holden
Chapter 1 - Essential Knowledge (Introduction to Ethical Hacking), Chapter 2 - Reconnaissance (Footprinting and Reconnaissance), Chapter 3 - Scanning and Enumeration (Scanning Networks)...17Decks545Flashcards43Learners -
Study Guide SY0-601
Study Guide SY0-601
By: Dakota Edmunds
1.1 Compare and contrast different types of social engineering techniques., 1.5 Explain Different Threat Actors, Vectors And Intelligence Sources, 1.2 Given a scenario, analyze potential indicators to determine the type of attack...20Decks620Flashcards169Learners -
Pentest+ PT0-002
Pentest+ PT0-002
By: Steven Brumley
Planning and Engagement, Information Gathering and Vulnerability Scanning, Network-Based Attacks...9Decks290Flashcards13Learners -
ag-CEH-V10 - Certified Ethical Hacker
ag-CEH-V10 - Certified Ethical Hacker
By: Anti Gondu
Chapter 1 Introduction to Ethical Hacking, Chapter 0 Random Terms, Chapter 2 System Fundamentals...25Decks922Flashcards4Learners -
CompTIA Security+
CompTIA Security+
By: Sergio Fetter
Types of Attacks, Vulnerabilities and Threats, Network Basics and Terminology...11Decks280Flashcards2Learners -
Michaelmas Term 1
Michaelmas Term 1
By: Grace Beglan
Evolution By Natural Selection, The Green Revolution, How Many Genes Does It Take To Build A Cell...42Decks2,234Flashcards2Learners -
IT
IT
By: Daniel Klette
Basic Concepts of Computing, Hardware vs Software, Shareware, Freeware, Free Open Source Software, Proprietary Software...11Decks166Flashcards2Learners -
Comptia
Comptia
By: Russell Davis
Social Engineering, Determine type of attack via indicators, Application Attacks...35Decks1,194Flashcards27Learners -
CompTIA A+ Core 2
CompTIA A+ Core 2
By: Dorian Dardon
Windows Editions, Microsoft Command-Line Tools, MS Win10 OS Features & Tools...18Decks195Flashcards3Learners