Cybersecurity Study guides, Class notes & Summaries

Looking for the best study guides, study notes and summaries about Cybersecurity? On this page you'll find 3913 study documents about Cybersecurity.

Page 3 out of 3.913 results

Sort by

Cybersecurity Management II - Tactical - C795 Pre-assessment QUESTIONS WITH COMPLETE SOLUTIONS
  • Cybersecurity Management II - Tactical - C795 Pre-assessment QUESTIONS WITH COMPLETE SOLUTIONS

  • Exam (elaborations) • 15 pages • 2023
  • Cybersecurity Management II - Tactical - C795 Pre-assessment QUESTIONS WITH COMPLETE SOLUTIONS
    (0)
  • $11.09
  • 1x sold
  • + learn more
ISC2 Cybersecurity Certification (CC) 63 Questions with 100% Correct Answers | Verified | Latest Update
  • ISC2 Cybersecurity Certification (CC) 63 Questions with 100% Correct Answers | Verified | Latest Update

  • Exam (elaborations) • 7 pages • 2023
  • Available in package deal
  • What type of security training is specifically designed to educate employees about attack techniques? - ️️capture the flag Linda's organization recently experienced a social engineering attack. The attacker called a help desk employee and persuaded her that she was a project manager on a tight deadline and locked out of her account. The help desk technician provided the attacker with access to the account. What social engineering principle was used? - ️️urgency What type of phishi...
    (0)
  • $7.99
  • 1x sold
  • + learn more
Summary  C844: Emerging Technologies in Cybersecurity Nmap/Wireshark Discovery & Remediation Analysis.
  • Summary C844: Emerging Technologies in Cybersecurity Nmap/Wireshark Discovery & Remediation Analysis.

  • Summary • 18 pages • 2022
  • Summary C844: Emerging Technologies in Cybersecurity Nmap/Wireshark Discovery & Remediation Analysis.
    (0)
  • $14.99
  • 2x sold
  • + learn more
Scriptie AMT - De Bouwstenen van Effectieve Cybersecurity (significante relaties)
  • Scriptie AMT - De Bouwstenen van Effectieve Cybersecurity (significante relaties)

  • Thesis • 89 pages • 2024
  • Scriptie geschreven voor de afstudeerrichting BIV. Ik heb mijn scriptie afgerond met een 8. Een deel van het onderzoeksmodel zou volgens de examinator publicatiewaardig kunnen zijn (met name bita, erm en board involvement in relatie tot effectieve cybersecurity).
    (0)
  • $16.52
  • 1x sold
  • + learn more
ISC2 Cybersecurity Certification (CC) Exam Questions and Answers 2024 Graded A
  • ISC2 Cybersecurity Certification (CC) Exam Questions and Answers 2024 Graded A

  • Exam (elaborations) • 6 pages • 2024
  • ISC2 Cybersecurity Certification (CC) Exam Questions and Answers What type of security training is specifically designed to educate employees about attack techniques? - Answer ️️ -capture the flag Linda's organization recently experienced a social engineering attack. The attacker called a help desk employee and persuaded her that she was a project manager on a tight deadline and locked out of her account. The help desk technician provided the attacker with access to the account. What...
    (0)
  • $12.49
  • 1x sold
  • + learn more
C844 Emerging Technologies in Cybersecurity Task 1
  • C844 Emerging Technologies in Cybersecurity Task 1

  • Exam (elaborations) • 10 pages • 2022
  • A. Describe the network topology you found when running Nmap. Include screenshots as evidence of running Nmap. In order to see the network topology, I used the Zenmap version of nmap to run the scan on the network. As seen in the image below, the network is set up in a star topology. The central device in the star network is host 192.168.29.2, with 9 devices connecting to it. All the devices are under the 192.168.27.x subnet, so for simplicity I will refer to the device by the ID of the la...
    (0)
  • $8.49
  • 2x sold
  • + learn more