More cards in this set

Card 6

Front

SQL injection

Back

Preview of the front of card 6

Card 7

Front

Poor network policy

Back

Preview of the front of card 7

Card 8

Front

Penetration testing

Back

Preview of the front of card 8

Card 9

Front

Internal penetration test

Back

Preview of the front of card 9

Card 10

Front

External penetration test

Back

Preview of the front of card 10

Card 11

Front

Network forensics

Back

Preview of the front of card 11

Card 12

Front

Network policies

Back

Preview of the front of card 12

Card 13

Front

Anti-malware software

Back

Preview of the front of card 13

Card 14

Front

Firewalls

Back

Preview of the front of card 14

Card 15

Front

User access levels

Back

Preview of the front of card 15
View more cards