Discover

Data Security

Audit IT Compréhension
26 questions
Einstein Generative AI & Trust
8 questions
Information Technology Overview
0 questions

Information Technology Overview

AstoundingEcstasy2608 avatar
AstoundingEcstasy2608
BBA 2 Conference on Blockchain
48 questions
Overview of ElGamal Encryption
8 questions
Blockchain w budownictwie
8 questions
Forensic Accounting and Excel Concepts Quiz
49 questions
AES Encryption Overview
13 questions

AES Encryption Overview

ExemplarySacramento avatar
ExemplarySacramento
Overview of Symmetric Key Cryptography
13 questions

Overview of Symmetric Key Cryptography

ExaltingThermodynamics1013 avatar
ExaltingThermodynamics1013
Introduction to Cybersecurity Mesh
16 questions

Introduction to Cybersecurity Mesh

MeritoriousVerdelite6135 avatar
MeritoriousVerdelite6135
Introduction to Cryptography and Ciphers
48 questions
Authentication and Cryptography Concepts
48 questions
IT-Sicherheit Kapitel 2 - Kryptographie
55 questions
Encryption Fundamentals
51 questions

Encryption Fundamentals

ObservantKazoo4699 avatar
ObservantKazoo4699
Introduction to Cryptography
4 questions

Introduction to Cryptography

GlisteningCitrine7281 avatar
GlisteningCitrine7281
Power Platform Governance Challenges
18 questions
Ingegneria Sociale e Hacking
30 questions

Ingegneria Sociale e Hacking

InstructivePeninsula4058 avatar
InstructivePeninsula4058
H4
44 questions

H4

CheaperGyrolite3498 avatar
CheaperGyrolite3498
Sistema Gestor de Base de Datos (SGBD)
5 questions
Cybersecurity Threats and Controls Quiz
48 questions
Records and Report Processing
36 questions
Middleware Use Cases for Developers
6 questions
AWS Backup and Vault Lock
5 questions

AWS Backup and Vault Lock

RationalStanza9319 avatar
RationalStanza9319
2.4 – Social Engineering -  Insider Threats
10 questions
Criptografía y Funciones Hash
20 questions

Criptografía y Funciones Hash

PositiveSaxophone6227 avatar
PositiveSaxophone6227
Acceptable Use Policy (AUP) Basics
39 questions
Cybersecurity Mechanisms and Goals
42 questions
Understanding Cyber Threats to Organizations
96 questions