Vulnerability Assessment & Attack Mitigation Terms
You'll focus on information relating to vulnerability assessments and attack mitigation.
Virus Match
By MJ Tech Support
Threat Modeling (STRIDE)
You'll be asked to match definitions within the STRIDE categories, which is used in risk analysis and threat modeling.
Threat Modeling (DREAD)
You'll learn definitions within the DREAD categories, which is used in risk analysis and threat modeling.
The Invention Of The Smartphone
The invention of the smartphone
Special Permissions (Linux)
You'll become familiar with special permissions in the Linux operating system.
Security Policy
You'll be introduced to some comprehensive security sub-policies.
Security Control Process
You'll learn the five steps to the Security Control Process.
Security Administration Process
You'll learn to recognize the steps in the Security Administration Process.
Security - Mix and Match
This game tests user knowledge on security. The game will pick random pairs each time you play.