security operations analysis

This class was created by Brainscape user Al Ordu. Visit their profile to learn more about the creator.

Decks in this class (21)

Week 1
Security operations center soc,
Functions of a soc,
Elements of a soc
4  cards
Week 1 Q's
What does soc stand for and what ...,
What are the key components of a ...,
How does a soc help organizations...
11  cards
Week 2
What the importance of soc tools,
What is the purpose of soc tools,
Tool categories
6  cards
Week 2 Q's
1 what is a security operations c...,
What is the main purpose of soc t...,
What is a security information an...
10  cards
Week 3
Phishing,
Malware,
Ransomware
7  cards
Week 3 Q's
1 what is the goal of a ransomwar...,
2 what is the primary method of a...,
3 what is the primary goal of a d...
19  cards
Week 4
Security operations maturity mode...,
Mean time to respond,
Mean time to detect
25  cards
Week 4 Q's
1 which of the following is a key...,
2 logrhythm s siem tool can colle...,
3 which of the following componen...
20  cards
Week 5
Playbooks,
Why do we need playbooks,
Merits of using playbooks in logr...
6  cards
Week 5 Q's
Which of the following is not a c...,
What is the primary goal of creat...,
What is the first step in develop...
20  cards
Week 6
What is an incident,
Incident response ir,
Incident response stages
23  cards
Week 6 Q's
What is the first step in carryin...,
Which of the following is a prima...,
What is the purpose of a chain of...
19  cards
Week 7
Mitre att ck framework,
Credential access tactic mitre,
Command and control c2 mitre
17  cards
Week 7 Q's
What is the primary purpose of th...,
What is the difference between th...,
Which of the following best descr...
20  cards
Week 8
0  cards
Week 8 Q's
What is the difference between a ...,
What is the purpose of a packer i...,
What is steganography in the cont...
20  cards
Assessment
Phishing attacks,
Malware attacks,
Denial of service dos and ddos at...
7  cards
LogRhythm
Top classification,
Top common event
2  cards
Week 9 Q’s
Which of the following is not a b...,
Which linux command is used to li...,
Which linux tool can be used to m...
20  cards
Assessment 2
Identification,
Containment,
Remediation
4  cards
quick
Phishing,
Malware
2  cards

More about
security operations analysis

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Al Ordu's Security Operations Analysis flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Jet Engine Troubleshooting, Operation...
  • 4 decks
  • 95 flashcards
  • 1 learners
Decks: Troubleshooting And Engine Monitoring, Instrumentation And Test Equipment, Jet Engine Testing Methods And Proceedur, And more!
CISSP Notecards - Security Operations
  • 2 decks
  • 16 flashcards
  • 1 learners
Decks: Change Management Flow, Change Control Process, And more!
CFD Operations
  • 23 decks
  • 546 flashcards
  • 19 learners
Decks: 20101 Emergency Response, 20102 Persons Riding On Fire Apparatus, 20104 Puco Notification, And more!
Make Flashcards