This class was created by Brainscape user Chris Northrup. Visit their profile to learn more about the creator.

Decks in this class (20)

Module 1
The Danger
11  cards
Module 2
Purpose and mission of the soc,
Element 1 people 3 tier s plus a ...,
Tier 1 notes
19  cards
Module 3
What is the dos,
What does dos do how is it organized,
What is ms dos
25  cards
Transport Layer
Define sliding window 3 big points,
Tcp header field control bits des...,
Describe the 3 way handshake
19  cards
Network Services
Examples of network services,
Dhcp two types of addressing,
Dns what is the function
11  cards
IPv4 Header, IPv6, and TCP/UDP Header
How many fields for the ipv4 header,
What is the version field,
List the fields
32  cards
VTP/DTP/Etherchannel/Trunk services
What is dtp,
What are the four five modes of dtp,
What is a trunk link
47  cards
Attacking the foundation
Is ipv4 6 a connectionless protocol,
Ipv4 header how many fields,
How many bytes if the ipv4 header
42  cards
Module 18 Understanding Defense
Assets,
Vuln,
Threats
23  cards
Module 19 Access Control
What is the cia triad,
What is confidentiality,
What is integrity
30  cards
Module 20 Threat Intelligence
What must you do to effectively p...,
What is the sans institute,
What is mitre
14  cards
Module 21 Public Key Cryptography
1  cards
Module 22 Endpoint Protection
Why are endpoints threats,
How to define endpoints,
Where do many attacks originate f...
27  cards
Module 23 Endpoint Vulnerability Assessment
What is network profiling,
What is a server profile,
What is network anomaly detection
36  cards
Module 24 Technologies and Protocols
What port does syslog servers uti...,
Why are ntp and syslog important,
Why is attacking a syslog server ...
20  cards
Module 25 Network Security Data
What are some network security mo...,
What is an example of a network ids,
What is alert data
51  cards
Module 26 Evaluating Alerts
What is a security onion,
What are some of the collecting t...,
What are our analysis tools
34  cards
Module 27 Working with Network Security Data
What are the core elements for elk,
What is kibana,
What is beats
8  cards
Module 28 Digital Forensics
1  cards
Exam Prep
What is exploitation,
What is the diff between soar and...,
What is a threat
22  cards

More about
CyberOPS

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Chris Northrup's CyberOPS flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CCNA Cyber Ops SECOPS
  • 19 decks
  • 366 flashcards
  • 142 learners
Decks: Secops 1 Defining The Soc, Secops 2 Nsm Tools And Data, Security Onion, And more!
CCNA Cyber Ops SECFND
  • 12 decks
  • 375 flashcards
  • 35 learners
Decks: Secfnd 2 Network Infrastructure, Secfnd 6 Network Applications, Secfnd 7 Network App Attacks, And more!
Make Flashcards