This class was created by Brainscape user Jan Svrčina. Visit their profile to learn more about the creator.

Decks in this class (17)

Defense Tools
What is suricata 1,
What is suricata used for 2,
What is snort 3
8  cards
Log Analysis
What is event correlation 1,
What are the different common log...,
What are event logs 3
9  cards
Indicator of Compromise (IoC)
What are the network related iocs 1,
What are the host related iocs 2,
What are the application related ...
6  cards
Vulnerability Analysis and Nessus
What are the 4 basic steps in the...,
What type of vulnerability scan a...,
What to do if vulnerability scann...
14  cards
XDR, EDR, XSOAR, SIEM, UEBA
What does ueba stand for 1,
What is ueba 2,
What does ueba combine to establi...
41  cards
OSINT
What does osint stand for 1,
What is opsec 2,
What is a public exposure assessm...
29  cards
Forensics
What is another name for a forens...,
What tool in linux can be used to...,
What are the 4 functions of foren...
25  cards
Phishing Analysis
What are common attack vectors fo...,
What is the easiest way to find t...,
What exactly is the ip address fo...
17  cards
Responding to Cyberattacks
Learn how to respond to cyber incidents in a practical way
7  cards
Cybersecurity Positions
What are the responsibilities for...,
What is the job of the soc team 2,
Blank 3
3  cards
MITRE Frameworks
What is mitre cyber analytics rep...,
What is the purpose of the analyt...,
What is the purpose of mitre enga...
5  cards
Malware Analysis Theory
Which teams perform malware analy...,
What are the rules for handling m...,
How are executable files often ca...
45  cards
Threat Intelligence
What are the different classifica...,
Which intel classification is kno...,
How would you compare threat inte...
15  cards
Handling Ransomware
Describe how you would handle a s...,
Why is it important to understand...,
Blank 3
3  cards
Commercial Defense Products
What functionalities does the sen...,
How does ai powered static analys...,
What is the role of the sentinelo...
12  cards
Malware Analysis Practical
How to trick malware so it percei...,
How should be the malware analysi...,
What steps should you go through ...
15  cards
Incident Response
What can initiate incident respon...,
What do preparation activities in...,
Why is it important to define bas...
57  cards

More about
Cybersecurity Defense

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Jan Svrčina's Cybersecurity Defense flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Host and Defense
  • 57 decks
  • 2680 flashcards
  • 14 learners
Decks: Exam 1 Intro To Virology, Exam 1 Mycology, Exam 1 Mycobacteriology, And more!
Cyber Security
  • 19 decks
  • 2738 flashcards
  • 126 learners
Decks: Security Risk Management Srm, Security Assessment And Testing Ant, Software Development Security Dev, And more!
CompTIA Security +
  • 43 decks
  • 2139 flashcards
  • 29 learners
Decks: Fundamentals Of Security, Threat Actors, Physical Security, And more!
Make Flashcards