Security Operations Analysis

This class was created by Brainscape user Al Ordu.

By:

Decks in this class (21)

Week 1
Security operations center soc 1,
Functions of a soc 2,
Elements of a soc 3
4  cards
Week 1 Q's
What does soc stand for and what ...,
What are the key components of a ...,
How does a soc help organizations...
11  cards
Week 2
What the importance of soc tools 1,
What is the purpose of soc tools 2,
Tool categories 3
6  cards
Week 2 Q's
What is a security operations cen...,
What is the main purpose of soc t...,
What is a security information an...
10  cards
Week 3
Phishing 1,
Malware 2,
Ransomware 3
7  cards
Week 3 Q's
What is the goal of a ransomware ...,
What is the primary method of a p...,
What is the primary goal of a dis...
19  cards
Week 4
Security operations maturity mode...,
Mean time to respond mttr 2,
Mean time to detect mttd 3
25  cards
Week 4 Q's
Which of the following is a key f...,
Logrhythm s siem tool can collect...,
Which of the following components...
20  cards
Week 5
Playbooks 1,
Why do we need playbooks 2,
Merits of using playbooks in logr...
6  cards
Week 5 Q's
Which of the following is not a c...,
What is the primary goal of creat...,
What is the first step in develop...
20  cards
Week 6
Incident 1,
Incident response ir 2,
Incident response stages 3
23  cards
Week 6 Q's
What is the first step in carryin...,
Which of the following is a prima...,
What is the purpose of a chain of...
19  cards
Week 7
Mitre att ck framework 1,
Credential access tactic mitre 2,
Command and control c2 mitre 3
17  cards
Week 7 Q's
What is the primary purpose of th...,
What is the difference between th...,
Which of the following best descr...
20  cards
Week 8
0  cards
Week 8 Q's
What is the difference between a ...,
What is the purpose of a packer i...,
What is steganography in the cont...
20  cards
Assessment
Phishing 1,
Malware 2,
Denial of service dos and ddos 3
7  cards
LogRhythm
Top classification 1,
Top common event 2
2  cards
Week 9 Q’s
Which of the following is not a b...,
Which linux command is used to li...,
Which linux tool can be used to m...
20  cards
Assessment 2
Identification 1,
Containment 2,
Remediation 3
4  cards
quick
Phishing 1,
Malware 2
2  cards

More about
Security Operations Analysis

  • School Unspecified
  • Program type Unspecified
  • Course Unspecified
  • Instructor Unspecified
  • Standards Unspecified

The creator of this class did not yet add a description for what is included in this class.

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Financial Analysis/ Operations Flashc...
  • 5 decks
  • 79 flashcards
  • 1 learners
Decks: Financial Analysis Operations, Marketing Product And Service Management, Pricing Promotion Flashcards, And more!
Operating Systems Security
  • 11 decks
  • 155 flashcards
  • 72 learners
Decks: Lecture 01 Introduction To Oss, Lecture 02 Basic Concepts Of Oss, Lecture 03 Access Controls, And more!
Smooth Operator
  • 29 decks
  • 637 flashcards
  • 23 learners
Decks: Whs, Aerial Operations, Aircraft Incidents, And more!