This class was created by Brainscape user Jan Svrčina. Visit their profile to learn more about the creator.

Decks in this class (17)

Defense Tools
What is suricata,
What is suricata designed to do,
What is snort
8  cards
Incident Response Process
What are steps in incident respon...,
What s part of the detection phas...,
What s part of the response phase...
66  cards
Log Analysis
What is event correlation,
What are the different common log...,
What are event logs
9  cards
Indicator of Compromise (IoC)
What are the network iocs,
What are the host related iocs,
What are the application related ...
6  cards
Vulnerability Analysis and Nessus
What are the three basic steps in...,
What type of vulnerability scan a...,
What to do if vulnerability scann...
14  cards
XDR, EDR, XSOAR, SIEM, UEBA
What does ueba stand for,
What is ueba,
What does ueba combine to establi...
41  cards
OSINT
What does osint stand for,
What is opsec,
What is a public exposure assessment
29  cards
Forensics
What is another name for a forens...,
What tool in linux can be used to...,
What are the 4 functions of foren...
25  cards
Phishing Analysis
What are common attack vectors fo...,
What is the easiest way to find t...,
What exactly is the ip address fo...
17  cards
Responding to Cyberattacks
Learn how to respond to cyber incidents in a practical way
7  cards
Cybersecurity Positions
What are the responsibilities for...,
What is the job of the soc team,
3  cards
MITRE Frameworks
What is mitre cyber analytics rep...,
What is the goal of cyber analyti...,
What is the purpose of mitre engage
5  cards
Malware Analysis Theory
Which teams perform malware analysis,
What are the rules for handling m...,
How are executable files often ca...
45  cards
Threat Intelligence
What are the different classifica...,
Which intel classification is kno...,
How would you compare threat inte...
15  cards
Handling Ransomware
Describe how you would handle a s...,
Why is it important to understand...,
3  cards
Commercial Defense Products
What functionalities does the sen...,
How does ai powered static analys...,
What is the role of the sentinelo...
12  cards
Malware Analysis Practical
How to trick malware so it percei...,
How should be the malware analysi...,
What is sandnet
15  cards

More about
cybersecurity defense

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Jan Svrčina's Cybersecurity Defense flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Host and Defense
  • 22 decks
  • 631 flashcards
  • 4 learners
Decks: Bacteriology 12, Mycology 12, Immunology 11, And more!
Cyber Security (CompTIA Security+)
  • 41 decks
  • 1670 flashcards
  • 4 learners
Decks: Chapter 1 Threats Attacks And Vulnerabil, Chapter 11 Social Engineering, Chapter 12 Attack Types, And more!
IT Cybersecurity
  • 14 decks
  • 443 flashcards
  • 61 learners
Decks: A It Essentials Quiz 1, A It Essentials Quiz 2, A It Essentials Quiz 3, And more!
Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Make Flashcards