This class was created by Brainscape user Chris Northrup. Visit their profile to learn more about the creator.

Decks in this class (19)

Module 1
The Danger
11  cards
Module 2
Purpose and mission of the soc,
Element 1 people 3 tier s plus a ...,
Tier 1 notes
19  cards
Module 3
What is the dos,
What does dos do how is it organized,
What is ms dos
25  cards
Transport Layer
Define sliding window 3 big points,
Tcp header field control bits des...,
Describe the 3 way handshake
19  cards
Network Services
Examples of network services,
Dhcp two types of addressing,
Dns what is the function
11  cards
IPv4 Header, IPv6, and TCP/UDP Header
How many fields for the ipv4 header,
What is the version field,
List the fields
32  cards
VTP/DTP/Etherchannel/Trunk services
What is dtp,
What are the four five modes of dtp,
What is a trunk link
47  cards
Attacking the foundation
Is ipv4 6 a connectionless protocol,
Ipv4 header how many fields,
How many bytes if the ipv4 header
42  cards
Module 18 Understanding Defense
Assets,
Vuln,
Threats
23  cards
Module 19 Access Control
What is the cia triad,
What is confidentiality,
What is integrity
30  cards
Module 20 Threat Intelligence
What must you do to effectively p...,
What is the sans institute,
What is mitre
14  cards
Module 21 Public Key Cryptography
1  cards
Module 22 Endpoint Protection
Why are endpoints threats,
How to define endpoints,
Where do many attacks originate f...
27  cards
Module 23 Endpoint Vulnerability Assessment
What is network profiling,
What is a server profile,
What is network anomaly detection
36  cards
Module 24 Technologies and Protocols
What port does syslog servers uti...,
Why are ntp and syslog important,
Why is attacking a syslog server ...
20  cards
Module 25 Network Security Data
What are some network security mo...,
What is an example of a network ids,
What is alert data
51  cards
Module 26 Evaluating Alerts
What is a security onion,
What are some of the collecting t...,
What are our analysis tools
34  cards
Module 27 Working with Network Security Data
What are the core elements for elk,
What is kibana,
What is beats
8  cards
Module 28 Digital Forensics
1  cards

More about
cyberops

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Chris Northrup's CyberOPS flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

MODULE 19 - Access Control CERTIFICAT...
  • 1 decks
  • 42 flashcards
  • 3 learners
Decks: Module 19 Certification Cyber Ops Associ, And more!
MODULE 20 - Threat Intelligence CERTI...
  • 1 decks
  • 27 flashcards
  • 5 learners
Decks: Module 20 Certification Cyber Ops Associ, And more!
MODULE 5 - Network Protocols CERTIFIC...
  • 1 decks
  • 56 flashcards
  • 8 learners
Decks: Module 5 Certification Cyber Ops Associa, And more!
Cyberops
  • 14 decks
  • 103 flashcards
  • 2 learners
Decks: Module 01 The Dangers, Module 02 Fighters In The War Against Cy, Module 03 The Windows Operating System, And more!
Make Flashcards