Recently Updated Pages
Get to know Python!
Why might a security analyst choose Python to automate tasks? Python resembles human language a...
Python and cybersecurity
Security professionals use a variety of tools.One of those tools is computer programming.Programm...
Welcome to module 1
The process of learning a new programming language is similar to learning a new language.For inst...
Ángel: My personal career journey
My name is Ángel, and I'm a Security Engineer at Google.There were a number of things in my life ...
Introduction to Course 7
The demand for security professionals has never been higher.Organizations across the world requir...
Crouse Outline ?
You will get an introduction to the Python programming language and how Python is used in cyberse...
New Page
PICOCTF WPA-ing Out (Rockyou word list + aircrack-ng)
| 200 pointsTags: picoGym ExclusiveForensics Author: MistressVampyDescriptionI thought that my p...
Python Wrangling
files you will need ende.py import sys import base64 from cryptography.fernet import Fern...
Terms and definitions from Course 6, course 6 glossary
A Advanced persistent threat (APT): An instance when a threat actor maintains unauthorized ac...
Course wrap-up
Congratulations on completing this course on detection and response!As you've progressed, we've c...
Wrap-up; Glossary terms from module 4
Congratulations!You've made it to the end of this section.You've made so much progress in your se...
Follow-along guide for Splunk sign-up
Note: The following reading is an optional supplement to the following course item, Activity: Per...
Search methods with SIEM tools
So far, you’ve learned about how you can use security information and event management (SIEM) too...
Query for events with Splunk
Now that we've reviewed how a SIEM works, let's learn how to search and query events in a SIEM da...
Log sources and log ingestion
In this reading, you’ll explore more on the importance of log ingestion. You may recall that secu...
Reexamine SIEM tools
As a security analyst, you'll need to be able to quickly access the relevant data required to per...
Activity: Explore signatures and logs with Suricata
Introduction In this lab activity, you'll explore the components of a rule using Suricata. You'l...
Overview of Suricata
So far, you've learned about detection signatures and you were introduced to Suricata, an inciden...
Examine Suricata logs
Now let's examine some logs generated by Suricata.In Suricata, alerts and events are output in a ...