Skip to main content

Recently Updated Pages

Get to know Python!

[Completed] Professional Google Cyberse... module 1

Why might a security analyst choose Python to automate tasks?  Python resembles human language a...

Updated 9 months ago by naruzkurai

Python and cybersecurity

[Completed] Professional Google Cyberse... module 1

Security professionals use a variety of tools.One of those tools is computer programming.Programm...

Updated 9 months ago by naruzkurai

Welcome to module 1

[Completed] Professional Google Cyberse... module 1

The process of learning a new programming language is similar to learning a new language.For inst...

Updated 9 months ago by naruzkurai

Ángel: My personal career journey

[Completed] Professional Google Cyberse... module 1

My name is Ángel, and I'm a Security Engineer at Google.There were a number of things in my life ...

Updated 9 months ago by naruzkurai

Introduction to Course 7

[Completed] Professional Google Cyberse... module 1

The demand for security professionals has never been higher.Organizations across the world requir...

Updated 9 months ago by naruzkurai

Crouse Outline ?

[Completed] Professional Google Cyberse... module 1

You will get an introduction to the Python programming language and how Python is used in cyberse...

Updated 9 months ago by naruzkurai

New Page

Ideas

 

Updated 11 months ago by naruzkurai

PICOCTF WPA-ing Out (Rockyou word list + aircrack-ng)

[Active] leet code/ctf

| 200 pointsTags: picoGym ExclusiveForensics Author: MistressVampyDescriptionI thought that my p...

Updated 11 months ago by naruzkurai

Python Wrangling

[Active] leet code/ctf

files you will need ende.py import sys import base64 from cryptography.fernet import Fern...

Updated 11 months ago by naruzkurai

Terms and definitions from Course 6, course 6 glossary

[Completed] Professional Google Cyberse...

  A Advanced persistent threat (APT): An instance when a threat actor maintains unauthorized ac...

Updated 11 months ago by naruzkurai

Course wrap-up

[Completed] Professional Google Cyberse...

Congratulations on completing this course on detection and response!As you've progressed, we've c...

Updated 11 months ago by naruzkurai

Wrap-up; Glossary terms from module 4

[Completed] Professional Google Cyberse...

Congratulations!You've made it to the end of this section.You've made so much progress in your se...

Updated 11 months ago by naruzkurai

Follow-along guide for Splunk sign-up

[Completed] Professional Google Cyberse...

Note: The following reading is an optional supplement to the following course item, Activity: Per...

Updated 11 months ago by naruzkurai

Search methods with SIEM tools

[Completed] Professional Google Cyberse...

So far, you’ve learned about how you can use security information and event management (SIEM) too...

Updated 11 months ago by naruzkurai

Query for events with Splunk

[Completed] Professional Google Cyberse...

Now that we've reviewed how a SIEM works, let's learn how to search and query events in a SIEM da...

Updated 11 months ago by naruzkurai

Log sources and log ingestion

[Completed] Professional Google Cyberse...

In this reading, you’ll explore more on the importance of log ingestion. You may recall that secu...

Updated 11 months ago by naruzkurai

Reexamine SIEM tools

[Completed] Professional Google Cyberse...

As a security analyst, you'll need to be able to quickly access the relevant data required to per...

Updated 11 months ago by naruzkurai

Activity: Explore signatures and logs with Suricata

[Completed] Professional Google Cyberse...

Introduction In this lab activity, you'll explore the components of a rule using Suricata. You'l...

Updated 11 months ago by naruzkurai

Overview of Suricata

[Completed] Professional Google Cyberse...

So far, you've learned about detection signatures and you were introduced to Suricata, an inciden...

Updated 11 months ago by naruzkurai

Examine Suricata logs

[Completed] Professional Google Cyberse...

Now let's examine some logs generated by Suricata.In Suricata, alerts and events are output in a ...

Updated 11 months ago by naruzkurai