Recently Updated Pages
Akash: Python and the cybersecurity professional
My name is Akash, and I work as a Security Engineer at Google.As a cybersecurity engineer, you wo...
copy paste this into a .html this is what the lab looks like
<!DOCTYPE html> <html> <head><meta charset="utf-8" /> <title>LAB_Activity_PracticeWritingPyt...
Python environments
You can run Python through a variety of environments. These environments include notebooks, integ...
Create a basic Python script
Hi there.Previously, we discussed the basics of Python.Now we'll practice writing and running cod...
Get to know Python!
Why might a security analyst choose Python to automate tasks? Python resembles human language a...
Python and cybersecurity
Security professionals use a variety of tools.One of those tools is computer programming.Programm...
Welcome to module 1
The process of learning a new programming language is similar to learning a new language.For inst...
Ángel: My personal career journey
My name is Ángel, and I'm a Security Engineer at Google.There were a number of things in my life ...
Introduction to Course 7
The demand for security professionals has never been higher.Organizations across the world requir...
Crouse Outline ?
You will get an introduction to the Python programming language and how Python is used in cyberse...
New Page
PICOCTF WPA-ing Out (Rockyou word list + aircrack-ng)
| 200 pointsTags: picoGym ExclusiveForensics Author: MistressVampyDescriptionI thought that my p...
Python Wrangling
files you will need ende.py import sys import base64 from cryptography.fernet import Fern...
Terms and definitions from Course 6, course 6 glossary
A Advanced persistent threat (APT): An instance when a threat actor maintains unauthorized ac...
Course wrap-up
Congratulations on completing this course on detection and response!As you've progressed, we've c...
Wrap-up; Glossary terms from module 4
Congratulations!You've made it to the end of this section.You've made so much progress in your se...
Follow-along guide for Splunk sign-up
Note: The following reading is an optional supplement to the following course item, Activity: Per...
Search methods with SIEM tools
So far, you’ve learned about how you can use security information and event management (SIEM) too...
Query for events with Splunk
Now that we've reviewed how a SIEM works, let's learn how to search and query events in a SIEM da...
Log sources and log ingestion
In this reading, you’ll explore more on the importance of log ingestion. You may recall that secu...