Skip to main content

Recently Updated Pages

Examine signatures with Suricata

[Completed] Professional Google Cyberse...

Previously, you learned about signature-based analysis.You also learned how to read signatures us...

Updated 1 year ago by naruzkurai

Examine signatures with Suricata

[Completed] Professional Google Cyberse...

Previously, you learned about signature-based analysis.You also learned how to read signatures us...

Updated 1 year ago by naruzkurai

Components of a detection signature

[Completed] Professional Google Cyberse...

As a security analyst, you may be tasked with writing, customizing, or testing signatures.To do t...

Updated 1 year ago by naruzkurai

Grace: Security mindset in detection and response

[Completed] Professional Google Cyberse...

 Hi, I'm Grace, and I work in Detection and Response at Google.When I tell people what I do, they...

Updated 1 year ago by naruzkurai

Detection tools and techniques

[Completed] Professional Google Cyberse...

In this reading, you’ll examine the different types of intrusion detection system (IDS) technolog...

Updated 1 year ago by naruzkurai

Security monitoring with detection tools

[Completed] Professional Google Cyberse...

Detection requires data, and this data can come from various data sources.You've already explored...

Updated 1 year ago by naruzkurai

Overview of log file formats

[Completed] Professional Google Cyberse...

You’ve learned about how logs record events that happen on a network, or system. In security, log...

Updated 1 year ago by naruzkurai

Variations of logs

[Completed] Professional Google Cyberse...

When you purchase an item in a store, you usually receive a receipt as a record of purchase.The r...

Updated 1 year ago by naruzkurai

Rebecca: Learn new tools and technologies

[Completed] Professional Google Cyberse...

I am Rebecca, I'm a security engineer at Google, and I focus in identity management.The best part...

Updated 1 year ago by naruzkurai

Best practices for log collection and management

[Completed] Professional Google Cyberse...

In this reading, you’ll examine some best practices related to log management, storage, and prote...

Updated 1 year ago by naruzkurai

The importance of logs

[Completed] Professional Google Cyberse...

Devices produced data in the form of events.As a refresher, events are observable occurrences tha...

Updated 1 year ago by naruzkurai

The importance of logs

[Completed] Professional Google Cyberse...

Devices produced data in the form of events.As a refresher, events are observable occurrences tha...

Updated 1 year ago by naruzkurai

Welcome to module 4

[Completed] Professional Google Cyberse...

History books. Receipts. Diaries.What do all these things have in common?They record events.Wheth...

Updated 1 year ago by naruzkurai

Wrap-up; Terms and definitions from Course 6, Module 3

[Completed] Professional Google Cyberse...

That wraps up our discussion on incident investigation and response.Nice work on finishing up ano...

Updated 1 year ago by naruzkurai

Post-incident review

[Completed] Professional Google Cyberse...

Previously, you explored the Containment, Eradication and Recovery phase of the NIST Incident Res...

Updated 1 year ago by naruzkurai

The post-incident activity phase of the lifecycle

[Completed] Professional Google Cyberse...

Now that a security team has successfully contained eradicated and recovered from an incident, th...

Updated 1 year ago by naruzkurai

Business continuity considerations

[Completed] Professional Google Cyberse...

Previously, you learned about how security teams develop incident response plans to help ensure t...

Updated 1 year ago by naruzkurai

The containment, eradication, and recovery phase of the lifecycle

[Completed] Professional Google Cyberse...

 In this video, we'll discuss the third phase of the incident response lifecycle. This phase incl...

Updated 1 year ago by naruzkurai

The triage process

[Completed] Professional Google Cyberse...

Previously, you learned that triaging is used to assess alerts and assign priority to incidents. ...

Updated 1 year ago by naruzkurai

Robin: Foster cross-team collaboration

[Completed] Professional Google Cyberse...

  My name is Robin, and I am the program management lead for the Red Team at Google. I would say ...

Updated 1 year ago by naruzkurai