Skip to main content

Recently Updated Pages

Reexamine SIEM tools

[Completed] Professional Google Cyberse...

As a security analyst, you'll need to be able to quickly access the relevant data required to per...

Updated 1 year ago by naruzkurai

Activity: Explore signatures and logs with Suricata

[Completed] Professional Google Cyberse...

Introduction In this lab activity, you'll explore the components of a rule using Suricata. You'l...

Updated 1 year ago by naruzkurai

Overview of Suricata

[Completed] Professional Google Cyberse...

So far, you've learned about detection signatures and you were introduced to Suricata, an inciden...

Updated 1 year ago by naruzkurai

Examine Suricata logs

[Completed] Professional Google Cyberse...

Now let's examine some logs generated by Suricata.In Suricata, alerts and events are output in a ...

Updated 1 year ago by naruzkurai

Examine signatures with Suricata

[Completed] Professional Google Cyberse...

Previously, you learned about signature-based analysis.You also learned how to read signatures us...

Updated 1 year ago by naruzkurai

Examine signatures with Suricata

[Completed] Professional Google Cyberse...

Previously, you learned about signature-based analysis.You also learned how to read signatures us...

Updated 1 year ago by naruzkurai

Components of a detection signature

[Completed] Professional Google Cyberse...

As a security analyst, you may be tasked with writing, customizing, or testing signatures.To do t...

Updated 1 year ago by naruzkurai

Grace: Security mindset in detection and response

[Completed] Professional Google Cyberse...

 Hi, I'm Grace, and I work in Detection and Response at Google.When I tell people what I do, they...

Updated 1 year ago by naruzkurai

Detection tools and techniques

[Completed] Professional Google Cyberse...

In this reading, you’ll examine the different types of intrusion detection system (IDS) technolog...

Updated 1 year ago by naruzkurai

Security monitoring with detection tools

[Completed] Professional Google Cyberse...

Detection requires data, and this data can come from various data sources.You've already explored...

Updated 1 year ago by naruzkurai

Overview of log file formats

[Completed] Professional Google Cyberse...

You’ve learned about how logs record events that happen on a network, or system. In security, log...

Updated 1 year ago by naruzkurai

Variations of logs

[Completed] Professional Google Cyberse...

When you purchase an item in a store, you usually receive a receipt as a record of purchase.The r...

Updated 1 year ago by naruzkurai

Rebecca: Learn new tools and technologies

[Completed] Professional Google Cyberse...

I am Rebecca, I'm a security engineer at Google, and I focus in identity management.The best part...

Updated 1 year ago by naruzkurai

Best practices for log collection and management

[Completed] Professional Google Cyberse...

In this reading, you’ll examine some best practices related to log management, storage, and prote...

Updated 1 year ago by naruzkurai

The importance of logs

[Completed] Professional Google Cyberse...

Devices produced data in the form of events.As a refresher, events are observable occurrences tha...

Updated 1 year ago by naruzkurai

The importance of logs

[Completed] Professional Google Cyberse...

Devices produced data in the form of events.As a refresher, events are observable occurrences tha...

Updated 1 year ago by naruzkurai

Welcome to module 4

[Completed] Professional Google Cyberse...

History books. Receipts. Diaries.What do all these things have in common?They record events.Wheth...

Updated 1 year ago by naruzkurai

Wrap-up; Terms and definitions from Course 6, Module 3

[Completed] Professional Google Cyberse...

That wraps up our discussion on incident investigation and response.Nice work on finishing up ano...

Updated 1 year ago by naruzkurai

Post-incident review

[Completed] Professional Google Cyberse...

Previously, you explored the Containment, Eradication and Recovery phase of the NIST Incident Res...

Updated 1 year ago by naruzkurai

The post-incident activity phase of the lifecycle

[Completed] Professional Google Cyberse...

Now that a security team has successfully contained eradicated and recovered from an incident, th...

Updated 1 year ago by naruzkurai