Recently Updated Pages
Examine signatures with Suricata
Previously, you learned about signature-based analysis.You also learned how to read signatures us...
Examine signatures with Suricata
Previously, you learned about signature-based analysis.You also learned how to read signatures us...
Components of a detection signature
As a security analyst, you may be tasked with writing, customizing, or testing signatures.To do t...
Grace: Security mindset in detection and response
Hi, I'm Grace, and I work in Detection and Response at Google.When I tell people what I do, they...
Detection tools and techniques
In this reading, you’ll examine the different types of intrusion detection system (IDS) technolog...
Security monitoring with detection tools
Detection requires data, and this data can come from various data sources.You've already explored...
Overview of log file formats
You’ve learned about how logs record events that happen on a network, or system. In security, log...
Variations of logs
When you purchase an item in a store, you usually receive a receipt as a record of purchase.The r...
Rebecca: Learn new tools and technologies
I am Rebecca, I'm a security engineer at Google, and I focus in identity management.The best part...
Best practices for log collection and management
In this reading, you’ll examine some best practices related to log management, storage, and prote...
The importance of logs
Devices produced data in the form of events.As a refresher, events are observable occurrences tha...
The importance of logs
Devices produced data in the form of events.As a refresher, events are observable occurrences tha...
Welcome to module 4
History books. Receipts. Diaries.What do all these things have in common?They record events.Wheth...
Wrap-up; Terms and definitions from Course 6, Module 3
That wraps up our discussion on incident investigation and response.Nice work on finishing up ano...
Post-incident review
Previously, you explored the Containment, Eradication and Recovery phase of the NIST Incident Res...
The post-incident activity phase of the lifecycle
Now that a security team has successfully contained eradicated and recovered from an incident, th...
Business continuity considerations
Previously, you learned about how security teams develop incident response plans to help ensure t...
The containment, eradication, and recovery phase of the lifecycle
In this video, we'll discuss the third phase of the incident response lifecycle. This phase incl...
The triage process
Previously, you learned that triaging is used to assess alerts and assign priority to incidents. ...
Robin: Foster cross-team collaboration
My name is Robin, and I am the program management lead for the Red Team at Google. I would say ...