Skip to main content

Recently Updated Pages

Examine signatures with Suricata

[Completed] Professional Google Cyberse...

Previously, you learned about signature-based analysis.You also learned how to read signatures us...

Updated 10 months ago by naruzkurai

Examine signatures with Suricata

[Completed] Professional Google Cyberse...

Previously, you learned about signature-based analysis.You also learned how to read signatures us...

Updated 10 months ago by naruzkurai

Components of a detection signature

[Completed] Professional Google Cyberse...

As a security analyst, you may be tasked with writing, customizing, or testing signatures.To do t...

Updated 10 months ago by naruzkurai

Grace: Security mindset in detection and response

[Completed] Professional Google Cyberse...

 Hi, I'm Grace, and I work in Detection and Response at Google.When I tell people what I do, they...

Updated 10 months ago by naruzkurai

Detection tools and techniques

[Completed] Professional Google Cyberse...

In this reading, you’ll examine the different types of intrusion detection system (IDS) technolog...

Updated 10 months ago by naruzkurai

Security monitoring with detection tools

[Completed] Professional Google Cyberse...

Detection requires data, and this data can come from various data sources.You've already explored...

Updated 10 months ago by naruzkurai

Overview of log file formats

[Completed] Professional Google Cyberse...

You’ve learned about how logs record events that happen on a network, or system. In security, log...

Updated 10 months ago by naruzkurai

Variations of logs

[Completed] Professional Google Cyberse...

When you purchase an item in a store, you usually receive a receipt as a record of purchase.The r...

Updated 10 months ago by naruzkurai

Rebecca: Learn new tools and technologies

[Completed] Professional Google Cyberse...

I am Rebecca, I'm a security engineer at Google, and I focus in identity management.The best part...

Updated 10 months ago by naruzkurai

Best practices for log collection and management

[Completed] Professional Google Cyberse...

In this reading, you’ll examine some best practices related to log management, storage, and prote...

Updated 10 months ago by naruzkurai

The importance of logs

[Completed] Professional Google Cyberse...

Devices produced data in the form of events.As a refresher, events are observable occurrences tha...

Updated 10 months ago by naruzkurai

The importance of logs

[Completed] Professional Google Cyberse...

Devices produced data in the form of events.As a refresher, events are observable occurrences tha...

Updated 10 months ago by naruzkurai

Welcome to module 4

[Completed] Professional Google Cyberse...

History books. Receipts. Diaries.What do all these things have in common?They record events.Wheth...

Updated 10 months ago by naruzkurai

Wrap-up; Terms and definitions from Course 6, Module 3

[Completed] Professional Google Cyberse...

That wraps up our discussion on incident investigation and response.Nice work on finishing up ano...

Updated 10 months ago by naruzkurai

Post-incident review

[Completed] Professional Google Cyberse...

Previously, you explored the Containment, Eradication and Recovery phase of the NIST Incident Res...

Updated 10 months ago by naruzkurai

The post-incident activity phase of the lifecycle

[Completed] Professional Google Cyberse...

Now that a security team has successfully contained eradicated and recovered from an incident, th...

Updated 10 months ago by naruzkurai

Business continuity considerations

[Completed] Professional Google Cyberse...

Previously, you learned about how security teams develop incident response plans to help ensure t...

Updated 10 months ago by naruzkurai

The containment, eradication, and recovery phase of the lifecycle

[Completed] Professional Google Cyberse...

 In this video, we'll discuss the third phase of the incident response lifecycle. This phase incl...

Updated 10 months ago by naruzkurai

The triage process

[Completed] Professional Google Cyberse...

Previously, you learned that triaging is used to assess alerts and assign priority to incidents. ...

Updated 10 months ago by naruzkurai

Robin: Foster cross-team collaboration

[Completed] Professional Google Cyberse...

  My name is Robin, and I am the program management lead for the Red Team at Google. I would say ...

Updated 10 months ago by naruzkurai