Recently Updated Pages
New Page
PICOCTF WPA-ing Out (Rockyou word list + aircrack-ng)
| 200 pointsTags: picoGym ExclusiveForensics Author: MistressVampyDescriptionI thought that my p...
Python Wrangling
files you will need ende.py import sys import base64 from cryptography.fernet import Fern...
Terms and definitions from Course 6, course 6 glossary
A Advanced persistent threat (APT): An instance when a threat actor maintains unauthorized ac...
Course wrap-up
Congratulations on completing this course on detection and response!As you've progressed, we've c...
Wrap-up; Glossary terms from module 4
Congratulations!You've made it to the end of this section.You've made so much progress in your se...
Follow-along guide for Splunk sign-up
Note: The following reading is an optional supplement to the following course item, Activity: Per...
Search methods with SIEM tools
So far, you’ve learned about how you can use security information and event management (SIEM) too...
Query for events with Splunk
Now that we've reviewed how a SIEM works, let's learn how to search and query events in a SIEM da...
Log sources and log ingestion
In this reading, you’ll explore more on the importance of log ingestion. You may recall that secu...
Reexamine SIEM tools
As a security analyst, you'll need to be able to quickly access the relevant data required to per...
Activity: Explore signatures and logs with Suricata
Introduction In this lab activity, you'll explore the components of a rule using Suricata. You'l...
Overview of Suricata
So far, you've learned about detection signatures and you were introduced to Suricata, an inciden...
Examine Suricata logs
Now let's examine some logs generated by Suricata.In Suricata, alerts and events are output in a ...
Examine signatures with Suricata
Previously, you learned about signature-based analysis.You also learned how to read signatures us...
Examine signatures with Suricata
Previously, you learned about signature-based analysis.You also learned how to read signatures us...
Components of a detection signature
As a security analyst, you may be tasked with writing, customizing, or testing signatures.To do t...
Grace: Security mindset in detection and response
Hi, I'm Grace, and I work in Detection and Response at Google.When I tell people what I do, they...
Detection tools and techniques
In this reading, you’ll examine the different types of intrusion detection system (IDS) technolog...
Security monitoring with detection tools
Detection requires data, and this data can come from various data sources.You've already explored...