Recently Updated Pages
Best practices for log collection and management
In this reading, you’ll examine some best practices related to log management, storage, and prote...
The importance of logs
Devices produced data in the form of events.As a refresher, events are observable occurrences tha...
The importance of logs
Devices produced data in the form of events.As a refresher, events are observable occurrences tha...
Welcome to module 4
History books. Receipts. Diaries.What do all these things have in common?They record events.Wheth...
Wrap-up; Terms and definitions from Course 6, Module 3
That wraps up our discussion on incident investigation and response.Nice work on finishing up ano...
Post-incident review
Previously, you explored the Containment, Eradication and Recovery phase of the NIST Incident Res...
The post-incident activity phase of the lifecycle
Now that a security team has successfully contained eradicated and recovered from an incident, th...
Business continuity considerations
Previously, you learned about how security teams develop incident response plans to help ensure t...
The containment, eradication, and recovery phase of the lifecycle
In this video, we'll discuss the third phase of the incident response lifecycle. This phase incl...
The triage process
Previously, you learned that triaging is used to assess alerts and assign priority to incidents. ...
Robin: Foster cross-team collaboration
My name is Robin, and I am the program management lead for the Red Team at Google. I would say ...
The role of triage in incident response
As you've learned, security analysts can be flooded with a large amount of alerts on any given da...
Generic Phishing Playbook Version 1.0
links to original google doc Purpose 2 Using this playbook 2 Step 1: Receive phishing alert 2 ...
The value of cybersecurity playbooks
Have you ever taken a trip to a place you've never visited before? You may have used a tr...
Document evidence with chain of custody forms
Let's continue our discussion on how documentation provides transparency through documents ...
Best practices for effective documentation
Documentation is any form of recorded content that is used for a specific purpose, and it is esse...
Analyze indicators of compromise with investigative tools
So far, you've learned about the different types of detection methods that can be used to dete...
The benefits of documentation
You may recall our discussion on the different documentation tools and types used by securi...
Analyze indicators of compromise with investigative tools
So far, you've learned about the different types of detection methods that can be used to detect ...
Indicators of compromise
In this reading, you’ll be introduced to the concept of the Pyramid of Pain and you'll explore ex...