Recently Updated Pages
The role of triage in incident response
As you've learned, security analysts can be flooded with a large amount of alerts on any given da...
Generic Phishing Playbook Version 1.0
links to original google doc Purpose 2 Using this playbook 2 Step 1: Receive phishing alert 2 ...
The value of cybersecurity playbooks
Have you ever taken a trip to a place you've never visited before? You may have used a tr...
Document evidence with chain of custody forms
Let's continue our discussion on how documentation provides transparency through documents ...
Best practices for effective documentation
Documentation is any form of recorded content that is used for a specific purpose, and it is esse...
Analyze indicators of compromise with investigative tools
So far, you've learned about the different types of detection methods that can be used to dete...
The benefits of documentation
You may recall our discussion on the different documentation tools and types used by securi...
Analyze indicators of compromise with investigative tools
So far, you've learned about the different types of detection methods that can be used to detect ...
Indicators of compromise
In this reading, you’ll be introduced to the concept of the Pyramid of Pain and you'll explore ex...
MK: Changes in the cybersecurity industry
Hi, I'm MK, Director in the Office of the CISO for Google Cloud. The role of the Chief Inform...
Cybersecurity incident detection methods
Security analysts use detection tools to help them discover threats, but there are additional met...
Welcome to module 3 ; The detection and analysis phase of the lifecycle
Welcome back! I want to commend you on such a fantastic job you're doing so far. The sk...
Wrap-up; Terms and definitions from Course 6, Module 2
Nice work so far!ddddddddddddddd Congratulations on capturing and analyzing your first pac...
Activity: Research network protocol analyzers
i probably legally cant give you anything coz its an activitybut here is the gist In this activi...
example tcp dump activity
Use ifconfig to identify the interfaces that are available: sudo ifconfig example output ana...
Packet captures with tcpdump
Tcpdump is a popular network analyzer. It's pre-installed on many Linux distributions and...
Investigate packet details
So far, you've learned about how network protocol analyzers (packet sniffers) intercept network c...
Reexamine the fields of a packet header
While there are many different tools available to use, it's important as a security analyst...
Interpret network communications with packets
If a packet capture is like intercepting an envelope in the mail, then packet analysis is l...
Learn more about packet captures
The role of security analysts involves monitoring and analyzing network traffic flows. One way to...