Skip to main content

Recently Updated Pages

Overview of log file formats

[Completed] Professional Google Cyberse...

You’ve learned about how logs record events that happen on a network, or system. In security, log...

Updated 2 years ago by naruzkurai

Variations of logs

[Completed] Professional Google Cyberse...

When you purchase an item in a store, you usually receive a receipt as a record of purchase.The r...

Updated 2 years ago by naruzkurai

Rebecca: Learn new tools and technologies

[Completed] Professional Google Cyberse...

I am Rebecca, I'm a security engineer at Google, and I focus in identity management.The best part...

Updated 2 years ago by naruzkurai

Best practices for log collection and management

[Completed] Professional Google Cyberse...

In this reading, you’ll examine some best practices related to log management, storage, and prote...

Updated 2 years ago by naruzkurai

The importance of logs

[Completed] Professional Google Cyberse...

Devices produced data in the form of events.As a refresher, events are observable occurrences tha...

Updated 2 years ago by naruzkurai

The importance of logs

[Completed] Professional Google Cyberse...

Devices produced data in the form of events.As a refresher, events are observable occurrences tha...

Updated 2 years ago by naruzkurai

Welcome to module 4

[Completed] Professional Google Cyberse...

History books. Receipts. Diaries.What do all these things have in common?They record events.Wheth...

Updated 2 years ago by naruzkurai

Introduction to Course 6

[Completed] Professional Google Cyberse...

Security attacks are on the rise, and new vulnerabilities are exploited and discovered ever...

Updated 2 years ago by naruzkurai

Terms and definitions from the certificate

[Completed] Professional Google Cyberse...

Google Cybersecurity Certificate glossary from: "Sound the Alarm: Detection and Response; part 6 ...

Updated 2 years ago by naruzkurai

Dave: Grow your cybersecurity career with mentors

[Completed] Professional Google Cyberse...

My name is Dave.  I'm a Principal Security Strategist with Google Cloud.  My job is to work d...

Updated 2 years ago by naruzkurai

Welcome to week 1

[Completed] Professional Google Cyberse...

Welcome. In my role as Principal Security Strategist, I've seen how the incident response...

Updated 2 years ago by naruzkurai

Introduction to the incident response lifecycle

[Completed] Professional Google Cyberse...

Incident lifecycle frameworks provide a structure to support incident response operations. ...

Updated 2 years ago by naruzkurai

Incident response teams

[Completed] Professional Google Cyberse...

Hi again! In this section, we'll discuss how incident response teams manage incidents.  ...

Updated 2 years ago by naruzkurai

Fatima: The importance of communication during incident response

[Completed] Professional Google Cyberse...

My name is Fatima, and I'm a tech lead manager on Google's Detection and Response Team. If th...

Updated 2 years ago by naruzkurai

Roles in response

[Completed] Professional Google Cyberse...

So far, you've been introduced to the National Institute of Standards and Technology (NIST) Incid...

Updated 2 years ago by naruzkurai

Incident response plans

[Completed] Professional Google Cyberse...

So you've learned about incident response teams, the different types of roles, and their ...

Updated 2 years ago by naruzkurai

Incident response tools

[Completed] Professional Google Cyberse...

As a security analyst, you'll play an important role in incident detection. After all, yo...

Updated 2 years ago by naruzkurai

The value of documentation

[Completed] Professional Google Cyberse...

Hi there. Previously, you learned how an incident handler's journal is used for documenti...

Updated 2 years ago by naruzkurai

Intrusion detection systems

[Completed] Professional Google Cyberse...

In this video, we'll introduce you to intrusion detection and intrusion prevention systems....

Updated 2 years ago by naruzkurai

Overview of detection tools

[Completed] Professional Google Cyberse...

Previously, you explored intrusion detection system (IDS) and intrusion prevention system (IPS) t...

Updated 2 years ago by naruzkurai