Recently Updated Pages
Overview of log file formats
You’ve learned about how logs record events that happen on a network, or system. In security, log...
Variations of logs
When you purchase an item in a store, you usually receive a receipt as a record of purchase.The r...
Rebecca: Learn new tools and technologies
I am Rebecca, I'm a security engineer at Google, and I focus in identity management.The best part...
Best practices for log collection and management
In this reading, you’ll examine some best practices related to log management, storage, and prote...
The importance of logs
Devices produced data in the form of events.As a refresher, events are observable occurrences tha...
The importance of logs
Devices produced data in the form of events.As a refresher, events are observable occurrences tha...
Welcome to module 4
History books. Receipts. Diaries.What do all these things have in common?They record events.Wheth...
Introduction to Course 6
Security attacks are on the rise, and new vulnerabilities are exploited and discovered ever...
Terms and definitions from the certificate
Google Cybersecurity Certificate glossary from: "Sound the Alarm: Detection and Response; part 6 ...
Dave: Grow your cybersecurity career with mentors
My name is Dave. I'm a Principal Security Strategist with Google Cloud. My job is to work d...
Welcome to week 1
Welcome. In my role as Principal Security Strategist, I've seen how the incident response...
Introduction to the incident response lifecycle
Incident lifecycle frameworks provide a structure to support incident response operations. ...
Incident response teams
Hi again! In this section, we'll discuss how incident response teams manage incidents. ...
Fatima: The importance of communication during incident response
My name is Fatima, and I'm a tech lead manager on Google's Detection and Response Team. If th...
Roles in response
So far, you've been introduced to the National Institute of Standards and Technology (NIST) Incid...
Incident response plans
So you've learned about incident response teams, the different types of roles, and their ...
Incident response tools
As a security analyst, you'll play an important role in incident detection. After all, yo...
The value of documentation
Hi there. Previously, you learned how an incident handler's journal is used for documenti...
Intrusion detection systems
In this video, we'll introduce you to intrusion detection and intrusion prevention systems....
Overview of detection tools
Previously, you explored intrusion detection system (IDS) and intrusion prevention system (IPS) t...