Recently Updated Pages
Packets and packet captures
Whether it's an employee sending an email or a malicious actor attempting to exfiltrate con...
Data exfiltration attacks
Monitoring network traffic helps security professionals detect, prevent, and respond to att...
Maintain awareness with network monitoring
Network communication can be noisy! Events like sending an email, streaming a video, or visiting ...
The importance of network traffic flows
In many organizations, network communication travels over multiple networks in different co...
Casey: Apply soft skills in cybersecurity
Hi, my name is Casey and I'm part of the Google Cloud Enterprise Security sales team. First o...
Welcome to week 2
Welcome back! I'm so glad you're joining us. Previously, you were introduced to incident ...
Wrap-up; Terms and definitions from Course 6, Week 1
Way to go! You made it through a new section, and you've learned a lot. ...
Alert and event management with SIEM and SOAR tools
Our discussion on detection tools may have left you wondering where alerts are sent and h...
Overview of detection tools
Previously, you explored intrusion detection system (IDS) and intrusion prevention system (IPS) t...
Intrusion detection systems
In this video, we'll introduce you to intrusion detection and intrusion prevention systems....
The value of documentation
Hi there. Previously, you learned how an incident handler's journal is used for documenti...
Incident response tools
As a security analyst, you'll play an important role in incident detection. After all, yo...
Incident response plans
So you've learned about incident response teams, the different types of roles, and their ...
Roles in response
So far, you've been introduced to the National Institute of Standards and Technology (NIST) Incid...
Fatima: The importance of communication during incident response
My name is Fatima, and I'm a tech lead manager on Google's Detection and Response Team. If th...
Incident response teams
Hi again! In this section, we'll discuss how incident response teams manage incidents. ...
Introduction to the incident response lifecycle
Incident lifecycle frameworks provide a structure to support incident response operations. ...
Welcome to week 1
Welcome. In my role as Principal Security Strategist, I've seen how the incident response...
Dave: Grow your cybersecurity career with mentors
My name is Dave. I'm a Principal Security Strategist with Google Cloud. My job is to work d...
Terms and definitions from the certificate
Google Cybersecurity Certificate glossary from: "Sound the Alarm: Detection and Response; part 6 ...