Skip to main content

Recently Updated Pages

Investigate packet details

[Completed] Professional Google Cyberse...

So far, you've learned about how network protocol analyzers (packet sniffers) intercept network c...

Updated 1 year ago by naruzkurai

Reexamine the fields of a packet header

[Completed] Professional Google Cyberse...

While there are many different tools available to use, it's important as a security analyst...

Updated 1 year ago by naruzkurai

Interpret network communications with packets

[Completed] Professional Google Cyberse...

If a packet capture is like intercepting an envelope in the mail, then packet analysis is l...

Updated 1 year ago by naruzkurai

Learn more about packet captures

[Completed] Professional Google Cyberse...

The role of security analysts involves monitoring and analyzing network traffic flows. One way to...

Updated 1 year ago by naruzkurai

Packets and packet captures

[Completed] Professional Google Cyberse...

Whether it's an employee sending an email or a malicious actor attempting to exfiltrate con...

Updated 1 year ago by naruzkurai

Data exfiltration attacks

[Completed] Professional Google Cyberse...

Monitoring network traffic helps security professionals detect, prevent, and respond to att...

Updated 1 year ago by naruzkurai

Maintain awareness with network monitoring

[Completed] Professional Google Cyberse...

Network communication can be noisy! Events like sending an email, streaming a video, or visiting ...

Updated 1 year ago by naruzkurai

The importance of network traffic flows

[Completed] Professional Google Cyberse...

In many organizations, network communication travels over multiple networks in different co...

Updated 1 year ago by naruzkurai

Casey: Apply soft skills in cybersecurity

[Completed] Professional Google Cyberse...

Hi, my name is Casey and I'm part of the Google Cloud Enterprise Security sales team. First o...

Updated 1 year ago by naruzkurai

Welcome to week 2

[Completed] Professional Google Cyberse...

Welcome back! I'm so glad you're joining us. Previously, you were introduced to incident ...

Updated 1 year ago by naruzkurai

Wrap-up; Terms and definitions from Course 6, Week 1

[Completed] Professional Google Cyberse...

Way to go! You made it through a new section, and you've learned a lot. ...

Updated 1 year ago by naruzkurai

Alert and event management with SIEM and SOAR tools

[Completed] Professional Google Cyberse...

Our discussion on detection tools may have left you wondering where alerts are sent and h...

Updated 1 year ago by naruzkurai

Overview of detection tools

[Completed] Professional Google Cyberse...

Previously, you explored intrusion detection system (IDS) and intrusion prevention system (IPS) t...

Updated 1 year ago by naruzkurai

Intrusion detection systems

[Completed] Professional Google Cyberse...

In this video, we'll introduce you to intrusion detection and intrusion prevention systems....

Updated 1 year ago by naruzkurai

The value of documentation

[Completed] Professional Google Cyberse...

Hi there. Previously, you learned how an incident handler's journal is used for documenti...

Updated 1 year ago by naruzkurai

Incident response tools

[Completed] Professional Google Cyberse...

As a security analyst, you'll play an important role in incident detection. After all, yo...

Updated 1 year ago by naruzkurai

Incident response plans

[Completed] Professional Google Cyberse...

So you've learned about incident response teams, the different types of roles, and their ...

Updated 1 year ago by naruzkurai

Roles in response

[Completed] Professional Google Cyberse...

So far, you've been introduced to the National Institute of Standards and Technology (NIST) Incid...

Updated 1 year ago by naruzkurai

Fatima: The importance of communication during incident response

[Completed] Professional Google Cyberse...

My name is Fatima, and I'm a tech lead manager on Google's Detection and Response Team. If th...

Updated 1 year ago by naruzkurai

Incident response teams

[Completed] Professional Google Cyberse...

Hi again! In this section, we'll discuss how incident response teams manage incidents.  ...

Updated 1 year ago by naruzkurai