Recently Updated Pages
Alert and event management with SIEM and SOAR tools
Our discussion on detection tools may have left you wondering where alerts are sent and h...
Wrap-up; Terms and definitions from Course 6, Week 1
Way to go! You made it through a new section, and you've learned a lot. ...
Welcome to week 2
Welcome back! I'm so glad you're joining us. Previously, you were introduced to incident ...
Casey: Apply soft skills in cybersecurity
Hi, my name is Casey and I'm part of the Google Cloud Enterprise Security sales team. First o...
The importance of network traffic flows
In many organizations, network communication travels over multiple networks in different co...
Maintain awareness with network monitoring
Network communication can be noisy! Events like sending an email, streaming a video, or visiting ...
Data exfiltration attacks
Monitoring network traffic helps security professionals detect, prevent, and respond to att...
Packets and packet captures
Whether it's an employee sending an email or a malicious actor attempting to exfiltrate con...
Learn more about packet captures
The role of security analysts involves monitoring and analyzing network traffic flows. One way to...
Interpret network communications with packets
If a packet capture is like intercepting an envelope in the mail, then packet analysis is l...
Reexamine the fields of a packet header
While there are many different tools available to use, it's important as a security analyst...
Investigate packet details
So far, you've learned about how network protocol analyzers (packet sniffers) intercept network c...
Packet captures with tcpdump
Tcpdump is a popular network analyzer. It's pre-installed on many Linux distributions and...
example tcp dump activity
Use ifconfig to identify the interfaces that are available: sudo ifconfig example output ana...
Activity: Research network protocol analyzers
i probably legally cant give you anything coz its an activitybut here is the gist In this activi...
Wrap-up; Terms and definitions from Course 6, Module 2
Nice work so far!ddddddddddddddd Congratulations on capturing and analyzing your first pac...
Welcome to module 3 ; The detection and analysis phase of the lifecycle
Welcome back! I want to commend you on such a fantastic job you're doing so far. The sk...
Cybersecurity incident detection methods
Security analysts use detection tools to help them discover threats, but there are additional met...
MK: Changes in the cybersecurity industry
Hi, I'm MK, Director in the Office of the CISO for Google Cloud. The role of the Chief Inform...
Indicators of compromise
In this reading, you’ll be introduced to the concept of the Pyramid of Pain and you'll explore ex...