Recently Updated Pages
MK: Changes in the cybersecurity industry
Hi, I'm MK, Director in the Office of the CISO for Google Cloud. The role of the Chief Inform...
Indicators of compromise
In this reading, you’ll be introduced to the concept of the Pyramid of Pain and you'll explore ex...
Analyze indicators of compromise with investigative tools
So far, you've learned about the different types of detection methods that can be used to detect ...
The benefits of documentation
You may recall our discussion on the different documentation tools and types used by securi...
Analyze indicators of compromise with investigative tools
So far, you've learned about the different types of detection methods that can be used to dete...
Best practices for effective documentation
Documentation is any form of recorded content that is used for a specific purpose, and it is esse...
Document evidence with chain of custody forms
Let's continue our discussion on how documentation provides transparency through documents ...
The value of cybersecurity playbooks
Have you ever taken a trip to a place you've never visited before? You may have used a tr...
Generic Phishing Playbook Version 1.0
links to original google doc Purpose 2 Using this playbook 2 Step 1: Receive phishing alert 2 ...
The role of triage in incident response
As you've learned, security analysts can be flooded with a large amount of alerts on any given da...
Robin: Foster cross-team collaboration
My name is Robin, and I am the program management lead for the Red Team at Google. I would say ...
The triage process
Previously, you learned that triaging is used to assess alerts and assign priority to incidents. ...
The containment, eradication, and recovery phase of the lifecycle
In this video, we'll discuss the third phase of the incident response lifecycle. This phase incl...
Business continuity considerations
Previously, you learned about how security teams develop incident response plans to help ensure t...
The post-incident activity phase of the lifecycle
Now that a security team has successfully contained eradicated and recovered from an incident, th...
Post-incident review
Previously, you explored the Containment, Eradication and Recovery phase of the NIST Incident Res...
Wrap-up; Terms and definitions from Course 6, Module 3
That wraps up our discussion on incident investigation and response.Nice work on finishing up ano...
Page 1
We are born from the blood of a draconic god, an 8 headed dragon, Nykveru god of ××××× was the gu...
Xkhanku desert
In the desert of Xkhanku, on the land of Taurosia, there resides an ecosystem both cruel and sing...
Flaming Feathers v2? or v1 idk
The Sandbird (Sandavis desertus), also known as the "Flaming Feathers," is a species of reptile t...