Skip to main content

Recently Updated Pages

Lesson 2.1 - Player Positioning

[zzz dead] unity devlog: jr programmer ... Unit 2

Summary Overview: You will begin this unit by creating a new project for your se...

Updated 1 year ago by naruzkurai

Introduction

[zzz dead] unity devlog: jr programmer ... Unit 2

we will make a top down prototype where you shoot things that come after you, kindof like galiga ...

Updated 1 year ago by naruzkurai

tenses (finsh plz)

Kuroik Dictionary

Basic Tenses: These are the simplest tenses in Kuroik. They indicate the general time frame o...

Updated 1 year ago by naruzkurai

code quizze sites :D

cool stuff

https://neetcode.io/https://leetcode.com/problemset/all/https://www.lintcode.com/problem/659/ if...

Updated 1 year ago by naruzkurai

Glossary Cybersecurity Terms and definitions from Course 2

[Completed] Professional Google Cyberse...

  AAntivirus software: A software program used to prevent, detect, and eliminatemalware and viru...

Updated 1 year ago by naruzkurai

Course wrap-up

[Completed] Professional Google Cyberse...

Congratulations on completing this course! Let's recap what we've covered so far. First, we revie...

Updated 1 year ago by naruzkurai

Glossary terms from week 4

[Completed] Professional Google Cyberse...

Terms and definitions from Course 2, Week 4 Antivirus software: A software program used to preve...

Updated 1 year ago by naruzkurai

Wrap-up

[Completed] Professional Google Cyberse... Explore incident response

Let's review what we covered in this section. We began by discussing the purpose of playbooks.The...

Updated 1 year ago by naruzkurai

Playbooks, SIEM tools, and SOAR tools

[Completed] Professional Google Cyberse... Explore incident response

Playbooks and SIEM tools Previously, you learned that security teams encounter threats, risks, v...

Updated 1 year ago by naruzkurai

Erin: The importance of diversity of perspective on a security team

[Completed] Professional Google Cyberse... Explore incident response

Hi everyone. My name is Erin and I am a privacy engineer at Google. I work on speculative and eme...

Updated 1 year ago by naruzkurai

Use a playbook to respond to threats, risks, or vulnerabilities

[Completed] Professional Google Cyberse... Explore incident response

Welcome back! In this video, we're going to revisit SIEM tools and how they're used alongside pla...

Updated 1 year ago by naruzkurai

Zack: Incident response and the value of playbooks

[Completed] Professional Google Cyberse... Phases of incident response playbooks

My name is Zack. I'm a Software Engineer on the security team in Google Workspace. I have non-tra...

Updated 1 year ago by naruzkurai

More about playbooks

[Completed] Professional Google Cyberse... Phases of incident response playbooks

Previously, you learned that playbooks are tools used by cybersecurity professionals to identify ...

Updated 1 year ago by naruzkurai

Phases of an incident response playbook

[Completed] Professional Google Cyberse... Phases of incident response playbooks

Previously, we discussed how SIEM tools are used to help protect an organization's critical asset...

Updated 1 year ago by naruzkurai

Welcome to Week 4

[Completed] Professional Google Cyberse... Phases of incident response playbooks

Hello and welcome back. You've reached the final section of this course! Previously, we discussed...

Updated 1 year ago by naruzkurai

Glossary terms from week 3

[Completed] Professional Google Cyberse...

Terms and definitions from Course 2, Week 3 Chronicle: A cloud-native tool designed to retain, a...

Updated 1 year ago by naruzkurai

Wrap-up

[Completed] Professional Google Cyberse... Explore security information and event ...

Let's quickly review what we covered in this section of the course. We started by discussing the ...

Updated 1 year ago by naruzkurai

Use SIEM tools to protect organizations

[Completed] Professional Google Cyberse... Explore security information and event ...

Previously, you were introduced to security information and event management (SIEM) tools and a f...

Updated 1 year ago by naruzkurai

Talya: Myths about the cybersecurity field

[Completed] Professional Google Cyberse... Explore security information and event ...

I'm Talia, and I'm an engineer within privacy, safety and security at Google. So there are a lot ...

Updated 1 year ago by naruzkurai

More about cybersecurity tools

[Completed] Professional Google Cyberse... Explore security information and event ...

Previously, you learned about several tools that are used by cybersecurity team members to monito...

Updated 1 year ago by naruzkurai