Recently Updated Pages
Glossary Cybersecurity Terms and definitions from Course 2
AAntivirus software: A software program used to prevent, detect, and eliminatemalware and viru...
Course wrap-up
Congratulations on completing this course! Let's recap what we've covered so far. First, we revie...
Glossary terms from week 4
Terms and definitions from Course 2, Week 4 Antivirus software: A software program used to preve...
Wrap-up
Let's review what we covered in this section. We began by discussing the purpose of playbooks.The...
Playbooks, SIEM tools, and SOAR tools
Playbooks and SIEM tools Previously, you learned that security teams encounter threats, risks, v...
Erin: The importance of diversity of perspective on a security team
Hi everyone. My name is Erin and I am a privacy engineer at Google. I work on speculative and eme...
Use a playbook to respond to threats, risks, or vulnerabilities
Welcome back! In this video, we're going to revisit SIEM tools and how they're used alongside pla...
Zack: Incident response and the value of playbooks
My name is Zack. I'm a Software Engineer on the security team in Google Workspace. I have non-tra...
More about playbooks
Previously, you learned that playbooks are tools used by cybersecurity professionals to identify ...
Phases of an incident response playbook
Previously, we discussed how SIEM tools are used to help protect an organization's critical asset...
Welcome to Week 4
Hello and welcome back. You've reached the final section of this course! Previously, we discussed...
Glossary terms from week 3
Terms and definitions from Course 2, Week 3 Chronicle: A cloud-native tool designed to retain, a...
Wrap-up
Let's quickly review what we covered in this section of the course. We started by discussing the ...
Use SIEM tools to protect organizations
Previously, you were introduced to security information and event management (SIEM) tools and a f...
Talya: Myths about the cybersecurity field
I'm Talia, and I'm an engineer within privacy, safety and security at Google. So there are a lot ...
More about cybersecurity tools
Previously, you learned about several tools that are used by cybersecurity team members to monito...
Explore common SIEM tools
Hello again! Previously, we discussed how SIEM tools help security analysts monitor systems and d...
Parisa: The parallels of accessibility and security
My name is Parisa and I'm a vice president of engineering and lead the Chrome Team. So as Genera...
The future of SIEM tools
Previously, you were introduced to security information and event management (SIEM) tools, along ...
SIEM dashboards
We've explored how SIEM tools are used to collect and analyze log data. However, this is just one...