Recently Updated Pages
Lesson 2.1 - Player Positioning
Summary Overview: You will begin this unit by creating a new project for your se...
Introduction
we will make a top down prototype where you shoot things that come after you, kindof like galiga ...
tenses (finsh plz)
Basic Tenses: These are the simplest tenses in Kuroik. They indicate the general time frame o...
code quizze sites :D
https://neetcode.io/https://leetcode.com/problemset/all/https://www.lintcode.com/problem/659/ if...
Glossary Cybersecurity Terms and definitions from Course 2
AAntivirus software: A software program used to prevent, detect, and eliminatemalware and viru...
Course wrap-up
Congratulations on completing this course! Let's recap what we've covered so far. First, we revie...
Glossary terms from week 4
Terms and definitions from Course 2, Week 4 Antivirus software: A software program used to preve...
Wrap-up
Let's review what we covered in this section. We began by discussing the purpose of playbooks.The...
Playbooks, SIEM tools, and SOAR tools
Playbooks and SIEM tools Previously, you learned that security teams encounter threats, risks, v...
Erin: The importance of diversity of perspective on a security team
Hi everyone. My name is Erin and I am a privacy engineer at Google. I work on speculative and eme...
Use a playbook to respond to threats, risks, or vulnerabilities
Welcome back! In this video, we're going to revisit SIEM tools and how they're used alongside pla...
Zack: Incident response and the value of playbooks
My name is Zack. I'm a Software Engineer on the security team in Google Workspace. I have non-tra...
More about playbooks
Previously, you learned that playbooks are tools used by cybersecurity professionals to identify ...
Phases of an incident response playbook
Previously, we discussed how SIEM tools are used to help protect an organization's critical asset...
Welcome to Week 4
Hello and welcome back. You've reached the final section of this course! Previously, we discussed...
Glossary terms from week 3
Terms and definitions from Course 2, Week 3 Chronicle: A cloud-native tool designed to retain, a...
Wrap-up
Let's quickly review what we covered in this section of the course. We started by discussing the ...
Use SIEM tools to protect organizations
Previously, you were introduced to security information and event management (SIEM) tools and a f...
Talya: Myths about the cybersecurity field
I'm Talia, and I'm an engineer within privacy, safety and security at Google. So there are a lot ...
More about cybersecurity tools
Previously, you learned about several tools that are used by cybersecurity team members to monito...