Skip to main content

Recently Updated Pages

Use a playbook to respond to threats, risks, or vulnerabilities

[Completed] Professional Google Cyberse... Explore incident response

Welcome back! In this video, we're going to revisit SIEM tools and how they're used alongside pla...

Updated 2 years ago by naruzkurai

Zack: Incident response and the value of playbooks

[Completed] Professional Google Cyberse... Phases of incident response playbooks

My name is Zack. I'm a Software Engineer on the security team in Google Workspace. I have non-tra...

Updated 2 years ago by naruzkurai

More about playbooks

[Completed] Professional Google Cyberse... Phases of incident response playbooks

Previously, you learned that playbooks are tools used by cybersecurity professionals to identify ...

Updated 2 years ago by naruzkurai

Phases of an incident response playbook

[Completed] Professional Google Cyberse... Phases of incident response playbooks

Previously, we discussed how SIEM tools are used to help protect an organization's critical asset...

Updated 2 years ago by naruzkurai

Welcome to Week 4

[Completed] Professional Google Cyberse... Phases of incident response playbooks

Hello and welcome back. You've reached the final section of this course! Previously, we discussed...

Updated 2 years ago by naruzkurai

Glossary terms from week 3

[Completed] Professional Google Cyberse...

Terms and definitions from Course 2, Week 3 Chronicle: A cloud-native tool designed to retain, a...

Updated 2 years ago by naruzkurai

Wrap-up

[Completed] Professional Google Cyberse... Explore security information and event ...

Let's quickly review what we covered in this section of the course. We started by discussing the ...

Updated 2 years ago by naruzkurai

Use SIEM tools to protect organizations

[Completed] Professional Google Cyberse... Explore security information and event ...

Previously, you were introduced to security information and event management (SIEM) tools and a f...

Updated 2 years ago by naruzkurai

Talya: Myths about the cybersecurity field

[Completed] Professional Google Cyberse... Explore security information and event ...

I'm Talia, and I'm an engineer within privacy, safety and security at Google. So there are a lot ...

Updated 2 years ago by naruzkurai

More about cybersecurity tools

[Completed] Professional Google Cyberse... Explore security information and event ...

Previously, you learned about several tools that are used by cybersecurity team members to monito...

Updated 2 years ago by naruzkurai

Explore common SIEM tools

[Completed] Professional Google Cyberse... Explore security information and event ...

Hello again! Previously, we discussed how SIEM tools help security analysts monitor systems and d...

Updated 2 years ago by naruzkurai

Parisa: The parallels of accessibility and security

[Completed] Professional Google Cyberse... Security information and event manageme...

 My name is Parisa and I'm a vice president of engineering and lead the Chrome Team. So as Genera...

Updated 2 years ago by naruzkurai

The future of SIEM tools

[Completed] Professional Google Cyberse... Security information and event manageme...

Previously, you were introduced to security information and event management (SIEM) tools, along ...

Updated 2 years ago by naruzkurai

SIEM dashboards

[Completed] Professional Google Cyberse... Security information and event manageme...

We've explored how SIEM tools are used to collect and analyze log data. However, this is just one...

Updated 2 years ago by naruzkurai

Logs and SIEM tools

[Completed] Professional Google Cyberse... Security information and event manageme...

As a security analyst, one of your responsibilities might include analyzing log data to mitigate ...

Updated 2 years ago by naruzkurai

Welcome to week 3

[Completed] Professional Google Cyberse... Security information and event manageme...

Welcome back! Previously, we discussed security frameworks, controls, and design principles, and ...

Updated 2 years ago by naruzkurai

Glossary terms from week 2

[Completed] Professional Google Cyberse...

Terms and definitions from Course 2, Week 2 Asset: An item perceived as having value to an organ...

Updated 2 years ago by naruzkurai

every word and there meaning

Kuroik Dictionary Starting with the letter A

Aivu: LoveAykshin: DesertBandan: RubberBanyo: EatBe: Someone elseBej: Someone else, time travel s...

Updated 2 years ago by naruzkurai

page 1

Kuroik Dictionary Preface

ok so this is just going to be a literal dictionary, its going to be sorted alphabeticallyand her...

Updated 2 years ago by naruzkurai

More about security audits

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

Previously, you were introduced to how to plan and complete an internal security audit. In this r...

Updated 2 years ago by naruzkurai