Recently Updated Pages
Use a playbook to respond to threats, risks, or vulnerabilities
Welcome back! In this video, we're going to revisit SIEM tools and how they're used alongside pla...
Zack: Incident response and the value of playbooks
My name is Zack. I'm a Software Engineer on the security team in Google Workspace. I have non-tra...
More about playbooks
Previously, you learned that playbooks are tools used by cybersecurity professionals to identify ...
Phases of an incident response playbook
Previously, we discussed how SIEM tools are used to help protect an organization's critical asset...
Welcome to Week 4
Hello and welcome back. You've reached the final section of this course! Previously, we discussed...
Glossary terms from week 3
Terms and definitions from Course 2, Week 3 Chronicle: A cloud-native tool designed to retain, a...
Wrap-up
Let's quickly review what we covered in this section of the course. We started by discussing the ...
Use SIEM tools to protect organizations
Previously, you were introduced to security information and event management (SIEM) tools and a f...
Talya: Myths about the cybersecurity field
I'm Talia, and I'm an engineer within privacy, safety and security at Google. So there are a lot ...
More about cybersecurity tools
Previously, you learned about several tools that are used by cybersecurity team members to monito...
Explore common SIEM tools
Hello again! Previously, we discussed how SIEM tools help security analysts monitor systems and d...
Parisa: The parallels of accessibility and security
My name is Parisa and I'm a vice president of engineering and lead the Chrome Team. So as Genera...
The future of SIEM tools
Previously, you were introduced to security information and event management (SIEM) tools, along ...
SIEM dashboards
We've explored how SIEM tools are used to collect and analyze log data. However, this is just one...
Logs and SIEM tools
As a security analyst, one of your responsibilities might include analyzing log data to mitigate ...
Welcome to week 3
Welcome back! Previously, we discussed security frameworks, controls, and design principles, and ...
Glossary terms from week 2
Terms and definitions from Course 2, Week 2 Asset: An item perceived as having value to an organ...
every word and there meaning
Aivu: LoveAykshin: DesertBandan: RubberBanyo: EatBe: Someone elseBej: Someone else, time travel s...
page 1
ok so this is just going to be a literal dictionary, its going to be sorted alphabeticallyand her...
More about security audits
Previously, you were introduced to how to plan and complete an internal security audit. In this r...