Recently Updated Pages
Explore common SIEM tools
Hello again! Previously, we discussed how SIEM tools help security analysts monitor systems and d...
Parisa: The parallels of accessibility and security
My name is Parisa and I'm a vice president of engineering and lead the Chrome Team. So as Genera...
The future of SIEM tools
Previously, you were introduced to security information and event management (SIEM) tools, along ...
SIEM dashboards
We've explored how SIEM tools are used to collect and analyze log data. However, this is just one...
Logs and SIEM tools
As a security analyst, one of your responsibilities might include analyzing log data to mitigate ...
Welcome to week 3
Welcome back! Previously, we discussed security frameworks, controls, and design principles, and ...
Glossary terms from week 2
Terms and definitions from Course 2, Week 2 Asset: An item perceived as having value to an organ...
every word and there meaning
Aivu: LoveAykshin: DesertBandan: RubberBanyo: EatBe: Someone elseBej: Someone else, time travel s...
page 1
ok so this is just going to be a literal dictionary, its going to be sorted alphabeticallyand her...
More about security audits
Previously, you were introduced to how to plan and complete an internal security audit. In this r...
Wajih: Stay up-to-date on the latest cybersecurity threats
My name is Wajih and I'm a security engineer at Google working in the digital forensics departmen...
More about OWASP security principles
Previously, you learned that cybersecurity analysts help keep data safe and reduce risk for an or...
OWASP security principles
It's important to understand how to protect an organization's data and assets because that will b...
NIST frameworks
Welcome back. Before we get started, let's quickly review the purpose of frameworks. Organization...
Use the CIA triad to protect organizations
Use the CIA triad to protect organizations Previously, you were introduced to the confidentialit...
Explore the CIA triad
Great to see you again! While working as an entry-level security analyst, your main responsibilit...
The relationship between frameworks and controls
Previously, you learned how organizations use security frameworks and controles to protect agai...
Controls
While frameworks are used to create plans to address security risks, threats, and vulnerabilities...
Frameworks
In an organization, plans are put in place to protect against a variety of threats, risks, and vu...
Welcome to week 2
Welcome back! As a security analyst, your job isn't just keeping organization safe. Your role is ...