Skip to main content

Recently Updated Pages

Explore common SIEM tools

[Completed] Professional Google Cyberse... Explore security information and event ...

Hello again! Previously, we discussed how SIEM tools help security analysts monitor systems and d...

Updated 1 year ago by naruzkurai

Parisa: The parallels of accessibility and security

[Completed] Professional Google Cyberse... Security information and event manageme...

 My name is Parisa and I'm a vice president of engineering and lead the Chrome Team. So as Genera...

Updated 1 year ago by naruzkurai

The future of SIEM tools

[Completed] Professional Google Cyberse... Security information and event manageme...

Previously, you were introduced to security information and event management (SIEM) tools, along ...

Updated 1 year ago by naruzkurai

SIEM dashboards

[Completed] Professional Google Cyberse... Security information and event manageme...

We've explored how SIEM tools are used to collect and analyze log data. However, this is just one...

Updated 1 year ago by naruzkurai

Logs and SIEM tools

[Completed] Professional Google Cyberse... Security information and event manageme...

As a security analyst, one of your responsibilities might include analyzing log data to mitigate ...

Updated 1 year ago by naruzkurai

Welcome to week 3

[Completed] Professional Google Cyberse... Security information and event manageme...

Welcome back! Previously, we discussed security frameworks, controls, and design principles, and ...

Updated 1 year ago by naruzkurai

Glossary terms from week 2

[Completed] Professional Google Cyberse...

Terms and definitions from Course 2, Week 2 Asset: An item perceived as having value to an organ...

Updated 1 year ago by naruzkurai

every word and there meaning

Kuroik Dictionary Starting with the letter A

Aivu: LoveAykshin: DesertBandan: RubberBanyo: EatBe: Someone elseBej: Someone else, time travel s...

Updated 1 year ago by naruzkurai

page 1

Kuroik Dictionary Preface

ok so this is just going to be a literal dictionary, its going to be sorted alphabeticallyand her...

Updated 1 year ago by naruzkurai

More about security audits

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

Previously, you were introduced to how to plan and complete an internal security audit. In this r...

Updated 1 year ago by naruzkurai

Wajih: Stay up-to-date on the latest cybersecurity threats

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

My name is Wajih and I'm a security engineer at Google working in the digital forensics departmen...

Updated 1 year ago by naruzkurai

More about OWASP security principles

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

Previously, you learned that cybersecurity analysts help keep data safe and reduce risk for an or...

Updated 1 year ago by naruzkurai

OWASP security principles

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

It's important to understand how to protect an organization's data and assets because that will b...

Updated 1 year ago by naruzkurai

NIST frameworks

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

Welcome back. Before we get started, let's quickly review the purpose of frameworks. Organization...

Updated 1 year ago by naruzkurai

Use the CIA triad to protect organizations

[Completed] Professional Google Cyberse... The CIA triad: Confidentiality, integri...

Use the CIA triad to protect organizations Previously, you were introduced to the confidentialit...

Updated 1 year ago by naruzkurai

Explore the CIA triad

[Completed] Professional Google Cyberse... The CIA triad: Confidentiality, integri...

Great to see you again! While working as an entry-level security analyst, your main responsibilit...

Updated 1 year ago by naruzkurai

The relationship between frameworks and controls

[Completed] Professional Google Cyberse... more about framework and controls

Previously, you learned how organizations use security frameworks and controles to protect agai...

Updated 1 year ago by naruzkurai

Controls

[Completed] Professional Google Cyberse... more about framework and controls

While frameworks are used to create plans to address security risks, threats, and vulnerabilities...

Updated 1 year ago by naruzkurai

Frameworks

[Completed] Professional Google Cyberse... more about framework and controls

In an organization, plans are put in place to protect against a variety of threats, risks, and vu...

Updated 1 year ago by naruzkurai

Welcome to week 2

[Completed] Professional Google Cyberse... more about framework and controls

Welcome back! As a security analyst, your job isn't just keeping organization safe. Your role is ...

Updated 1 year ago by naruzkurai