Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

948 total results found

More about OWASP security principles

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

Previously, you learned that cybersecurity analysts help keep data safe and reduce risk for an organization by using a variety of security frameworks, controls, and security principles. In this reading, you will learn about more Open Web Application Security P...

Wajih: Stay up-to-date on the latest cybersecurity threats

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

My name is Wajih and I'm a security engineer at Google working in the digital forensics department. Do you need a background in cybersecurity? No you don't. My past experiences is working at a water park as a snow cone machine guy. I worked at a movie theater ...

More about security audits

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

Previously, you were introduced to how to plan and complete an internal security audit. In this reading, you will learn more about security audits, including the goals and objectives of audits. Security audits A security audit is a review of an organization...

Counting in kuroik

Kuroik its just random thoughts

In the Kuroik language, counting is done in a hexadecimal system, which means it uses base 16 instead of base 10 like in the decimal system. Here's how you count from 0 to 17: Remember to add 'arn at the end of the number to indicate that it is a number and n...

Plot of this story

Blood Witch

Start of the story one day a pair of twins were born in the kingdom of kuroik two identical twins leyt and ?????(darkness) and (light) one day while there mother slept A human infected with light invaded the castle while the human tried to raid the treasu...

tenses (finsh plz)

Kuroik Dictionary

Basic Tenses: These are the simplest tenses in Kuroik. They indicate the general time frame of an action or state. Past = 'ir Present = 'er Future = 'ur Precision Tenses: These tenses provide more specific information about the timing of an act...

page 1

Kuroik Dictionary Preface

ok so this is just going to be a literal dictionary, its going to be sorted alphabeticallyand heres a link to the google sheet that will ideally have everything in it click here to open the link in a new tab or copy and paste this urn into your browser if u ...

every word and there meaning

Kuroik Dictionary Starting with the letter A

Aivu: LoveAykshin: DesertBandan: RubberBanyo: EatBe: Someone elseBej: Someone else, time travel singularBejs: Someone else, time travel pluralBes: Someone else, pluralCho: Specific form of "this"D'fora: Pet, specifically a magical familiarD'frora'na: Wild anim...

Glossary terms from week 2

[Completed] Professional Google Cyberse...

Terms and definitions from Course 2, Week 2 Asset: An item perceived as having value to an organization Attack vectors: The pathways attackers use to penetrate security defenses Authentication: The process of verifying who someone is Authorization: The con...

Welcome to week 3

[Completed] Professional Google Cyberse... Security information and event manageme...

Welcome back! Previously, we discussed security frameworks, controls, and design principles, and how security professionals apply these to security audits.In this section, we'll continue to explore security tools and how they can help you keep organizations an...

Logs and SIEM tools

[Completed] Professional Google Cyberse... Security information and event manageme...

As a security analyst, one of your responsibilities might include analyzing log data to mitigate and manage threats, risks, and vulnerabilities. As a reminder, a log is a record of events that occur within an organization's systems and networks. Security analy...

SIEM dashboards

[Completed] Professional Google Cyberse... Security information and event manageme...

We've explored how SIEM tools are used to collect and analyze log data. However, this is just one of the many ways SIEM tools are used in cybersecurity.SIEM tools can also be used to create dashboards. You might have encountered dashboards in an app on your ph...

The future of SIEM tools

[Completed] Professional Google Cyberse... Security information and event manageme...

Previously, you were introduced to security information and event management (SIEM) tools, along with a few examples of SIEM tools. In this reading, you will learn more about how SIEM tools are used to protect organizational operations. You will also gain insi...

Parisa: The parallels of accessibility and security

[Completed] Professional Google Cyberse... Security information and event manageme...

 My name is Parisa and I'm a vice president of engineering and lead the Chrome Team. So as General manager of the Chrome Team, I lead a team of engineers and product managers and designers around the world who actually build Chrome and keep all of our users sa...

Explore common SIEM tools

[Completed] Professional Google Cyberse... Explore security information and event ...

Hello again! Previously, we discussed how SIEM tools help security analysts monitor systems and detect security threats.In this video, we'll cover some industry leading SIEM tools that you'll likely encounter as a security analyst. First, let's discuss the dif...

More about cybersecurity tools

[Completed] Professional Google Cyberse... Explore security information and event ...

Previously, you learned about several tools that are used by cybersecurity team members to monitor for and identify potential security threats, risks, and vulnerabilities. In this reading, you’ll learn more about common open-source and proprietary cybersecurit...

Talya: Myths about the cybersecurity field

[Completed] Professional Google Cyberse... Explore security information and event ...

I'm Talia, and I'm an engineer within privacy, safety and security at Google. So there are a lot of myths in the cybersecurity space. One big one is, you must know how to code, or you must know how to hack, or you must be a math wiz. I don't know how to code, ...

Use SIEM tools to protect organizations

[Completed] Professional Google Cyberse... Explore security information and event ...

Previously, you were introduced to security information and event management (SIEM) tools and a few SIEM dashboards. You also learned about different threats, risks, and vulnerabilities an organization may experience. In this reading, you will learn more about...

Wrap-up

[Completed] Professional Google Cyberse... Explore security information and event ...

Let's quickly review what we covered in this section of the course. We started by discussing the importance of logs and cybersecurity, and we explored different log types, like firewall, network, and server logs. Next, we explored SIEM dashboards and how they ...

Glossary terms from week 3

[Completed] Professional Google Cyberse...

Terms and definitions from Course 2, Week 3 Chronicle: A cloud-native tool designed to retain, analyze, and search data Incident response: An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach...