Advanced Search
Search Results
845 total results found
Use SIEM tools to protect organizations
Previously, you were introduced to security information and event management (SIEM) tools and a few SIEM dashboards. You also learned about different threats, risks, and vulnerabilities an organization may experience. In this reading, you will learn more about...
Wrap-up
Let's quickly review what we covered in this section of the course. We started by discussing the importance of logs and cybersecurity, and we explored different log types, like firewall, network, and server logs. Next, we explored SIEM dashboards and how they ...
Glossary terms from week 3
Terms and definitions from Course 2, Week 3 Chronicle: A cloud-native tool designed to retain, analyze, and search data Incident response: An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach...
Welcome to Week 4
Hello and welcome back. You've reached the final section of this course! Previously, we discussed security information and event management, or SIEM tools, and how they can be used to help organizations improve their security posture.Let's continue our securit...
Phases of an incident response playbook
Previously, we discussed how SIEM tools are used to help protect an organization's critical assets and data. In this video, we'll introduce another important tool for maintaining an organization's security, known as a playbook.A playbook is a manual that provi...
More about playbooks
Previously, you learned that playbooks are tools used by cybersecurity professionals to identify and respond to security issues. In this reading, you’ll learn more about playbooks and their purpose in the field of cybersecurity. Playbook overview A playbook...
Zack: Incident response and the value of playbooks
My name is Zack. I'm a Software Engineer on the security team in Google Workspace. I have non-traditional background. When I graduated college, I originally thought that I would pursue law, but I was accepted and I decided not to go. Instead, I joined Google i...
New Page
Use a playbook to respond to threats, risks, or vulnerabilities
Welcome back! In this video, we're going to revisit SIEM tools and how they're used alongside playbooks to reduce organizational threats, risks, and vulnerabilities.An incident response playbook is a guide that helps security professionals mitigate issues with...
Erin: The importance of diversity of perspective on a security team
Hi everyone. My name is Erin and I am a privacy engineer at Google. I work on speculative and emerging technology. So think of things that don't exist in the world, and that are coming within the next two to five years. My role is basically to take a look at a...
Playbooks, SIEM tools, and SOAR tools
Playbooks and SIEM tools Previously, you learned that security teams encounter threats, risks, vulnerabilities, and incidents on a regular basis and that they follow playbooks to address security-related issues. In this reading, you will learn more about play...
New Page
https://www.coursera.org/learn/manage-security-risks/exam/HoWCS/weekly-challenge-1/view-attempt
Wrap-up
Let's review what we covered in this section. We began by discussing the purpose of playbooks.Then, we examined the six phases of an incident response playbook, including an example of how a playbook might be used to address an incident.Playbooks are just one ...
Glossary terms from week 4
Terms and definitions from Course 2, Week 4 Antivirus software: A software program used to prevent, detect, and eliminate malware and viruses Incident response: An organization’s quick attempt to identify an attack, contain the damage, and correct the effec...
New Page
Course wrap-up
Congratulations on completing this course! Let's recap what we've covered so far. First, we reviewed CISSP's eight security domains and focused on threats, risks, and vulnerabilities to business operations.Then, we explored security frameworks and controls, an...
Glossary Cybersecurity Terms and definitions from Course 2
AAntivirus software: A software program used to prevent, detect, and eliminatemalware and virusesAssess: The fifth step of the NIST RMF that means to determine if established controlsare implemented correctlyAsset: An item perceived as having value to an or...
code quizze sites :D
https://neetcode.io/https://leetcode.com/problemset/all/https://www.lintcode.com/problem/659/ if either says pay to access. just search the problem on the other site
Lab 2 - New Project with Primitives
1.Create a new Unity Project and rename your scene "Just like we did with the Prototype, the first thing we need to do is create a new blank project " Create a new Unity project called “Personal Project” using the 3D template and setting the location to t...
adressing the formating
as i do courses my formating does change from start to finish, i will attempt to adhear to a standard or the standard however i will not be updating my formating on older doccuments so hand in there