Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

812 total results found

Use a playbook to respond to threats, risks, or vulnerabilities

[Completed] Professional Google Cyberse... Explore incident response

Welcome back! In this video, we're going to revisit SIEM tools and how they're used alongside playbooks to reduce organizational threats, risks, and vulnerabilities.An incident response playbook is a guide that helps security professionals mitigate issues with...

Erin: The importance of diversity of perspective on a security team

[Completed] Professional Google Cyberse... Explore incident response

Hi everyone. My name is Erin and I am a privacy engineer at Google. I work on speculative and emerging technology. So think of things that don't exist in the world, and that are coming within the next two to five years. My role is basically to take a look at a...

Playbooks, SIEM tools, and SOAR tools

[Completed] Professional Google Cyberse... Explore incident response

Playbooks and SIEM tools Previously, you learned that security teams encounter threats, risks, vulnerabilities, and incidents on a regular basis and that they follow playbooks to address security-related issues. In this reading, you will learn more about play...

Wrap-up

[Completed] Professional Google Cyberse... Explore incident response

Let's review what we covered in this section. We began by discussing the purpose of playbooks.Then, we examined the six phases of an incident response playbook, including an example of how a playbook might be used to address an incident.Playbooks are just one ...

Glossary terms from week 4

[Completed] Professional Google Cyberse...

Terms and definitions from Course 2, Week 4 Antivirus software: A software program used to prevent, detect, and eliminate malware and viruses  Incident response: An organization’s quick attempt to identify an attack, contain the damage, and correct the effec...

Course wrap-up

[Completed] Professional Google Cyberse...

Congratulations on completing this course! Let's recap what we've covered so far. First, we reviewed CISSP's eight security domains and focused on threats, risks, and vulnerabilities to business operations.Then, we explored security frameworks and controls, an...

Glossary Cybersecurity Terms and definitions from Course 2

[Completed] Professional Google Cyberse...

  AAntivirus software: A software program used to prevent, detect, and eliminatemalware and virusesAssess: The fifth step of the NIST RMF that means to determine if established controlsare implemented correctlyAsset: An item perceived as having value to an or...

code quizze sites :D

cool stuff

https://neetcode.io/https://leetcode.com/problemset/all/https://www.lintcode.com/problem/659/ if either says pay to access. just search the problem on the other site

Lab 2 - New Project with Primitives

unity devlog: jr programmer courses

1.Create a new Unity Project and rename your scene  "Just like we did with the Prototype, the first thing we need to do is create a new blank project " Create a new Unity project called “Personal Project” using the 3D template and setting the location to t...

adressing the formating

unity devlog: jr programmer courses

as i do courses my formating does change from start to finish, i will attempt to adhear to a standard or the standard however i will not be updating my formating on older doccuments so hand in there

Mod the Cube

unity devlog: jr programmer courses

Summary : In this exercise, you'll be challenged to modify a provided script to change the behavior of an object it's applied to. Type:Tutorial Level:Beginner Xp: 60 Estimated time to complete: 30 MinsMaterials: ModTheCubeChallengeAssets....

Introduction to Course 3 + course 3 overview

[Completed] Professional Google Cyberse... getting started & introduction to networks

Introduction You've learned about security domains in previous courses.Now we'll explore one of those domains further: networks.It's important to secure networks because network-based attacks are growing in bothfrequency and complexity. Hi there! My name is ...

Glossary Cybersecurity

[Completed] Professional Google Cyberse... getting started & introduction to networks

Terms and definitions from the certificateAAbsolute file path: The full file path, which starts from the rootAccess controls: Security controls that manage access, authorization, andaccountability of informationActive packet sniffing: A type of attack where da...

Welcome to week 1

[Completed] Professional Google Cyberse... getting started & introduction to networks

Before securing a network, you need to understand the basic design of a network and how it functions.In this section of the course, you will learn about the structure of a network, standard networking tools, cloud networks, and the basic framework for organizi...

Chris: My path to cybersecurity

[Completed] Professional Google Cyberse... getting started & introduction to networks

My name is Chris and I'm the Chief Information Security Officer at Google Fiber. We provide high speed Internet to customers across the United States. As the chief information security officer, I'm responsible for making sure that the network stays safe, our c...

What are networks?

[Completed] Professional Google Cyberse... getting started & introduction to networks

Welcome! Before you can understand the importance of securing a network, you need to know what a network is.A network is a group of connected devices. At home, the devices connected to your network might be your laptop, cell phones, and smart devices, like you...

Tina: Working in network security

[Completed] Professional Google Cyberse... getting started & introduction to networks

My name is Tina and I'm a software engineer at Google. As a software engineer, I work on an internal tool that serves the security engineers and network engineers at Google. Network security is important because we want to make sure that our network systems ar...

Emmanuel: Useful skills for network security

[Completed] Professional Google Cyberse... getting started & introduction to networks

My name is Emmanuel and I am an offensive security engineer at Google. For offensive security, my job is to simulate adversaries and threats that are targeting various companies and I look at defending how we can protect Google's infrastructure. I make it hard...

tech enthusiest reminder

[Completed] Professional Google Cyberse... getting started & introduction to networks

A hub is a network device that broadcasts information to every device on the network.

Network tools

[Completed] Professional Google Cyberse... getting started & introduction to networks

In this video, you'll learn about the common devices that make up a network. Let's get started.A hub is a network device that broadcasts information to every device on the network. Think of a hub like a radio tower that broadcasts a signal to any radio tuned t...