Advanced Search
Search Results
843 total results found
Read tcpdump logs
A network protocol analyzer, sometimes called a packet sniffer or a packet analyzer, is a tool designed to capture and analyze data traffic within a network. They are commonly used as investigative tools to monitor networks and identify suspicious activity. Th...
Real-life DDoS attack
Previously, you were introduced to Denial of Service (DoS) attacks. You also learned that volumetric distributed DoS (DDoS) attacks overwhelm a network by sending unwanted data packets in such large quantities that the servers become unable to service normal u...
Malicious packet sniffing
In this video, we'll discuss packet sniffing, with a focus on how threat actors may use this technique to gain unauthorized access to information. Previously, you learned about the information and data packets that travel across the network. ...
IP Spoofing
Next, let's learn about another kind of network attack called IP spoofing. IP spoofing is a network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network. In ...
Overview of interception tactics
In the previous course items, you learned how packet sniffing and IP spoofing are used in network attacks. Because these attacks intercept data packets as they travel across the network, they are called interception attacks. This reading will introduce you to...
temp
things to review On-path attack Distributed denial of service attack (DDoS) Denial of service attack (DoS) SYN flood attack IP spoofing Packet sniffing
Glossary terms from week 3 & wrap-up
Nice job finishing this section! Let's review what you've learned so far. We discussed how to secure networks. We also learned about network intrusion tactics like malicious packet sniffing and IP spoofing. Finally, we discussed how a securit...
Introduction to security hardening
I want to take a moment to congratulate you on your progress so far. First, you learned about network operations. Then, you learned about the tools and protocols that help network systems function. Next, you learned how vulnerabilities in netwo...
OS hardening practices
Hi there. In this video, we'll discuss operating system, or OS, hardening and why it's essential to keep the entire network secure. The operating system is the interface between computer hardware and the user. The OS is the first program loaded w...
Brute force attacks and OS hardening
In this reading, you’ll learn about brute force attacks. You’ll consider how vulnerabilities can be assessed using virtual machines and sandboxes, and learn ways to prevent brute force attacks using a combination of authentication measures. Implementing variou...
how to read a tcpdump
idk if this is correct but from my research this is what I've figured out An example TCP dump looks like this: Timestamp source IP > destination IP.protocol : flags [TCP flags], seq sequence numbers, ack acknowledgement number, win window size, options [TCP...
Network hardening practices
Earlier, you learned that OS hardening focuses on device safety and uses patch updates, secure configuration, and account access policies. Now we'll focus on network hardening. Network hardening focuses on network-related security hardening, like por...
Network security applications
This section of the course covers the topic of network hardening and monitoring. Each device, tool, or security strategy put in place by security analysts further protects—or hardens—the network until the network owner is satisfied with the level of security. ...
Cloud Hardening
Network security in the cloud In recent years, many organizations are using network services in the cloud. So in addition to securing on-premises networks, a security analyst will need to secure cloud networks. In a previous video, you learned th...
Kelsey: Cloud security explained
I'm Kelsey, I'm a distinguished engineer at Google Cloud. I work on compute platforms and security related topics. When I was starting, the only jobs I had previous, the only jobs I was confident were accessible to me were fast food jobs. I wanted a ...
Security hardening Wrap-up & Glossary terms from week 4
Great work on learning about security hardening! Let's take a few minutes to wrap up what you've learned. You learned about security hardening and its importance to an organization's infrastructure. First, we discussed how securit...
Course wrap-up; Glossary Cybersecurity Course 3
Wow, we have covered a lot in this course! Let's review everything we've discussed. You learned about networks, network architecture, and the best practices used by security professionals to secure a network against security breaches. As we bring t...
Introduction to Course 4
Hi! Welcome to this course on computing basics for security. My name is Kim, and I work as a Technical Program Manager in security. I grew up with computers and the internet but didn't really consider security as a career opportunity until I saw how ...
Helpful resources and tips
As a learner, you can choose to complete one or multiple courses in this program. However, to obtain the Google Cybersecurity Certificate, you must complete all the courses. This reading describes what is required to obtain a certificate and best practices for...
Welcome to week 1; Introduction to operating systems
How many times a week do you use a computer? For some of us, the answer might be "a lot"! They are incredible machines that let us do everything from using specialized applications when completing a task at work to sending emails to loved ones in a d...