Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

843 total results found

overview

[FORGOTTEN] CISCO DIVD Academy Ethical ...

i started ripping this course on August 30th of 2023  so some things may be a bit different if you take the course https://skillsforall.com/course/ethical-hacker?courseLang=en-US arn the art of offensive security to uncover cyber threats...

1.0.1-1.0.2 Why Should I Take This Module and what will i learn?

[FORGOTTEN] CISCO DIVD Academy Ethical ...

1.0.1 Why Should I Take This Module? Protego Security Solutions Task Welcome to Protego! My name is Alex. I will be your mentor for your first 90 days here. Our recruiter was very impressed with...

1.1.1 Overview

[FORGOTTEN] CISCO DIVD Academy Ethical ...

1.1.1 Overview Protego Security Solutions Alex here! We will be meeting periodically over the next few weeks so you can get oriented to working at Protego and also build yo...

1.1.3 Lab - Researching PenTesting Careers

[FORGOTTEN] CISCO DIVD Academy Ethical ...

Protego Security Solutions I think it is important for you to understand the employment landscape and the different roles and responsibilities that cybersecurity professions include. A good general r...

1.1.4 Threat Actors

[FORGOTTEN] CISCO DIVD Academy Ethical ...

Before you can understand how an ethical hacker or penetration tester can mimic a threat actor (or malicious attacker), you need to understand the different types of threat actors. The following are the most common types of malicious attack...

Terms and definitions from the certificate

[Completed] Professional Google Cyberse...

Google Cybersecurity Certificate glossary from: "Sound the Alarm: Detection and Response; part 6 of 8 in the professional Cybersecurity cert" A Absolute file path: The full file path, which starts from the root Access controls: Security controls that manage...

Dave: Grow your cybersecurity career with mentors

[Completed] Professional Google Cyberse...

My name is Dave.  I'm a Principal Security Strategist with Google Cloud.  My job is to work directly with security practitioners to help them protect their organizations. What I love about my job is the variety. One day I might be troubleshooting a tec...

Welcome to week 1

[Completed] Professional Google Cyberse...

Welcome. In my role as Principal Security Strategist, I've seen how the incident response operations that you'll learn about in this course are implemented in an organization. One of the things I find so exciting about detecting and responding to inc...

Introduction to the incident response lifecycle

[Completed] Professional Google Cyberse...

Incident lifecycle frameworks provide a structure to support incident response operations. Frameworks help organizations develop a standardized approach to their incident response process, so that incidents are managed in an effective and consistent wa...

Incident response teams

[Completed] Professional Google Cyberse...

Hi again! In this section, we'll discuss how incident response teams manage incidents.  You may have been part of a team before. Whether it was a sports team, or a team in the workplace or at school, teams are most successful when ev...

Fatima: The importance of communication during incident response

[Completed] Professional Google Cyberse...

My name is Fatima, and I'm a tech lead manager on Google's Detection and Response Team. If there is a hacker on the network, our job is to find them.  Working in detection is really like an artist preparing for a show. We spend all this time developing ...

Roles in response

[Completed] Professional Google Cyberse...

So far, you've been introduced to the National Institute of Standards and Technology (NIST) Incident Response Lifecycle, which is a framework for incident response consisting of four phases: Preparation Detection and Analysis Containment, Eradic...

Incident response plans

[Completed] Professional Google Cyberse...

So you've learned about incident response teams, the different types of roles, and their respective responsibilities. Now, let's talk about how teams respond to incidents using incident response plans. When an incident occurs, inc...

Incident response tools

[Completed] Professional Google Cyberse...

As a security analyst, you'll play an important role in incident detection. After all, you're going to be at the front lines actively detecting threats. To do this, you'll not only rely on the security knowledge you've developed so far, but you'll ...

The value of documentation

[Completed] Professional Google Cyberse...

Hi there. Previously, you learned how an incident handler's journal is used for documenting the 5 W's of an incident: who, what, where, when, and why an incident occurred.  In this section, we'll continue our discussion on documentation by exploring...

Intrusion detection systems

[Completed] Professional Google Cyberse...

In this video, we'll introduce you to intrusion detection and intrusion prevention systems. Imagine that you've just installed a home intrusion security system. You've installed intruder sensors for each entry and exit point in your...

Overview of detection tools

[Completed] Professional Google Cyberse...

Previously, you explored intrusion detection system (IDS) and intrusion prevention system (IPS) technologies. In this reading, you’ll compare and contrast these tools and learn about endpoint detection and response (EDR). As a security analyst, you'll likely w...

Alert and event management with SIEM and SOAR tools

[Completed] Professional Google Cyberse...

Our discussion on detection tools may have left you wondering where alerts are sent and how alerts are accessed by security analysts. This is where security information and event management, or SIEM, tools are used. SIEM is a tool...

Wrap-up; Terms and definitions from Course 6, Week 1

[Completed] Professional Google Cyberse...

Way to go! You made it through a new section, and you've learned a lot. As a refresher, we first covered the incident response lifecycle as a framework to support incident response processes. You were also given yo...

Welcome to week 2

[Completed] Professional Google Cyberse...

Welcome back! I'm so glad you're joining us. Previously, you were introduced to incident detection and response. You may also remember learning about networking from a previous course. To recap, you learned about how devices talk ...