Advanced Search
Search Results
954 total results found
example tcp dump activity
Use ifconfig to identify the interfaces that are available: sudo ifconfig example output analyst@b4aade4b3e15:~$ sudo ifconfig eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1460 inet 172.18.0.2 netmask 255.255.0.0 broadcast 172.18.255....
Activity: Research network protocol analyzers
i probably legally cant give you anything coz its an activitybut here is the gist In this activity, you'll focus on the two network protocol analyzers: Wireshark and tcpdump. Your goal is to gain a basic understanding of the Wireshark and tcpdump, how they wo...
Wrap-up; Terms and definitions from Course 6, Module 2
Nice work so far!ddddddddddddddd Congratulations on capturing and analyzing your first packet. Let's review what we've covered so far. First, you learned how network traffic flows provide valuable communications insight. Through monitoring network...
Welcome to module 3 ; The detection and analysis phase of the lifecycle
Welcome back! I want to commend you on such a fantastic job you're doing so far. The skills you are learning will create a solid foundation as you begin your security career. In the previous section, you applied your networking kn...
Cybersecurity incident detection methods
Security analysts use detection tools to help them discover threats, but there are additional methods of detection that can be used as well. Previously, you learned about how detection tools can identify attacks like data exfiltration. In this reading, you’ll...
Xkhanku desert (from the dragons side)
MK: Changes in the cybersecurity industry
Hi, I'm MK, Director in the Office of the CISO for Google Cloud. The role of the Chief Information Security Officer is both to protect Google Cloud from a security standpoint. But also to ensure that we're providing all of the tools and products necessar...
Indicators of compromise
In this reading, you’ll be introduced to the concept of the Pyramid of Pain and you'll explore examples of the different types of indicators of compromise. Understanding and applying this concept helps organizations improve their defense and reduces the damage...
Analyze indicators of compromise with investigative tools
So far, you've learned about the different types of detection methods that can be used to detect security incidents. This reading explores how investigative tools can be used during investigations to analyze suspicious indicators of compromise (IoCs) and build...
The benefits of documentation
You may recall our discussion on the different documentation tools and types used by security teams when responding to incidents. In this video, we'll examine the benefits that documentation offers, so that you can better understand how to leverage doc...
Analyze indicators of compromise with investigative tools
So far, you've learned about the different types of detection methods that can be used to detect security incidents. This reading explores how investigative tools can be used during investigations to analyze suspicious indicators of compromise (IoCs) and bu...
Best practices for effective documentation
Documentation is any form of recorded content that is used for a specific purpose, and it is essential in the field of security. Security teams use documentation to support investigations, complete tasks, and communicate findings. This reading explores the ben...
Kuroik blood
I have something bugging me. And it's why not everything can use magic. Especially the invading humans, they have sufficiently advanced technology for molecular deconstruction. However, they aren't capable of using magic. I have blue blood, and it's probably t...
Document evidence with chain of custody forms
Let's continue our discussion on how documentation provides transparency through documents like chain of custody. During incident response, evidence must be accounted for during the entire incident's lifecycle. Tracking evidence is important if the e...
The value of cybersecurity playbooks
Have you ever taken a trip to a place you've never visited before? You may have used a travel itinerary to plan your trip activities. Travel itineraries are essential documents to have, especially for travel to a new place. They help keep you organ...
Generic Phishing Playbook Version 1.0
links to original google doc Purpose 2 Using this playbook 2 Step 1: Receive phishing alert 2 Step 2: Evaluate the alert 2 Step 3.0: Does the email contain any links or attachments? 3 Step 3.1: Are the links or attachments malicious? 3 Step 3.2: Update ...
NaruZkurai
#summery2{color: black;} #Aboutme{ color: eeefff; border-radius: 0 0 10px 10px; border: 1px solid gray; background-color: #333; } summery2{color: black;} #summery1{color: black;} #Howtousethissite{ color: eeefff;...
code for the home page
<div class="image-container"> <div class="socials"> <h2><a title="My Discord Server" href="https://discord.gg/2qXr4yMg6Y" target="_blank" rel="noopener"><img src="https://library.naruzkurai.com/uploads/images/gallery/2023-10/scaled-1680-/3532815.png"...
The role of triage in incident response
As you've learned, security analysts can be flooded with a large amount of alerts on any given day. How does an analyst manage all of these alerts? Hospital emergency departments receive a large number of patients every day. Each patient needs medical care for...
Robin: Foster cross-team collaboration
My name is Robin, and I am the program management lead for the Red Team at Google. I would say teamwork might be the most important skill for people who work in cybersecurity. The collaborative culture is to understand that everybody brings a unique perspect...