Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

948 total results found

example tcp dump activity

[Completed] Professional Google Cyberse...

Use ifconfig to identify the interfaces that are available: sudo ifconfig example output analyst@b4aade4b3e15:~$ sudo ifconfig eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1460 inet 172.18.0.2 netmask 255.255.0.0 broadcast 172.18.255....

Activity: Research network protocol analyzers

[Completed] Professional Google Cyberse...

i probably legally cant give you anything coz its an activitybut here is the gist In this activity, you'll focus on the two network protocol analyzers: Wireshark and tcpdump. Your goal is to gain a basic understanding of the Wireshark and tcpdump, how they wo...

Wrap-up; Terms and definitions from Course 6, Module 2

[Completed] Professional Google Cyberse...

Nice work so far!ddddddddddddddd Congratulations on capturing and analyzing your first packet. Let's review what we've covered so far. First, you learned how network traffic flows provide valuable communications insight. Through monitoring network...

Welcome to module 3 ; The detection and analysis phase of the lifecycle

[Completed] Professional Google Cyberse...

Welcome back! I want to commend you on such a fantastic job you're doing so far. The skills you are learning will create a solid foundation as you begin your security career. In the previous section, you applied your networking kn...

Cybersecurity incident detection methods

[Completed] Professional Google Cyberse...

Security analysts use detection tools to help them discover threats, but there are additional methods of detection that can be used as well. Previously, you learned about how detection tools can identify attacks like data exfiltration. In this reading, you’ll...

Xkhanku desert (from the dragons side)

Kuroik its just random thoughts animals 'n terrain

MK: Changes in the cybersecurity industry

[Completed] Professional Google Cyberse...

Hi, I'm MK, Director in the Office of the CISO for Google Cloud. The role of the Chief Information Security Officer is both to protect Google Cloud from a security standpoint. But also to ensure that we're providing all of the tools and products necessar...

Indicators of compromise

[Completed] Professional Google Cyberse...

In this reading, you’ll be introduced to the concept of the Pyramid of Pain and you'll explore examples of the different types of indicators of compromise. Understanding and applying this concept helps organizations improve their defense and reduces the damage...

Analyze indicators of compromise with investigative tools

[Completed] Professional Google Cyberse...

So far, you've learned about the different types of detection methods that can be used to detect security incidents. This reading explores how investigative tools can be used during investigations to analyze suspicious indicators of compromise (IoCs) and build...

The benefits of documentation

[Completed] Professional Google Cyberse...

You may recall our discussion on the different documentation tools and types used by security teams when responding to incidents. In this video, we'll examine the benefits that documentation offers, so that you can better understand how to leverage doc...

Analyze indicators of compromise with investigative tools

[Completed] Professional Google Cyberse...

  So far, you've learned about the different types of detection methods that can be used to detect security incidents. This reading explores how investigative tools can be used during investigations to analyze suspicious indicators of compromise (IoCs) and bu...

Best practices for effective documentation

[Completed] Professional Google Cyberse...

Documentation is any form of recorded content that is used for a specific purpose, and it is essential in the field of security. Security teams use documentation to support investigations, complete tasks, and communicate findings. This reading explores the ben...

Kuroik blood

Blood Witch Diary Entries

I have something bugging me. And it's why not everything can use magic. Especially the invading humans, they have sufficiently advanced technology for molecular deconstruction. However, they aren't capable of using magic. I have blue blood, and it's probably t...

Document evidence with chain of custody forms

[Completed] Professional Google Cyberse...

Let's continue our discussion on how documentation provides transparency through documents like chain of custody. During incident response, evidence must be accounted for during the entire incident's lifecycle. Tracking evidence is important if the e...

The value of cybersecurity playbooks

[Completed] Professional Google Cyberse...

Have you ever taken a trip to a place you've never visited before? You may have used a travel itinerary to plan your trip activities. Travel itineraries are essential documents to have, especially for travel to a new place. They help keep you organ...

Generic Phishing Playbook Version 1.0

[Completed] Professional Google Cyberse...

links to original google doc Purpose 2 Using this playbook 2 Step 1: Receive phishing alert 2 Step 2: Evaluate the alert 2 Step 3.0: Does the email contain any links or attachments? 3 Step 3.1: Are the links or attachments malicious? 3 Step 3.2: Update ...

NaruZkurai

Naru's work

#summery2{color: black;} #Aboutme{ color: eeefff; border-radius: 0 0 10px 10px; border: 1px solid gray; background-color: #333; } summery2{color: black;} #summery1{color: black;} #Howtousethissite{ color: eeefff;...

code for the home page

Naru's work

<div class="image-container"> <div class="socials"> <h2><a title="My Discord Server" href="https://discord.gg/2qXr4yMg6Y" target="_blank" rel="noopener"><img src="https://library.naruzkurai.com/uploads/images/gallery/2023-10/scaled-1680-/3532815.png"...

The role of triage in incident response

[Completed] Professional Google Cyberse...

As you've learned, security analysts can be flooded with a large amount of alerts on any given day. How does an analyst manage all of these alerts? Hospital emergency departments receive a large number of patients every day. Each patient needs medical care for...

Robin: Foster cross-team collaboration

[Completed] Professional Google Cyberse...

  My name is Robin, and I am the program management lead for the Red Team at Google. I would say teamwork might be the most important skill for people who work in cybersecurity. The collaborative culture is to understand that everybody brings a unique perspect...