Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

812 total results found

Cybersecurity incident detection methods

[Completed] Professional Google Cyberse...

Security analysts use detection tools to help them discover threats, but there are additional methods of detection that can be used as well. Previously, you learned about how detection tools can identify attacks like data exfiltration. In this reading, you’ll...

Xkhanku desert (from the dragons side)

Kuroik its just random thoughts animals 'n terrain

MK: Changes in the cybersecurity industry

[Completed] Professional Google Cyberse...

Hi, I'm MK, Director in the Office of the CISO for Google Cloud. The role of the Chief Information Security Officer is both to protect Google Cloud from a security standpoint. But also to ensure that we're providing all of the tools and products necessar...

Indicators of compromise

[Completed] Professional Google Cyberse...

In this reading, you’ll be introduced to the concept of the Pyramid of Pain and you'll explore examples of the different types of indicators of compromise. Understanding and applying this concept helps organizations improve their defense and reduces the damage...

Analyze indicators of compromise with investigative tools

[Completed] Professional Google Cyberse...

So far, you've learned about the different types of detection methods that can be used to detect security incidents. This reading explores how investigative tools can be used during investigations to analyze suspicious indicators of compromise (IoCs) and build...

The benefits of documentation

[Completed] Professional Google Cyberse...

You may recall our discussion on the different documentation tools and types used by security teams when responding to incidents. In this video, we'll examine the benefits that documentation offers, so that you can better understand how to leverage doc...

Analyze indicators of compromise with investigative tools

[Completed] Professional Google Cyberse...

  So far, you've learned about the different types of detection methods that can be used to detect security incidents. This reading explores how investigative tools can be used during investigations to analyze suspicious indicators of compromise (IoCs) and bu...

Best practices for effective documentation

[Completed] Professional Google Cyberse...

Documentation is any form of recorded content that is used for a specific purpose, and it is essential in the field of security. Security teams use documentation to support investigations, complete tasks, and communicate findings. This reading explores the ben...

Kuroik blood

Blood Witch Diary Entries

I have something bugging me. And it's why not everything can use magic. Especially the invading humans, they have sufficiently advanced technology for molecular deconstruction. However, they aren't capable of using magic. I have blue blood, and it's probably t...

Document evidence with chain of custody forms

[Completed] Professional Google Cyberse...

Let's continue our discussion on how documentation provides transparency through documents like chain of custody. During incident response, evidence must be accounted for during the entire incident's lifecycle. Tracking evidence is important if the e...

The value of cybersecurity playbooks

[Completed] Professional Google Cyberse...

Have you ever taken a trip to a place you've never visited before? You may have used a travel itinerary to plan your trip activities. Travel itineraries are essential documents to have, especially for travel to a new place. They help keep you organ...

Generic Phishing Playbook Version 1.0

[Completed] Professional Google Cyberse...

links to original google doc Purpose 2 Using this playbook 2 Step 1: Receive phishing alert 2 Step 2: Evaluate the alert 2 Step 3.0: Does the email contain any links or attachments? 3 Step 3.1: Are the links or attachments malicious? 3 Step 3.2: Update ...

NaruZkurai

Naru's work

#summery2{color: black;} #Aboutme{ color: eeefff; border-radius: 0 0 10px 10px; border: 1px solid gray; background-color: #333; } summery2{color: black;} #summery1{color: black;} #Howtousethissite{ color: eeefff;...

code for the home page

Naru's work

<div class="image-container"> <div class="socials"> <h2><a title="My Discord Server" href="https://discord.gg/2qXr4yMg6Y" target="_blank" rel="noopener"><img src="https://library.naruzkurai.com/uploads/images/gallery/2023-10/scaled-1680-/3532815.png"...

The role of triage in incident response

[Completed] Professional Google Cyberse...

As you've learned, security analysts can be flooded with a large amount of alerts on any given day. How does an analyst manage all of these alerts? Hospital emergency departments receive a large number of patients every day. Each patient needs medical care for...

Robin: Foster cross-team collaboration

[Completed] Professional Google Cyberse...

  My name is Robin, and I am the program management lead for the Red Team at Google. I would say teamwork might be the most important skill for people who work in cybersecurity. The collaborative culture is to understand that everybody brings a unique perspect...

The triage process

[Completed] Professional Google Cyberse...

Previously, you learned that triaging is used to assess alerts and assign priority to incidents. In this reading, you'll explore the triage process and its benefits. As a security analyst, you'll be responsible for analyzing security alerts. Having the skills ...

The containment, eradication, and recovery phase of the lifecycle

[Completed] Professional Google Cyberse...

 In this video, we'll discuss the third phase of the incident response lifecycle. This phase includes the steps for how security teams contain, eradicate, and recover from an incident. It's important to note that these steps interrelate. Containment helps meet...

Business continuity considerations

[Completed] Professional Google Cyberse...

Previously, you learned about how security teams develop incident response plans to help ensure that there is a prepared and consistent process to quickly respond to security incidents. In this reading, you'll explore the importance that business continuity pl...

The post-incident activity phase of the lifecycle

[Completed] Professional Google Cyberse...

Now that a security team has successfully contained eradicated and recovered from an incident, their job is done, right?Not quite.Whether it's a new technology or a new vulnerability, there's always more to learn in the security field.The perfect time for lear...