Advanced Search
Search Results
843 total results found
Casey: Apply soft skills in cybersecurity
Hi, my name is Casey and I'm part of the Google Cloud Enterprise Security sales team. First of all, the biggest piece of advice I can give is: do it. I want you to be here. We need all the people. It's a non-stop, ever-changing world in cybersecurity...
The importance of network traffic flows
In many organizations, network communication travels over multiple networks in different countries and across different devices. Data can get unintentionally sent and stored in insecure places, like personal email inboxes or cloud storage platforms. ...
Maintain awareness with network monitoring
Network communication can be noisy! Events like sending an email, streaming a video, or visiting a website all produce network communications in the form of network traffic and network data. As a reminder, network traffic is the amount of data that moves acros...
Data exfiltration attacks
Monitoring network traffic helps security professionals detect, prevent, and respond to attacks. In my experience as a security professional, monitoring for deviations from typical network traffic patterns has yielded big results. Even if information...
Packets and packet captures
Whether it's an employee sending an email or a malicious actor attempting to exfiltrate confidential data, actions that are performed on a network can be identified through examining network traffic flows. Understanding these network ...
Learn more about packet captures
The role of security analysts involves monitoring and analyzing network traffic flows. One way to do this is by generating packet captures and then analyzing the captured traffic to identify unusual activity on a network. Previously, you explored the fundamen...
Interpret network communications with packets
If a packet capture is like intercepting an envelope in the mail, then packet analysis is like reading the letter inside of the envelope. Let's discuss how analyzing packets can help us interpret and understand network communications. ...
Reexamine the fields of a packet header
While there are many different tools available to use, it's important as a security analyst that you learn how to read and analyze packets manually. To do so, let's examine an important packet component: IP headers. Previously, you ...
Investigate packet details
So far, you've learned about how network protocol analyzers (packet sniffers) intercept network communications. You've also learned how you can analyze packet captures (p-caps) to gain insight into the activity happening on a network. As a security analyst, yo...
Packet captures with tcpdump
Tcpdump is a popular network analyzer. It's pre-installed on many Linux distributions and can be installed on most Unix-like operating systems, like macOS. You can easily capture and monitor network traffic such as TCP, IP, ICMP, and many more. ...
example tcp dump activity
Use ifconfig to identify the interfaces that are available: sudo ifconfig example output analyst@b4aade4b3e15:~$ sudo ifconfig eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1460 inet 172.18.0.2 netmask 255.255.0.0 broadcast 172.18.255....
Activity: Research network protocol analyzers
i probably legally cant give you anything coz its an activitybut here is the gist In this activity, you'll focus on the two network protocol analyzers: Wireshark and tcpdump. Your goal is to gain a basic understanding of the Wireshark and tcpdump, how they wo...
Wrap-up; Terms and definitions from Course 6, Module 2
Nice work so far!ddddddddddddddd Congratulations on capturing and analyzing your first packet. Let's review what we've covered so far. First, you learned how network traffic flows provide valuable communications insight. Through monitoring network...
Welcome to module 3 ; The detection and analysis phase of the lifecycle
Welcome back! I want to commend you on such a fantastic job you're doing so far. The skills you are learning will create a solid foundation as you begin your security career. In the previous section, you applied your networking kn...
Cybersecurity incident detection methods
Security analysts use detection tools to help them discover threats, but there are additional methods of detection that can be used as well. Previously, you learned about how detection tools can identify attacks like data exfiltration. In this reading, you’ll...
Xkhanku desert (from the dragons side)
MK: Changes in the cybersecurity industry
Hi, I'm MK, Director in the Office of the CISO for Google Cloud. The role of the Chief Information Security Officer is both to protect Google Cloud from a security standpoint. But also to ensure that we're providing all of the tools and products necessar...
Indicators of compromise
In this reading, you’ll be introduced to the concept of the Pyramid of Pain and you'll explore examples of the different types of indicators of compromise. Understanding and applying this concept helps organizations improve their defense and reduces the damage...
Analyze indicators of compromise with investigative tools
So far, you've learned about the different types of detection methods that can be used to detect security incidents. This reading explores how investigative tools can be used during investigations to analyze suspicious indicators of compromise (IoCs) and build...
The benefits of documentation
You may recall our discussion on the different documentation tools and types used by security teams when responding to incidents. In this video, we'll examine the benefits that documentation offers, so that you can better understand how to leverage doc...