Advanced Search
Search Results
812 total results found
Cybersecurity incident detection methods
Security analysts use detection tools to help them discover threats, but there are additional methods of detection that can be used as well. Previously, you learned about how detection tools can identify attacks like data exfiltration. In this reading, you’ll...
Xkhanku desert (from the dragons side)
MK: Changes in the cybersecurity industry
Hi, I'm MK, Director in the Office of the CISO for Google Cloud. The role of the Chief Information Security Officer is both to protect Google Cloud from a security standpoint. But also to ensure that we're providing all of the tools and products necessar...
Indicators of compromise
In this reading, you’ll be introduced to the concept of the Pyramid of Pain and you'll explore examples of the different types of indicators of compromise. Understanding and applying this concept helps organizations improve their defense and reduces the damage...
Analyze indicators of compromise with investigative tools
So far, you've learned about the different types of detection methods that can be used to detect security incidents. This reading explores how investigative tools can be used during investigations to analyze suspicious indicators of compromise (IoCs) and build...
The benefits of documentation
You may recall our discussion on the different documentation tools and types used by security teams when responding to incidents. In this video, we'll examine the benefits that documentation offers, so that you can better understand how to leverage doc...
Analyze indicators of compromise with investigative tools
So far, you've learned about the different types of detection methods that can be used to detect security incidents. This reading explores how investigative tools can be used during investigations to analyze suspicious indicators of compromise (IoCs) and bu...
Best practices for effective documentation
Documentation is any form of recorded content that is used for a specific purpose, and it is essential in the field of security. Security teams use documentation to support investigations, complete tasks, and communicate findings. This reading explores the ben...
Kuroik blood
I have something bugging me. And it's why not everything can use magic. Especially the invading humans, they have sufficiently advanced technology for molecular deconstruction. However, they aren't capable of using magic. I have blue blood, and it's probably t...
Document evidence with chain of custody forms
Let's continue our discussion on how documentation provides transparency through documents like chain of custody. During incident response, evidence must be accounted for during the entire incident's lifecycle. Tracking evidence is important if the e...
The value of cybersecurity playbooks
Have you ever taken a trip to a place you've never visited before? You may have used a travel itinerary to plan your trip activities. Travel itineraries are essential documents to have, especially for travel to a new place. They help keep you organ...
Generic Phishing Playbook Version 1.0
links to original google doc Purpose 2 Using this playbook 2 Step 1: Receive phishing alert 2 Step 2: Evaluate the alert 2 Step 3.0: Does the email contain any links or attachments? 3 Step 3.1: Are the links or attachments malicious? 3 Step 3.2: Update ...
NaruZkurai
#summery2{color: black;} #Aboutme{ color: eeefff; border-radius: 0 0 10px 10px; border: 1px solid gray; background-color: #333; } summery2{color: black;} #summery1{color: black;} #Howtousethissite{ color: eeefff;...
code for the home page
<div class="image-container"> <div class="socials"> <h2><a title="My Discord Server" href="https://discord.gg/2qXr4yMg6Y" target="_blank" rel="noopener"><img src="https://library.naruzkurai.com/uploads/images/gallery/2023-10/scaled-1680-/3532815.png"...
The role of triage in incident response
As you've learned, security analysts can be flooded with a large amount of alerts on any given day. How does an analyst manage all of these alerts? Hospital emergency departments receive a large number of patients every day. Each patient needs medical care for...
Robin: Foster cross-team collaboration
My name is Robin, and I am the program management lead for the Red Team at Google. I would say teamwork might be the most important skill for people who work in cybersecurity. The collaborative culture is to understand that everybody brings a unique perspect...
The triage process
Previously, you learned that triaging is used to assess alerts and assign priority to incidents. In this reading, you'll explore the triage process and its benefits. As a security analyst, you'll be responsible for analyzing security alerts. Having the skills ...
The containment, eradication, and recovery phase of the lifecycle
In this video, we'll discuss the third phase of the incident response lifecycle. This phase includes the steps for how security teams contain, eradicate, and recover from an incident. It's important to note that these steps interrelate. Containment helps meet...
Business continuity considerations
Previously, you learned about how security teams develop incident response plans to help ensure that there is a prepared and consistent process to quickly respond to security incidents. In this reading, you'll explore the importance that business continuity pl...
The post-incident activity phase of the lifecycle
Now that a security team has successfully contained eradicated and recovered from an incident, their job is done, right?Not quite.Whether it's a new technology or a new vulnerability, there's always more to learn in the security field.The perfect time for lear...