Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

948 total results found

Examine Suricata logs

[Completed] Professional Google Cyberse...

Now let's examine some logs generated by Suricata.In Suricata, alerts and events are output in a format known as EVE JSON.EVE stands for Extensible Event Format and JSON stands for JavaScript Object Notation.As you previously learned, JSON uses key-value pairs...

Overview of Suricata

[Completed] Professional Google Cyberse...

So far, you've learned about detection signatures and you were introduced to Suricata, an incident detection system (IDS). In this reading, you’ll explore more about Suricata. You'll also learn about the value of writing customized signatures and configuratio...

Activity: Explore signatures and logs with Suricata

[Completed] Professional Google Cyberse...

Introduction In this lab activity, you'll explore the components of a rule using Suricata. You'll also have an opportunity to trigger a rule and examine the output in Suricata. You'll use the Bash shell to complete these steps.  What you’ll do You have mult...

Reexamine SIEM tools

[Completed] Professional Google Cyberse...

As a security analyst, you'll need to be able to quickly access the relevant data required to perform your duties.Whether it's triaging alerts, monitoring systems, or analyzing log data during incident investigations, a SIEM is the tool for this job.As a quick...

Log sources and log ingestion

[Completed] Professional Google Cyberse...

In this reading, you’ll explore more on the importance of log ingestion. You may recall that security information and event management (SIEM) tools collect and analyze log data to monitor critical activities in an organization. You also learned about log analy...

Query for events with Splunk

[Completed] Professional Google Cyberse...

Now that we've reviewed how a SIEM works, let's learn how to search and query events in a SIEM database.Data that's been imported into a SIEM can be accessed by entering queries into the SIEM's search engine.Massive amounts of data can be stored in a SIEM data...

Search methods with SIEM tools

[Completed] Professional Google Cyberse...

So far, you’ve learned about how you can use security information and event management (SIEM) tools to search for security events such as failed login attempts. Remember, SIEM is an application that collects and analyzes log data to monitor critical activities...

Follow-along guide for Splunk sign-up

[Completed] Professional Google Cyberse...

Note: The following reading is an optional supplement to the following course item, Activity: Perform a query with Splunk . Both this reading and the following activity are optional and will not affect your completion of the course. You may choose to skip thi...

Wrap-up; Glossary terms from module 4

[Completed] Professional Google Cyberse...

Congratulations!You've made it to the end of this section.You've made so much progress in your security journey.Let's review what we learned.You learned all about how to read and analyze logs.You examined how log files are created and used for analysis.You als...

Course wrap-up

[Completed] Professional Google Cyberse...

Congratulations on completing this course on detection and response!As you've progressed, we've covered a wide range of topics and tools.Let's take a moment to review what you've learned.First, we began with an overview of the incident response lifecycle.You l...

Terms and definitions from Course 6, course 6 glossary

[Completed] Professional Google Cyberse...

  A Advanced persistent threat (APT): An instance when a threat actor maintains unauthorized access to a system for an extended period of time  Analysis: The investigation and validation of alerts  Anomaly-based analysis: A detection method that identifies...

PICOCTF WPA-ing Out (Rockyou word list + aircrack-ng)

[Active] leet code/ctf

| 200 pointsTags: picoGym ExclusiveForensics Author: MistressVampyDescriptionI thought that my password was super-secret, but it turns out that passwords passed over the AIR can be CRACKED, especially if I used the same wireless network password as one in the...

Python Wrangling

[Active] leet code/ctf

files you will need ende.py import sys import base64 from cryptography.fernet import Fernet usage_msg = "Usage: "+ sys.argv[0] +" (-e/-d) [file]" help_msg = usage_msg + "\n" +\ "Examples:\n" +\ " To decrypt a file named 'pole...

New Page

[Active] leet code/ctf

script to solve it encoded_str = "灩捯䍔䙻ㄶ形楴獟楮獴㌴摟潦弸彥㜰㍢㐸㙽" decoded_str = "" for char in encoded_str: ascii_val = ord(char) first_char = chr(ascii_val >> 8) second_char = chr(ascii_val % 256) decoded_str += first_char + second_char pri...

New Page

Ideas

 

Crouse Outline ?

[Completed] Professional Google Cyberse... module 1

You will get an introduction to the Python programming language and how Python is used in cybersecurity. You'll also explore foundational Python concepts including data types, variables, conditional statements, and iterative statements.Learning Objectives    ...

Introduction to Course 7

[Completed] Professional Google Cyberse... module 1

The demand for security professionals has never been higher.Organizations across the world require professionals with your knowledge and skills to protect their systems from attackers.And with the number of threats on the rise, security professionals often per...

Ángel: My personal career journey

[Completed] Professional Google Cyberse... module 1

My name is Ángel, and I'm a Security Engineer at Google.There were a number of things in my life that led me to security.One of them was definitely curiosity when I was growing up.My parents are accountants, and so they had pocket calculators and mechanical pe...

Welcome to module 1

[Completed] Professional Google Cyberse... module 1

The process of learning a new programming language is similar to learning a new language.For instance, like any human language, programming consists of words organized together to form lines of code.Lines of code are used to communicate with a computer, simila...

Python and cybersecurity

[Completed] Professional Google Cyberse... module 1

Security professionals use a variety of tools.One of those tools is computer programming.Programming is used to create a specific set of instructions for a computer to execute tasks.Let's take an example of a vending machine.Think of a vending machine as a com...