Advanced Search
Search Results
812 total results found
Log sources and log ingestion
In this reading, you’ll explore more on the importance of log ingestion. You may recall that security information and event management (SIEM) tools collect and analyze log data to monitor critical activities in an organization. You also learned about log analy...
Query for events with Splunk
Now that we've reviewed how a SIEM works, let's learn how to search and query events in a SIEM database.Data that's been imported into a SIEM can be accessed by entering queries into the SIEM's search engine.Massive amounts of data can be stored in a SIEM data...
Search methods with SIEM tools
So far, you’ve learned about how you can use security information and event management (SIEM) tools to search for security events such as failed login attempts. Remember, SIEM is an application that collects and analyzes log data to monitor critical activities...
Follow-along guide for Splunk sign-up
Note: The following reading is an optional supplement to the following course item, Activity: Perform a query with Splunk . Both this reading and the following activity are optional and will not affect your completion of the course. You may choose to skip thi...
Wrap-up; Glossary terms from module 4
Congratulations!You've made it to the end of this section.You've made so much progress in your security journey.Let's review what we learned.You learned all about how to read and analyze logs.You examined how log files are created and used for analysis.You als...
Course wrap-up
Congratulations on completing this course on detection and response!As you've progressed, we've covered a wide range of topics and tools.Let's take a moment to review what you've learned.First, we began with an overview of the incident response lifecycle.You l...
Terms and definitions from Course 6, course 6 glossary
A Advanced persistent threat (APT): An instance when a threat actor maintains unauthorized access to a system for an extended period of time Analysis: The investigation and validation of alerts Anomaly-based analysis: A detection method that identifies...
PICOCTF WPA-ing Out (Rockyou word list + aircrack-ng)
| 200 pointsTags: picoGym ExclusiveForensics Author: MistressVampyDescriptionI thought that my password was super-secret, but it turns out that passwords passed over the AIR can be CRACKED, especially if I used the same wireless network password as one in the...
Python Wrangling
files you will need ende.py import sys import base64 from cryptography.fernet import Fernet usage_msg = "Usage: "+ sys.argv[0] +" (-e/-d) [file]" help_msg = usage_msg + "\n" +\ "Examples:\n" +\ " To decrypt a file named 'pole...
New Page
script to solve it encoded_str = "灩捯䍔䙻ㄶ形楴獟楮獴㌴摟潦弸彥㜰㍢㐸㙽" decoded_str = "" for char in encoded_str: ascii_val = ord(char) first_char = chr(ascii_val >> 8) second_char = chr(ascii_val % 256) decoded_str += first_char + second_char pri...
New Page
Crouse Outline ?
You will get an introduction to the Python programming language and how Python is used in cybersecurity. You'll also explore foundational Python concepts including data types, variables, conditional statements, and iterative statements.Learning Objectives ...
Introduction to Course 7
The demand for security professionals has never been higher.Organizations across the world require professionals with your knowledge and skills to protect their systems from attackers.And with the number of threats on the rise, security professionals often per...
Ángel: My personal career journey
My name is Ángel, and I'm a Security Engineer at Google.There were a number of things in my life that led me to security.One of them was definitely curiosity when I was growing up.My parents are accountants, and so they had pocket calculators and mechanical pe...
Welcome to module 1
The process of learning a new programming language is similar to learning a new language.For instance, like any human language, programming consists of words organized together to form lines of code.Lines of code are used to communicate with a computer, simila...
Python and cybersecurity
Security professionals use a variety of tools.One of those tools is computer programming.Programming is used to create a specific set of instructions for a computer to execute tasks.Let's take an example of a vending machine.Think of a vending machine as a com...
Get to know Python!
Why might a security analyst choose Python to automate tasks? Python resembles human language and is easy to read. A security analyst might choose Python to automate tasks because they can find a lot of support online and follow standard guidelines. An an...
Create a basic Python script
Hi there.Previously, we discussed the basics of Python.Now we'll practice writing and running code.When we work in Python, we refer to what we write as a "script" or a "program." There are subtle differences between the two.Let's compare a computer program to ...
Python environments
You can run Python through a variety of environments. These environments include notebooks, integrated development environments (IDEs), and the command line. This reading will introduce you to these environments. It will focus primarily on notebooks because th...
copy paste this into a .html this is what the lab looks like
<!DOCTYPE html> <html> <head><meta charset="utf-8" /> <title>LAB_Activity_PracticeWritingPythonCode-Copy1</title> <script src="https://cdnjs.cloudflare.com/ajax/libs/require.js/2.1.10/require.min.js"></script> <script src="https://cdnjs.cloudflare.com...