Sound the Alarm: Detection and Response (Coursera)

Sound the Alarm: Detection and Response (Coursera)
Course Auditing
Categories
Effort
Certification
Languages
Misc

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Sound the Alarm: Detection and Response (Coursera)
This is the sixth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the fifth Google Cybersecurity Certificate course. In this course, you will focus on incident detection and response.

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

You'll define a security incident and explain the incident response lifecycle, including the roles and responsibilities of incident response teams. You'll analyze and interpret network communications to detect security incidents using packet sniffing tools to capture network traffic. By assessing and analyzing artifacts, you'll explore the incident investigation and response processes and procedures. Additionally, you'll practice using Intrusion Detection Systems (IDS) and Security Information Event Management (SIEM) tools.

Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs.

Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary.

By the end of this course, you will:

- Explain the lifecycle of an incident.

- Describe the tools used in documentation, detection, and management of incidents.

- Analyze packets to interpret network communications.

- Perform artifact investigations to analyze and verify security incidents.

- Identify the steps to contain, eradicate, and recover from an incident.

- Determine how to read and analyze logs during incident investigation.

- Interpret the basic syntax and components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools.

- Perform queries in Security Information and Event Management (SIEM) tools to investigate an event.

Course 6 of 8 in the Google Cybersecurity Professional Certificate.


What You Will Learn

- Identify the steps to contain, eradicate, and recover from an incident

- Analyze packets to interpret network communications

- Understand basic syntax, components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools

- Perform queries in Security Information and Event Management (SIEM) tools to investigate an event


Syllabus


WEEK 1

Introduction to detection and incident response

Detection and incident response are an important part of a cybersecurity analyst’s work. You'll explore how cybersecurity professionals verify and respond to malicious threats and become familiar with the steps involved in incident response.


WEEK 2

Network monitoring and analysis

You will explore network analysis tools, commonly referred to as packet sniffers. In particular, you'll sniff the network and analyze packets for malicious threats. You'll also craft filtering commands to analyze the contents of captured packets.


WEEK 3

Incident investigation and response

You will learn about the various processes and procedures in the stages of incident detection, investigation, analysis, and response. Then, you'll analyze the details of suspicious file hashes. You'll learn about the importance of documentation and evidence collection during the detection and response stages. Finally, you'll approximate an incident’s chronology by mapping artifacts to reconstruct an incident’s timeline.


WEEK 4

Network traffic and logs using IDS and SIEM tools

You will explore logs and their role in Intrusion Detection Systems (IDS) and Security Information Event Management (SIEM) systems. You'll learn how these systems detect attacks. You’ll also be introduced to some IDS and SIEM products. In addition, you’ll write basic IDS rules to provide alerts for malicious network traffic.



MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Course Auditing
44.00 EUR/month

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.