学生对 Google 提供的 Sound the Alarm: Detection and Response 的评价和反馈
课程概述
热门审阅
TK
Sep 25, 2023
just a few improvements that should be made, some parts confused me of not knowing what is being asked of me. Other than that, it's an excellent course.
MG
Dec 11, 2023
For the complexity and level of detail required for this particular topic I suppose the amount of material provided in this course was more than sufficient. There's much more to learn.
401 - Sound the Alarm: Detection and Response 的 425 个评论(共 516 个)
创建者 Baladitya D
•Jul 27, 2024
Best
创建者 Bedri A
•Jul 23, 2024
nice
创建者 benfetima e
•Jun 17, 2024
good
创建者 Bekzod E
•May 18, 2024
good
创建者 Nithin C
•May 4, 2024
good
创建者 Armando A
•Apr 27, 2024
Good
创建者 Javohir O
•Apr 18, 2024
good
创建者 Rani.Atnala
•Mar 26, 2024
good
创建者 perfran j m s
•Mar 2, 2024
Good
创建者 VANESSA F G
•Nov 8, 2024
ñ.
创建者 AKSHAY S
•Oct 13, 2024
ok
创建者 Hendri N
•Jun 16, 2023
OK
创建者 SHOKHRUZ M
•Dec 20, 2024
5
创建者 Құсан Е С
•Dec 7, 2024
s
创建者 Hugo S R L
•Oct 30, 2024
g
创建者 Shoxrux O
•Apr 24, 2024
k
创建者 bringkwan t
•Nov 10, 2023
n
创建者 Kopparam M
•Mar 27, 2024
The topic "Sound the Alarm: Detection and Response" delves into the critical aspects of cybersecurity related to detecting and responding to security incidents effectively. This review will explore the key points covered in the topic and provide an assessment of its relevance and importance in the realm of cybersecurity. First and foremost, the topic emphasizes the significance of timely detection of security incidents. It underscores the fact that early detection can significantly mitigate the impact of cyber threats, preventing them from escalating into full-blown security breaches. This is a crucial aspect of cybersecurity as it allows organizations to proactively identify and address potential threats before they cause substantial harm. Furthermore, the topic delves into the various techniques and tools used for detecting security incidents. It highlights the importance of having robust monitoring systems in place that can continuously track and analyze network traffic, system logs, and other relevant data sources for suspicious activities or anomalies. Additionally, the topic discusses the role of intrusion detection systems (IDS), intrusion prevention systems (IPS), security information and event management (SIEM) solutions, and other advanced detection technologies in enhancing the overall security posture of an organization. In terms of incident response, the topic emphasizes the need for a well-defined and structured response plan. It outlines the key steps involved in an effective incident response process, including identification, containment, eradication, recovery, and lessons learned. The importance of having a dedicated incident response team, clear communication channels, and predefined response procedures is also underscored in the topic. Overall, "Sound the Alarm: Detection and Response" provides valuable insights into the critical aspects of cybersecurity related to detecting and responding to security incidents. It serves as a reminder of the proactive measures that organizations must take to protect their assets, data, and systems from evolving cyber threats. By implementing robust detection mechanisms and establishing efficient incident response protocols, organizations can strengthen their cybersecurity posture and mitigate the risks associated with cyber attacks.
创建者 Colleen M
•May 8, 2024
I like the models and activities until the final section. There were two optional activities that were part of tests and I don't think that is fair to have activities that are optional and then test on them, without having another way of obtaining the information besides down loading software or fumbling around trying to find the answers on an application you have never seen. I am enjoying the readings and videos very much and they are very helpful most of the time.
创建者 Manoj K G
•Aug 29, 2023
The topics covered in the course gives the peak idea how the cybersecurity analyst performs in an organization. Freshers like me who are new to the topic feels little bit tough when compared to previous courses. Overall the way of delivering the subject makes any kind of person understand well. Practice Practice Practice ......Keep on understanding the subject that makes anyone strong..Thanks
创建者 Isaac S
•Jun 27, 2023
This section was a lot of fun, but not as fun as it could be. Theres a lot of potential for hands on during this lesson which the Google IT certification had. The information was pretty text book so even if you have a degree in cybersecurity, you will need to brush up on some vocab and the coursera definitions for those words.
创建者 Arun N
•Feb 19, 2024
I would have given 5 stars but I expected more hands on with SPLUNK and CHRONICLE but it was just brief overview so I don't feel confident in including it in my resume. CHRONICLE link was not even working due to some issue - might be best to check that out too. Had to skip it because of that. Other than these, it was great.
创建者 David E
•Feb 24, 2025
Course 6 was a more challenging, being that I am new to a lot of the tools being taught like Splunk and chronicles, Unlike the previous chapters and modules, chapter 6 learning trajectory was not gradual, but it worked out in the end because it made me explore other resources to aid my understanding
创建者 Ty H
•Aug 22, 2023
It didn't flow as smoothly as the other courses and the videos of the main presenter were dubbed on the lower volume spectrum. Overall, another good course in the Google arsenal as I progress through this learning journey.
创建者 Justin F
•May 13, 2024
I really loved this the only addition I would recommend would be going in depth in understanding logs and traffic and whats actually happening..This is covered but not as good as it could be however, amazing lesson!!