Chevron Left
返回到 Sound the Alarm: Detection and Response

学生对 Google 提供的 Sound the Alarm: Detection and Response 的评价和反馈

4.8
3,324 个评分

课程概述

This is the sixth course in the Google Cybersecurity Certificate. Learners will focus on incident detection and response. They will learn what defines a security incident and explain the incident response lifecycle, including the roles and responsibilities of incident response teams. Learners will analyze and interpret network communications to detect security incidents using packet sniffing tools to capture network traffic. By assessing and analyzing artifacts, learners will explore the incident investigation and response processes and procedures. Additionally, they will develop a conceptual overview of log data and their role in intrusion detection systems (IDS) and Security Information Event Management (SIEM) tools. Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Explain the lifecycle of an incident. - Describe the tools used in documentation, detection, and management of incidents. - Analyze packets to interpret network communications. - Perform artifact investigations to analyze and verify security incidents. - Identify the steps to contain, eradicate, and recover from an incident. - Determine how to read and analyze logs during incident investigation. - Interpret the basic syntax and components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools. - Perform queries in Security Information and Event Management (SIEM) tools to investigate an event....

热门审阅

WR

May 21, 2023

The material was very good, but the sound quality was less than ideal. I had to turn the volume way up on the instruction, and back-down on the day-in-the-life segments.

SE

Jul 11, 2024

I loved this coursed and learned so much. The only thing I would have liked to see is if the all of the SIEM tools were integrated into a lab like many of the other labs are directly in the courses.

筛选依据:

451 - Sound the Alarm: Detection and Response 的 475 个评论(共 516 个)

创建者 Li W

Aug 3, 2024

need more guidance of operating the tools and where to find the answers

创建者 Samira I

Jul 21, 2024

Techical and hands on! I feel ready to take on the Security +

创建者 Pablo G V

Aug 27, 2024

Bastante amplio, buenas herramientas, y laboratorios

创建者 Lakshmikanthan C

Jul 27, 2024

it is very useful me and it is very easy understand

创建者 Abiodun L

Nov 14, 2023

I felt this is really the job called Cybersecurity.

创建者 Charles A

Sep 5, 2024

the hands on experience with the lab was helpful

创建者 Bernardo M

Aug 29, 2024

Very informative i prefer this style of learning

创建者 Jim B

May 31, 2023

Great, looking forward to much more. Cheers

创建者 Albert C

Nov 4, 2023

Content and presentation is well constructed

创建者 Slim K

Mar 4, 2024

Very interesting and understandable course

创建者 Ian D M

Sep 10, 2023

Simply the best this program has to offer.

创建者 cristina r á

Oct 28, 2024

la actividad de splunk no funciona bien

创建者 MARIA D L A S B

Jul 5, 2025

hay laboratorios que no me deja entrar

创建者 Kyle W

Aug 28, 2023

some issues with splunk

创建者 Tamirane A

Sep 16, 2024

great learning tools

创建者 Rodrigo G

Nov 12, 2024

Nice but high-level

创建者 Rajiv

Jul 29, 2024

It was nice one

创建者 Manuel B

Oct 14, 2025

Great course

创建者 Eric S

Aug 10, 2024

exellent

创建者 rushikesh s

Oct 7, 2024

best

创建者 EL A H Z

Aug 20, 2024

good

创建者 AMUTHA E

May 9, 2024

GOOD

创建者 Muhammad S

Jun 19, 2025

;,l

创建者 Maricruz C S

May 3, 2025

.

创建者 Vlatka

Feb 13, 2026

I think this Course went through some changes but the content is not entirely adapted (Splunk, Wazuh) so it's confusing. It was the weakest course in the series as it was all over the place and jumped from one topic to another somewhat randomly. The Wazuh activity was not good, as it took too much time and in the end the instructions were not sufficient to complete it. The permissions did not allow loading the data from the files in the folder on the host. Maybe I could figure it out on my own, but it was way too much work for such a short activity already... This needs to be either improved or replaced with something more appropriate.