From the course: Introduction to SecOps on Google Distributed Cloud (GDC) by Google
Unlock this course with a free trial
Join today to access over 25,400 courses taught by industry experts.
Introduction to security engineering - Google Cloud Platform Tutorial
From the course: Introduction to SecOps on Google Distributed Cloud (GDC) by Google
Introduction to security engineering
- [Instructor] Finally, let's look at the third tier three activity for your example SOC, security engineering. Security engineering is the systematic process that designs, implements, and maintains security controls in the SOC in order to safeguard the organization's infrastructure, systems, and applications. Security controls are defined as any specific measure or countermeasure that is put in place to protect an information system, network, application, or data from security threats and risks. Security engineering plays a critical role in fortifying an organization's security posture. By managing the SOC systems, security engineers ensure the efficiency and compliance of processes. At its core, security engineering is about managing security systems. First, the security engineer needs to gather the technical and business requirements that are behind the system design. Security engineers design, implement, test, and…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
(Locked)
Module overview1m 44s
-
(Locked)
Logs in the GDC SOC4m 8s
-
(Locked)
Manual and automated security processes1m 12s
-
(Locked)
Security Information and Event Management (SIEM)4m 3s
-
(Locked)
Security Orchestration, Automation, and Response (SOAR)3m 59s
-
(Locked)
Endpoint Detection and Response (EDR)5m 1s
-
(Locked)
SIEM, EDR, and SOAR at Cymbal Federal1m 41s
-
(Locked)
An introduction to incident management6m 7s
-
(Locked)
The activities behind incident management6m 49s
-
(Locked)
The end-to-end incident response process1m 14s
-
(Locked)
Monitor2m 46s
-
(Locked)
Intake3m 49s
-
(Locked)
Escalate1m 45s
-
(Locked)
Investigate4m 19s
-
(Locked)
Contain and remediate2m 38s
-
(Locked)
Recover and report2m 52s
-
(Locked)
Recap of incident response management1m 18s
-
(Locked)
The incident response plan (IRP)1m 34s
-
(Locked)
The challenges of proactive cyber security4m 2s
-
(Locked)
Advanced security services in the SOC3m 7s
-
(Locked)
Advanced security services at Cymbal Federal2m 9s
-
(Locked)
The asset inventory3m 58s
-
(Locked)
Introduction to threat modeling5m 41s
-
(Locked)
Introduction to vulnerability management7m 26s
-
(Locked)
Introduction to security engineering6m 35s
-
(Locked)
Module review1m 9s
-
(Locked)
-
-