From the course: Introduction to SecOps on Google Distributed Cloud (GDC) by Google
Unlock this course with a free trial
Join today to access over 25,400 courses taught by industry experts.
Module review - Google Cloud Platform Tutorial
From the course: Introduction to SecOps on Google Distributed Cloud (GDC) by Google
Module review
- [Narrator] Let's briefly recap what you've learned. This module focused on advanced security operations in the SOC. You learned how logs power security processes in the GDC SOC, and you were introduced to the SecOps processes that defend the GDC, the SIEM system, which supports the manual review of logging and monitoring, and SOAR and EDR, which both support automated security processes. This module also highlighted the importance of an incident response plan and escalation, and you reviewed the three phases of an incident: monitoring, intake, and incident response. You were also introduced to the SOC processes behind advanced security services, threat modeling, vulnerability management, and security engineering. This module served as a high level introduction to these important topics. All of these concepts will be further discussed in later modules, as well as in course two and course three of Security Operations…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
(Locked)
Module overview1m 44s
-
(Locked)
Logs in the GDC SOC4m 8s
-
(Locked)
Manual and automated security processes1m 12s
-
(Locked)
Security Information and Event Management (SIEM)4m 3s
-
(Locked)
Security Orchestration, Automation, and Response (SOAR)3m 59s
-
(Locked)
Endpoint Detection and Response (EDR)5m 1s
-
(Locked)
SIEM, EDR, and SOAR at Cymbal Federal1m 41s
-
(Locked)
An introduction to incident management6m 7s
-
(Locked)
The activities behind incident management6m 49s
-
(Locked)
The end-to-end incident response process1m 14s
-
(Locked)
Monitor2m 46s
-
(Locked)
Intake3m 49s
-
(Locked)
Escalate1m 45s
-
(Locked)
Investigate4m 19s
-
(Locked)
Contain and remediate2m 38s
-
(Locked)
Recover and report2m 52s
-
(Locked)
Recap of incident response management1m 18s
-
(Locked)
The incident response plan (IRP)1m 34s
-
(Locked)
The challenges of proactive cyber security4m 2s
-
(Locked)
Advanced security services in the SOC3m 7s
-
(Locked)
Advanced security services at Cymbal Federal2m 9s
-
(Locked)
The asset inventory3m 58s
-
(Locked)
Introduction to threat modeling5m 41s
-
(Locked)
Introduction to vulnerability management7m 26s
-
(Locked)
Introduction to security engineering6m 35s
-
(Locked)
Module review1m 9s
-
(Locked)
-
-