Ajay Pulakhandam
成为会员时间:2025
黄金联赛
6856 积分
成为会员时间:2025
This course provides a comprehensive, end-to-end exploration of Google SecOps SIEM, guiding learners from foundational concepts to advanced investigation and detection engineering. Participants will gain hands-on experience with data ingestion, normalization, RBAC configuration, searching, and dashboarding using both legacy and native capabilities. Through structured modules, demos, and curated examples, the course emphasizes real-world investigation workflows, UDM-based analytics, and YARA-L rule development. By the end of the course, learners will be equipped to operationalize SIEM effectively within their environment and build scalable processes for detection, investigation, and reporting.
This course helps developers customize Chronicle and augment its abilities with third party integrations.
This course helps you understand how to use Chronicle to properly handle security incidents.
This course introduces the SOAR component of Google SecOps, guiding learners through setup, response automation, and reporting. With demos, hands-on examples, and quizzes, participants will learn how to simplify investigations and make day-to-day security operations more efficient. The course is designed around short videos, averaging about five minutes each, divided into granular topics to support different learning styles and fit into the time learners have available.
Google Threat Intelligence 能够向全球各地的安全团队及时提供详细的威胁情报,帮助其更好地监测威胁。本课程将介绍 Google Threat Intelligence 的各项功能,以及各类组织借助该产品主动缓解威胁的常见方式。
Take the next steps in working with the Chronicle Security Operations Platform. Build on fundamental knowledge to go deeper on cusotmization and tuning.
本课程回顾了 Model Armor 的基本安全功能,并让您能够使用该服务。您将了解与 LLM 相关的安全风险,以及 Model Armor 如何保护您的 AI 应用。
This course covers the baseline skills needed for the Google Security Operations Platform. The modules will cover specific actions and features that security engineers should become familiar with to start using the toolset.
This course will familiarize you with the core functionality of Chronicle, including the user interface, connections, and settings.
Learn the technical aspects you need to know about Chronicle and how it can help you detect and action threats.