Murathan Coşkun
Member since 2025
Member since 2025
Take the next steps in working with the Chronicle Security Operations Platform. Build on fundamental knowledge to go deeper on cusotmization and tuning.
Complete the intermediate Mitigate Threats and Vulnerabilities with Security Command Center skill badge course to demonstrate skills in the following: preventing and managing environment threats, identifying and mitigating application vulnerabilities, and responding to security anomalies.
This course covers the baseline skills needed for the Google Security Operations Platform. The modules will cover specific actions and features that security engineers should become familiar with to start using the toolset.
Google Threat Intelligence provides unmatched visibility into threats by delivering detailed and timely threat intelligence to security teams around the world. This course covers the various capabilities of Google Threat Intelligence and common ways that organizations use this product to proactively mitigate threats.
This course introduces the SOAR component of Google SecOps, guiding learners through setup, response automation, and reporting. With demos, hands-on examples, and quizzes, participants will learn how to simplify investigations and make day-to-day security operations more efficient. The course is designed around short videos, averaging about five minutes each, divided into granular topics to support different learning styles and fit into the time learners have available.
Welcome to the third course of the "Networking in Google Cloud" series: Network Architecture! In this course, you will explore the fundamentals of designing efficient and scalable network architectures within Google Cloud. In the first module, Introduction to Network Architecture, we'll start by introducing you to the core components and concepts of network architecture, including subnets, routes, firewalls, and load balancing. Then in the second module, network topologies, we'll dive into various network topologies commonly used in Google Cloud, discussing their strengths, and weaknesses.
This accelerated on-demand course introduces participants to the comprehensive and flexible infrastructure and platform services provided by Google Cloud with a focus on Compute Engine. Through a combination of video lectures, demos, and hands-on labs, participants explore and deploy solution elements, including infrastructure components such as networks, systems and applications services. This course also covers deploying practical solutions including customer-supplied encryption keys, security and access management, quotas and billing, and resource monitoring.
This course reviews the essential security features of Model Armor and equips you to work with the service. You’ll learn about the security risks associated with LLMs and how Model Armor protects your AI applications.
Google Cloud Fundamentals: Core Infrastructure introduces important concepts and terminology for working with Google Cloud. Through videos and hands-on labs, this course presents and compares many of Google Cloud's computing and storage services, along with important resource and policy management tools.
This course provides a comprehensive, end-to-end exploration of Google SecOps SIEM, guiding learners from foundational concepts to advanced investigation and detection engineering. Participants will gain hands-on experience with data ingestion, normalization, RBAC configuration, searching, and dashboarding using both legacy and native capabilities. Through structured modules, demos, and curated examples, the course emphasizes real-world investigation workflows, UDM-based analytics, and YARA-L rule development. By the end of the course, learners will be equipped to operationalize SIEM effectively within their environment and build scalable processes for detection, investigation, and reporting.
Learn how to use Security Command Center (SCC) to triage vulnerabilities and misconfigurations identified by platform security detectors.
In the context of a real-world use case, learn how to use Security Command Center’s virtual red teaming feature to identify risks. Then, learn how attack exposure scores help you prioritize issues and how risk reports keep stakeholders in the loop.
Learn about the fundamental features of Security Command Center on Google Cloud. Spend time in this course to understand assets, detection and compliance. Security Command Center is a key part of your Google Cloud security journey, complete these modules and quiz to earn a completion badge.
This course provides a comprehensive overview of Google Cloud Security Command Center (SCC) Enterprise, a Cloud-Native Application Protection Platform (CNAPP) solution that helps organizations prevent, detect, and respond to threats across Google Cloud services. You will learn about core SCC Enterprise features, including enhanced threat detection, in-depth vulnerability management, and integrated case management. Fundamental concepts in threat management and vulnerability assessment will also be covered, along with practical demonstrations of how to use SCC Enterprise to identify, investigate, and remediate security risks within your multi-cloud environment.
Learn how to use NotebookLM to create a personalized study guide for the Professional Security Operations Engineer certification exam. You'll review NotebookLM features, create a notebook in NotebookLM, and learn how to use a study guide to practice for a certification exam.
Get Anthos Ready. This Google Kubernetes Engine-centric quest of best practice hands-on labs focuses on security at scale when deploying and managing production GKE environments -- specifically role-based access control, hardening, VPC networking, and binary authorization.
Earn a skill badge by completing the The Basics of Google Cloud Compute skill badge course, where you learn how to work with virtual machines (VMs), persistent disks, and web servers using Compute Engine.
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Identity, Resource Manager, IAM, Virtual Private Cloud firewalls, Cloud Load Balancing, Cloud Peering, Cloud Interconnect, and VPC Service Controls. This is the first course of the Security in Google Cloud series. After completing this course, enroll in the Security Best Practices in Google Cloud course.
The Google Cloud Computing Foundations courses are for individuals with little to no background or experience in cloud computing. They provide an overview of concepts central to cloud basics, big data, and machine learning, and where and how Google Cloud fits in. By the end of the series of courses, learners will be able to articulate these concepts and demonstrate some hands-on skills. The courses should be completed in the following order: 1. Google Cloud Computing Foundations: Cloud Computing Fundamentals 2. Google Cloud Computing Foundations: Infrastructure in Google Cloud 3. Google Cloud Computing Foundations: Networking and Security in Google Cloud 4. Google Cloud Computing Foundations: Data, ML, and AI in Google Cloud This third course covers cloud automation and management tools and building secure networks.
Artificial Intelligence (AI) offers transformative possibilities, but it also introduces new security challenges. This course equips security and data protection leaders with strategies to securely manage AI within their organizations. Learn a framework for proactively identifying and mitigating AI-specific risks, protecting sensitive data, ensuring compliance, and building a resilient AI infrastructure. Pick use cases from four different industries to explore how these strategies apply in real-world scenarios.
The Google Cloud Computing Foundations courses are for individuals with little to no background or experience in cloud computing. They provide an overview of concepts central to cloud basics, big data, and machine learning, and where and how Google Cloud fits in. By the end of the series of courses, learners will be able to articulate these concepts and demonstrate some hands-on skills. The courses should be completed in the following order: 1. Google Cloud Computing Foundations: Cloud Computing Fundamentals 2. Google Cloud Computing Foundations: Infrastructure in Google Cloud 3. Google Cloud Computing Foundations: Networking and Security in Google Cloud 4. Google Cloud Computing Foundations: Data, ML, and AI in Google Cloud
The Google Cloud Computing Foundations courses are for individuals with little to no background or experience in cloud computing. They provide an overview of concepts central to cloud basics, big data, and machine learning, and where and how Google Cloud fits in. By the end of the series of courses, learners will be able to articulate these concepts and demonstrate some hands-on skills. The courses should be completed in the following order: 1. Google Cloud Computing Foundations: Cloud Computing Fundamentals 2. Google Cloud Computing Foundations: Infrastructure in Google Cloud 3. Google Cloud Computing Foundations: Networking and Security in Google Cloud 4. Google Cloud Computing Foundations: Data, ML, and AI in Google Cloud This first course provides an overview of cloud computing, ways to use Google Cloud, and different compute options.