Anita Baller
Member since 2026
Diamond League
6455 points
Member since 2026
This course provides a comprehensive, end-to-end exploration of Google SecOps SIEM, guiding learners from foundational concepts to advanced investigation and detection engineering. Participants will gain hands-on experience with data ingestion, normalization, RBAC configuration, searching, and dashboarding using both legacy and native capabilities. Through structured modules, demos, and curated examples, the course emphasizes real-world investigation workflows, UDM-based analytics, and YARA-L rule development. By the end of the course, learners will be equipped to operationalize SIEM effectively within their environment and build scalable processes for detection, investigation, and reporting.
This video covers how to use NotebookLM as a personal research assistant by adding sources, asking questions, and generating new content formats based on your documents.
This course introduces the SOAR component of Google SecOps, guiding learners through setup, response automation, and reporting. With demos, hands-on examples, and quizzes, participants will learn how to simplify investigations and make day-to-day security operations more efficient. The course is designed around short videos, averaging about five minutes each, divided into granular topics to support different learning styles and fit into the time learners have available.
Complete the intermediate Mitigate Threats and Vulnerabilities with Security Command Center skill badge course to demonstrate skills in the following: preventing and managing environment threats, identifying and mitigating application vulnerabilities, and responding to security anomalies.
This course covers the baseline skills needed for the Google Security Operations Platform. The modules will cover specific actions and features that security engineers should become familiar with to start using the toolset.
Take the next steps in working with the Chronicle Security Operations Platform. Build on fundamental knowledge to go deeper on cusotmization and tuning.
Learn how to use Security Command Center (SCC) to triage vulnerabilities and misconfigurations identified by platform security detectors.
This course reviews the essential security features of Model Armor and equips you to work with the service. You’ll learn about the security risks associated with LLMs and how Model Armor protects your AI applications.
Google Threat Intelligence provides unmatched visibility into threats by delivering detailed and timely threat intelligence to security teams around the world. This course covers the various capabilities of Google Threat Intelligence and common ways that organizations use this product to proactively mitigate threats.
In the context of a real-world use case, learn how to use Security Command Center’s virtual red teaming feature to identify risks. Then, learn how attack exposure scores help you prioritize issues and how risk reports keep stakeholders in the loop.
Learn how to use NotebookLM to create a personalized study guide for the Professional Security Operations Engineer certification exam. You'll review NotebookLM features, create a notebook in NotebookLM, and learn how to use a study guide to practice for a certification exam.
Learn about the fundamental features of Security Command Center on Google Cloud. Spend time in this course to understand assets, detection and compliance. Security Command Center is a key part of your Google Cloud security journey, complete these modules and quiz to earn a completion badge.
This course provides a comprehensive overview of Google Cloud Security Command Center (SCC) Enterprise, a Cloud-Native Application Protection Platform (CNAPP) solution that helps organizations prevent, detect, and respond to threats across Google Cloud services. You will learn about core SCC Enterprise features, including enhanced threat detection, in-depth vulnerability management, and integrated case management. Fundamental concepts in threat management and vulnerability assessment will also be covered, along with practical demonstrations of how to use SCC Enterprise to identify, investigate, and remediate security risks within your multi-cloud environment.