This course provides a comprehensive, end-to-end exploration of Google SecOps SIEM, guiding learners from foundational concepts to advanced investigation and detection engineering. Participants will gain hands-on experience with data ingestion, normalization, RBAC configuration, searching, and dashboarding using both legacy and native capabilities. Through structured modules, demos, and curated examples, the course emphasizes real-world investigation workflows, UDM-based analytics, and YARA-L rule development. By the end of the course, learners will be equipped to operationalize SIEM effectively within their environment and build scalable processes for detection, investigation, and reporting.
This video covers how to use NotebookLM as a personal research assistant by adding sources, asking questions, and generating new content formats based on your documents.
This course introduces the SOAR component of Google SecOps, guiding learners through setup, response automation, and reporting. With demos, hands-on examples, and quizzes, participants will learn how to simplify investigations and make day-to-day security operations more efficient. The course is designed around short videos, averaging about five minutes each, divided into granular topics to support different learning styles and fit into the time learners have available.
Conclua o curso do selo de habilidade intermediário Redução de riscos de ameaças e vulnerabilidades com o Security Command Center para demonstrar que você é capaz de: evitar e gerenciar ameaças ao ambiente, identificar e mitigar vulnerabilidades de aplicativos e responder a anomalias de segurança.
This course covers the baseline skills needed for the Google Security Operations Platform. The modules will cover specific actions and features that security engineers should become familiar with to start using the toolset.
Take the next steps in working with the Chronicle Security Operations Platform. Build on fundamental knowledge to go deeper on cusotmization and tuning.
Learn how to use Security Command Center (SCC) to triage vulnerabilities and misconfigurations identified by platform security detectors.
Este curso analisa os recursos de segurança essenciais do Model Armor e prepara você para trabalhar com o serviço. Você vai aprender sobre os riscos de segurança associados a LLMs e como o Model Armor protege seus aplicativos de IA.
O Google Threat Intelligence oferece uma visibilidade excepcional das ameaças com informações de inteligência rápidas e detalhadas para equipes de segurança do mundo inteiro. Este curso aborda os vários recursos do Google Threat Intelligence e as formas comuns de usar o produto para mitigar ameaças proativamente.
In the context of a real-world use case, learn how to use Security Command Center’s virtual red teaming feature to identify risks. Then, learn how attack exposure scores help you prioritize issues and how risk reports keep stakeholders in the loop.
Learn how to use NotebookLM to create a personalized study guide for the Professional Security Operations Engineer certification exam. You'll review NotebookLM features, create a notebook in NotebookLM, and learn how to use a study guide to practice for a certification exam.
Learn about the fundamental features of Security Command Center on Google Cloud. Spend time in this course to understand assets, detection and compliance. Security Command Center is a key part of your Google Cloud security journey, complete these modules and quiz to earn a completion badge.
Este curso apresenta uma visão geral completa do Google Cloud Security Command Center (SCC) Enterprise, uma plataforma de proteção de aplicativos nativos da nuvem (CNAPP, na sigla em inglês) que ajuda as organizações a evitar, detectar e responder a ameaças nos serviços do Google Cloud. Você vai aprender sobre os principais recursos do SCC Enterprise, incluindo detecção aprimorada de ameaças, gerenciamento profundo de vulnerabilidades e gestão integrada de casos. Também vai estudar os principais conceitos do gerenciamento de ameaças e da avaliação de vulnerabilidades, com demonstrações práticas de uso do SCC Enterprise para identificar, investigar e corrigir riscos de segurança no ambiente multicloud.