Detect, Respond, and Recover from Cloud Cybersecurity Attacks
Detect, Respond, and Recover from Cloud Cybersecurity Attacks
This is the fourth of five courses in the Google Cloud Cybersecurity Certificate. In this course, you’ll focus on developing capabilities in logging, security, and alert monitoring, along with techniques for mitigating attacks. You'll gain valuable knowledge in customizing threat feeds, managing incidents, handling crisis communications, conducting root cause analysis, and mastering incident response and post-event communications. Using Google Cloud tools, you'll learn to identify indicators of compromise and prepare for business continuity and disaster recovery. Alongside these technical skills, you'll continue updating your resume and practicing interview techniques.
课程信息
目标
- Analyze logging systems in a cloud environment.
- Configure security monitoring systems to efficiently identify and mitigate threats to a cloud environment.
- Define the lifecycle of a security incident and the process to identify, document, and prevent future incidents.
- Explain the purpose of a Disaster Recovery Plan and how this affects data retention and recovery.
前提条件
N/A
支持的语言
English, español (Latinoamérica), and português (Brasil)
学完本课程后,我可以做些什么?
学完本课程后,您可以探索学习路线 中的其他内容或浏览学习目录
我能获得什么徽章?
学完一门课程后,您将获得结业徽章。徽章可在个人资料中供查看,还可在社交网络上分享。
有兴趣通过我们的点播课程合作伙伴之一来学习本课程吗
在 Coursera 和 Pluralsight 上探索 Google Cloud 内容
更喜欢跟随讲师学习?