Loading...
No results found.

    Google Cloud Integrated Security Operations

    school 11 activities
    update Last updated 8 days
    person Managed by Google Cloud
    Explore the Google Cloud toolsets and solutions that help you provide continuously integrated security operations. This learning path covers skills that familiarize security personnel with products that provide for cloud and multi-cloud security operations ranging from security posture to threat intelligence.
    Start learning path
    Activity Thumbnail for Getting Started with Security Command Center Enterprise
    01 Getting Started with Security Command Center Enterprise
    book Course
    access_time 4 hours
    show_chart Intermediate

    This course provides a comprehensive overview of Google Cloud Security Command Center (SCC) Enterprise, a Cloud-Native Application Protection Platform (CNAPP) solution that helps organizations prevent, detect, and respond to threats across Google Cloud services. You will learn about core SCC...

    Start course
    Activity Thumbnail for Security Command Center Fundamentals
    02 Security Command Center Fundamentals
    book Course
    access_time 1 hour 45 minutes
    show_chart Introductory

    Learn about the fundamental features of Security Command Center on Google Cloud. Spend time in this course to understand assets, detection and compliance. Security Command Center is a key part of your Google Cloud security journey, complete these modules and...

    Start course
    Activity Thumbnail for Google Threat Intelligence
    03 Google Threat Intelligence
    book Course
    access_time 8 hours
    show_chart Intermediate

    Google Threat Intelligence provides unmatched visibility into threats by delivering detailed and timely threat intelligence to security teams around the world. This course covers the various capabilities of Google Threat Intelligence and common ways that organizations use this product to...

    Start course
    Activity Thumbnail for Google Security Operations - Fundamentals
    04 Google Security Operations - Fundamentals
    book Course
    access_time 1 hour 45 minutes
    show_chart Introductory

    This course covers the basline skills needed for the Chronicle Security Operations Platform. The modules will cover specific actions and features that security engineers should become familiar with to start using the toolset.

    Start course
    Activity Thumbnail for Google Security Operations - Deep Dive
    05 Google Security Operations - Deep Dive
    book Course
    access_time 1 hour 45 minutes
    show_chart Advanced

    Take the next steps in working with the Chronicle Security Operations Platform. Build on fundamental knowledge to go deeper on cusotmization and tuning.

    Start course
    Activity Thumbnail for Introduction to SecOps on GDC
    06 Introduction to SecOps on GDC
    book Course
    access_time 4 hours 45 minutes
    show_chart Intermediate

    The first course provides a high-level overview of security fundamentals on the GDC platform.

    Start course
    Activity Thumbnail for SecOps on GDC for Tier 1 and Tier 2 Analysts
    07 SecOps on GDC for Tier 1 and Tier 2 Analysts
    book Course
    access_time 5 hours 30 minutes
    show_chart Intermediate

    This course gives you a deep dive into the workflows of Tier 1 and Tier 2 security analysts.

    Start course
    Activity Thumbnail for Modern Security Operations
    08 Modern Security Operations
    book Course
    access_time 1 hour 45 minutes

    Modern Security Operations, based on Google's Autonomic Security Operations framework and Continuous Detection, Continuous Response (CD/CR) methodology is a combination of philosophies, practices, and tools that improve an organization's ability to withstand security attacks through an adaptive, agile, and highly...

    Start course
    Activity Thumbnail for Navigate Security Decisions with Gemini
    09 Navigate Security Decisions with Gemini
    book Lab
    access_time 45 minutes
    show_chart Introductory

    In this lab, you will learn how to use Gemini, an AI-powered collaborator in Google Cloud, to navigate and understand different areas of security in your environment in Security Command Center.

    Start lab
    Activity Thumbnail for Explore false positives through incident detection
    10 Explore false positives through incident detection
    book Lab
    access_time 1 hour 30 minutes
    show_chart Introductory

    Aanalyze a false positive threat using the Security Command Center (SCC) and take action to address it.

    Start lab
    Activity Thumbnail for Mitigate Threats and Vulnerabilities with Security Command Center: Challenge Lab
    11 Mitigate Threats and Vulnerabilities with Security Command Center: Challenge Lab
    book Lab
    access_time 1 hour
    show_chart Intermediate

    In this lab, you test your Security Command Center skills by demonstrating your proficiency in creating mute rules, analyzing and fixing high vulnerability findings, identifying application vulnerabilities, and exporting Findings.

    Start lab