This is the sixth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the fifth Google Cybersecurity Certificate course.
Sound the Alarm: Detection and Response
This course is part of Google Cybersecurity Professional Certificate
Instructor: Google Career Certificates
Top Instructor
Sponsored by Howard University
180,772 already enrolled
(2,483 reviews)
What you'll learn
Identify the steps to contain, eradicate, and recover from an incident
Analyze packets to interpret network communications
Understand basic syntax, components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools
Perform queries in Security Information and Event Management (SIEM) tools to investigate an event
Skills you'll gain
Details to know
Add to your LinkedIn profile
26 quizzes
See how employees at top companies are mastering in-demand skills
Build your Computer Security and Networks expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate from Google
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 4 modules in this course
Detection and incident response are an important part of a cybersecurity analyst’s work. You'll explore how cybersecurity professionals verify and respond to malicious threats and become familiar with the steps involved in incident response.
What's included
12 videos7 readings6 quizzes1 plugin
You will explore network analysis tools, commonly referred to as packet sniffers. In particular, you'll sniff the network and analyze packets for malicious threats. You'll also craft filtering commands to analyze the contents of captured packets.
What's included
9 videos10 readings5 quizzes4 app items
You will learn about the various processes and procedures in the stages of incident detection, investigation, analysis, and response. Then, you'll analyze the details of suspicious file hashes. You'll learn about the importance of documentation and evidence collection during the detection and response stages. Finally, you'll approximate an incident’s chronology by mapping artifacts to reconstruct an incident’s timeline.
What's included
11 videos10 readings7 quizzes2 plugins
You will explore logs and their role in Intrusion Detection Systems (IDS) and Security Information Event Management (SIEM) systems. You'll learn how these systems detect attacks. You’ll also be introduced to some IDS and SIEM products. In addition, you’ll write basic IDS rules to provide alerts for malicious network traffic.
What's included
14 videos13 readings8 quizzes2 app items1 plugin
Instructor
Offered by
Why people choose Coursera for their career
Learner reviews
Showing 3 of 2483
2,483 reviews
- 5 stars
83.83%
- 4 stars
11.54%
- 3 stars
3.09%
- 2 stars
0.60%
- 1 star
0.92%
Recommended if you're interested in Computer Science
Cisco Learning and Certifications
Open new doors with Coursera Plus
Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy