SE
I loved this coursed and learned so much. The only thing I would have liked to see is if the all of the SIEM tools were integrated into a lab like many of the other labs are directly in the courses.
This is the sixth course in the Google Cybersecurity Certificate. Learners will focus on incident detection and response. They will learn what defines a security incident and explain the incident response lifecycle, including the roles and responsibilities of incident response teams. Learners will analyze and interpret network communications to detect security incidents using packet sniffing tools to capture network traffic. By assessing and analyzing artifacts, learners will explore the incident investigation and response processes and procedures. Additionally, they will develop a conceptual overview of log data and their role in intrusion detection systems (IDS) and Security Information Event Management (SIEM) tools. Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary.
By the end of this course, you will: - Explain the lifecycle of an incident. - Describe the tools used in documentation, detection, and management of incidents. - Analyze packets to interpret network communications. - Perform artifact investigations to analyze and verify security incidents. - Identify the steps to contain, eradicate, and recover from an incident. - Determine how to read and analyze logs during incident investigation. - Interpret the basic syntax and components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools. - Perform queries in Security Information and Event Management (SIEM) tools to investigate an event.
SE
I loved this coursed and learned so much. The only thing I would have liked to see is if the all of the SIEM tools were integrated into a lab like many of the other labs are directly in the courses.
MR
Very Informative and now i am certain i want to do this type of work. I want to protect everyone's data and privacy. Hopefully automated so we dont have to manually go through confidential data.
ND
The professor’s teaching is excellent, making complex topics easy to understand. The study material provided is also awesome and very helpful for learning. Highly recommended!
SW
I'm really enjoying this course, and how you can go faster though parts you know and take more time though sections you don't. It's really helped me learn parts i was struggling with much easier.
US
Learnt a lot about SIEM tools and much more that are all ready to be applied in the job. Thanks a lot to Google and Coursera for such a wonderful session.
NN
Great course. The course needs more practical training on how to use suricata, splunk and chronicle, with real on-the -job tasks will definitely help. Once again. Great course and instructor.
EF
This is a great course, it gives a complete breakdown of all cybersecurity details to learn all expected knowledge needed to be effective in the field
MG
For the complexity and level of detail required for this particular topic I suppose the amount of material provided in this course was more than sufficient. There's much more to learn.
MT
I think a little more in depth training on (tcpdump-wireshark-splunk-chronicle) perhaps even with some real life data. It's one thing to capture data but interpreting it is a totally different skill.
TK
just a few improvements that should be made, some parts confused me of not knowing what is being asked of me. Other than that, it's an excellent course.
JR
I am impressed with the excellent level of information I have received, the very useful links, resources, and the lab practices available to practice. Everything was over my expectations
KA
the learning tools, hands on and additional information for further read up is so informative. best decision ever. proud i have done this much and come this far.
Showing: 20 of 520
this activity didnt explain how to actually query in splunk this was just a waste of time just showing that the person who created the activity just wanted to show off they knew a think about splunk without a care on how it'll be perceived by the audience who is supposed to be "beginners". Does not explain why the queries on splunk are in the order they are, because no one really wants you to learn anything new.
The speaker seemed to be reading from a teleprompter and talking like a scripture without any passion or emotion, his voice was feeble, and the volume had to be turned up to be heard, his tone was monotonous and unvarying, and he made me drowsy.
just kind of scratches the surface and doesn't go too deep. I would say its better than just memorizing a bunch of stuff for the security plus.
overall course and information given was good, didn't like having to sign up for free trail on chronicle to complete graded assignments. Felt like was being pushed membership just to finish course. BIGGEST complaint and really is only true one, the instructor was an emotional less robot. Half way threw some of the course work was more interesting to mute him and read all info and just pause on his examples. Not trying to be rude by any means but can see it as very easy to become detached with lessons and not waiting to continue with something like that, just a thought for future.
please stop doing the practice quiz with only one question or five and they have a activity overview, scenario, and step by step instruction they aren't helpful and waste to much time
Great course. The course needs more practical training on how to use suricata, splunk and chronicle, with real on-the -job tasks will definitely help. Once again. Great course and instructor.
For the complexity and level of detail required for this particular topic I suppose the amount of material provided in this course was more than sufficient. There's much more to learn.
This is a dense introduction with a broad scope peppered with specifics. You will get a chance to become familiar with key concepts but won't need to master them.
Lots of information of incidence response and detail about logs
The course was good, but could have been made more succinct. I also encountered issues with the Splunk exercise with the downloaded file. It did not go into Splunk properly. The instructions for Splunk need to be revised to match the current Splunk process. I would also appreciate more instructions with the Incident Handler's journal. That process needs to be redesigned to make it more relevant and fully explained in the instructions.
I am honestly struggling with this cybersecurity course and have been since August. I was planning on being completed with the entire thing by now, but am still on the 6th portion of the course. It is unbearably boring and I cannot grasp and retain the info. Do you have any suggestions?
Excellent course overall. This course stands out from the curriculum for introducing documentation best practices and hands-on labs with both Splunk and Google Chronicle. Aside from the final quiz being overly difficult compared to the rest of the certificate's curriculum, this was a great learning experience.
This course was mind blowing. The amount of information taught allowed me to understand the concept and acquired skills to now participate in an incident response team and deliver excellent result. I learned so many concepts, sql queries, type of SIEM platform, types of intrusion dections, Logs format.
Recommended - great introduction to Detection and incident response. This course explains the lifecycle of an incident, describes roles and responsibilities of incident response teams and tools such as Splunk, Chronicle and Suricata.
The instructor is excellent, and there are exercises to apply the learnings. The documentation references are helpful, and I intend to use them to enhance my knowledge.
GREAT COURCE I ENJOED EVERY MINUTE OF IT I LEARED ALOT AND CAN WAIT TO IMPLEMENT IT IN REAL LIFE WORKING AS CYBERSECURITY ANALYST!
Very engaging and easy to understand, practical exercises were very helpful
The material was very good, but the sound quality was less than ideal. I had to turn the volume way up on the instruction, and back-down on the day-in-the-life segments.
I believe that using the tools are a fundamental part of the job, However the Splunk and Chronicle apps are kind of incompletes modules. This apps are seen kind of shallow and does not reflects the day to day work. Very hard to even follow the examples cause it is not even the same info. Please update it.
this part was more difiicult because i was a little lost with splunk and chronicle, for suricata i have installed in my ubuntu server and it was great to learn some commands. Suricata is running with grafana influxDB and eve json :)