In the context of a real-world use case, learn how to use Security Command Center’s virtual red teaming feature to identify risks. Then, learn how attack exposure scores help you prioritize issues and how risk reports keep stakeholders in the loop.



Security Command Center: Identify and Prioritize Risks

Instructor: Google Cloud Training
Access provided by NMIMS Indore
What you'll learn
Explain the setup required to activate Security Command Center and begin the initial virtual red teaming scenario.
Identify high-value resources in your environment.
Investigate security issues and findings based on the results of the virtual red teaming simulation.
Explain how to generate a risk report that captures prioritized findings for stakeholders.
Skills you'll gain
Details to know

Add to your LinkedIn profile
4 assignments
October 2025
See how employees at top companies are mastering in-demand skills

There are 6 modules in this course
In this module, you'll discover the learning objectives for the course.
What's included
1 plugin
In this module, you'll learn about virtual red teaming and the required setup in Security Command Center.
What's included
1 assignment3 plugins
In this module, you'll learn how to identify the high-value resources that are targeted in virtual attack simulations.
What's included
1 assignment3 plugins
In this module, you'll learn about attack paths and the models they generate based on virtual attack simulations.
What's included
1 assignment2 plugins
In this module, you'll learn about risk reports and how to generate them.
What's included
1 assignment1 plugin
In this module, you'll review the learning objectives and complete a course wrap up.
What's included
2 plugins
Instructor

Offered by
Why people choose Coursera for their career









