We may earn an affiliate commission when you visit our partners.
Course image
Google Career Certificates

Google サイバーセキュリティ プロフェッショナル認定証の 6 つめのコースです。各コースでは初級サイバーセキュリティの職に必要なスキルを身につけることができます。

このコースでは、検知とインシデント対応に焦点を当てます。具体的には、セキュリティインシデントを定義し、インシデント対応チームの役割と責任など、インシデント対応のライフサイクルを学びます。またパケット スニッフィングのツールを使用してネットワーク トラフィックをキャプチャし、セキュリティ インシデントを検知するためにネットワーク通信を分析、解釈します。アセスメントを行い、アーティファクトを分析することで、インシデント調査および対応のプロセスや手順を検討し、不正侵入検知システム(IDS)とセキュリティ情報イベント管理(SIEM)ツールの使用方法についても学びます。

サイバーセキュリティの分野で働いている現職の Google 社員が最適なツールやリソースを使って一般的なサイバーセキュリティの業務を遂行する実践的な方法を指導します。また就職活動への準備も手助けします。

この認定プログラムを修了すると、エントリーレベルのサイバーセキュリティの職に応募できるようになります。過去の業務経験は不要です。

Enroll now

What's inside

Syllabus

入門編:検知とインシデント対応
検知とインシデント対応は、サイバーセキュリティアナリストの重要な仕事の一部です。ここでは、サイバーセキュリティの職が悪意のある脅威をどのように検証し、対応するのかを探るとともに、インシデント対応に関わるステップについても詳しくご説明します。
ネットワークの監視と分析
Read more
ここでは、一般的にパケットスニッファーと呼ばれるネットワーク解析ツールを探求します。具体的には、ネットワークをスニッフィングし、パケットを解析して悪意のある脅威がないかどうかを調べます。また、キャプチャしたパケットの内容を分析するためのフィルタリングコマンドを作成します。
インシデント調査と対応
ここではインシデントの検知、調査、分析、対応の各段階におけるさまざまなプロセスや手順について学び、不審なファイルに対するハッシュ化の詳細を分析します。また、検知と対応の段階におけるドキュメントと証拠収集の重要性を学びます。最後に、インシデントのタイムラインを再構築するために、アーティファクトをマッピングすることで、インシデントの時系列を推測します。
IDS、SIEM ツールを使いネットワークトラフィックやログを取得する
ここでは、不正侵入検知システム(IDS)およびSIEM(セキュリティ情報イベント管理)システムにおけるログとその役割について学びます。これらのシステムがどのように攻撃を検知するかを学び、IDS および SIEM の製品をいくつかご紹介します。さらに、IDS の基本的なルールを作成し、悪意のあるネットワークトラフィックに対するアラートを設定します。

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
このコースは、サイバーセキュリティの分野でのエントリーレベルの職に就くために必要なスキルを習得したい方に適しています。
このコースはGoogleサイバーセキュリティプロフェッショナル認定の6番目のコースです。
このコースでは、インシデントの検知と対応に重点を置いています。
サイバーセキュリティの分野で働く現職のGoogle社員が指導します。
就職活動への準備にも役立ちます。

Save this course

Save 6. 警告を発する: 検知と対応 to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in 6. 警告を発する: 検知と対応 with these activities:
復習:ネットワークの基礎
この活動は、ネットワークの基礎を復習するのに役立ち、サイバーセキュリティの概念をより深く理解するための基盤を築くのに役立ちます。
Browse courses on TCP/IP
Show steps
  • ネットワークアーキテクチャの基本を復習する。
  • TCP/IPプロトコルスタックの仕組みを理解する。
  • 一般的なネットワークプロトコル(HTTP、HTTPS、DNS)を調べる。
Wiresharkネットワークキャプチャ分析の練習
Wiresharkを実行し、ネットワークトラフィックをキャプチャして分析することで、セキュリティインシデントの検知に関する理解を深めます。
Browse courses on Wireshark
Show steps
  • Wiresharkのセットアップとネットワークキャプチャの開始
  • キャプチャしたパケットのフィルタリングと分析
  • 共通のネットワーク攻撃シグネチャの特定
パケットキャプチャ練習
この活動は、パケットキャプチャツールの使用スキルを向上させ、ネットワークトラフィックを分析してセキュリティインシデントを検出するのに役立ちます。
Browse courses on Wireshark
Show steps
  • Wiresharkなどのパケットキャプチャツールをインストールする。
  • ネットワークトラフィックをキャプチャし、分析する。
  • パケットデータをフィルタリングして、特定のトラフィックを特定する。
  • pcapファイルを保存して、後で分析に役立てる。
One other activity
Expand to see all activities and additional details
Show all four activities
セキュリティインシデント対応のためのSplunkチュートリアル
Splunkのチュートリアルに従って、セキュリティイベントの管理、分析、対応を練習し、セキュリティインシデント対応スキルを強化します。
Browse courses on Splunk
Show steps
  • Splunkのインストールとセットアップ
  • セキュリティイベントのインポートとインデックス作成
  • 検索コマンドを使用してイベントを調査
  • アラートとダッシュボードの作成

Career center

Learners who complete 6. 警告を発する: 検知と対応 will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts play a vital role in defending organizations from malicious threats and guarding sensitive data from unauthorized access. The knowledge and skills that you'll gain from the course, 6. 警告を発する: 検知と対応 will lay a great foundation for a career as an Information Security Analyst. The course covers various aspects of incident detection, investigation, and response, which are core responsibilities of an Information Security Analyst. By gaining a solid understanding of these concepts, you'll be better equipped to identify and respond to security incidents effectively, ensuring the security and integrity of organizational data and systems.
Incident Responder
Incident Responders are responsible for handling and resolving security incidents in a timely and effective manner. The course, 6. 警告を発する: 検知と対応, provides a comprehensive overview of the incident response process, including detection, investigation, containment, and recovery. By taking this course, you'll gain valuable knowledge and skills in incident response, which will empower you to respond to security incidents swiftly and efficiently, minimizing their impact on the organization.
Penetration Tester
Penetration Testers evaluate the security of computer systems, networks, and applications by simulating attacks from malicious actors. The course, 6. 警告を発する: 検知と対応, will provide you with a solid foundation in network security and incident detection, which are crucial skills for Penetration Testers. By understanding how attackers operate and the techniques they use, you'll be better equipped to identify vulnerabilities and weaknesses in systems, helping organizations enhance their security posture.
Security Consultant
Security Consultants provide expertise and guidance to organizations on security matters, including incident response and security best practices. The course, 6. 警告を発する: 検知と対応, will equip you with the knowledge and skills necessary to excel as a Security Consultant. By gaining hands-on experience in incident detection and response, you'll be able to effectively assess an organization's security posture, identify vulnerabilities, and recommend appropriate security measures.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain cybersecurity systems and solutions. The course, 6. 警告を発する: 検知と対応, will provide you with a strong foundation in incident detection and response, which are essential aspects of cybersecurity engineering. By understanding how to detect and respond to security incidents, you'll be able to contribute to the design and implementation of effective cybersecurity solutions, ensuring the protection of an organization's information systems.
Security Architect
Security Architects design and implement security measures to protect an organization's information systems and infrastructure. The course, 6. 警告を発する: 検知と対応, will help you build a foundation in security principles and best practices, which are essential for Security Architects. By gaining an understanding of incident detection and response, you'll be able to design and implement security solutions that effectively prevent, detect, and respond to security threats.
Threat Intelligence Analyst
Threat Intelligence Analysts gather and analyze information about potential threats to an organization's security. The course, 6. 警告を発する: 検知と対応, will provide you with a solid understanding of incident detection and response, which are essential skills for Threat Intelligence Analysts. By gaining knowledge in these areas, you'll be able to effectively identify and assess threats, enabling you to provide timely and actionable threat intelligence to your organization.
SOC Analyst
SOC Analysts monitor and analyze security events and alerts to identify and respond to potential threats. The course, 6. 警告を発する: 検知と対応, will provide you with the foundational knowledge and skills required to be an effective SOC Analyst. By learning about incident detection, investigation, and response, you'll be able to quickly identify and respond to security incidents, ensuring the security of an organization's systems and data.
Forensic Analyst
Forensic Analysts investigate and analyze digital evidence in response to security incidents. The course, 6. 警告を発する: 検知と対応, will provide you with a solid foundation in incident investigation and analysis, which are crucial skills for Forensic Analysts. By gaining hands-on experience in these areas, you'll be able to effectively collect, analyze, and interpret digital evidence, assisting in investigations and prosecutions of cybercrimes.
Information Security Manager
Information Security Managers oversee and manage the security of an organization's information systems and data. The course, 6. 警告を発する: 検知と対応, will equip you with a thorough understanding of incident response and management, which are essential responsibilities of Information Security Managers. By gaining knowledge and experience in these areas, you'll be able to effectively lead and manage an organization's incident response team, ensuring the protection of its information assets.
Security Auditor
Security Auditors evaluate the security of an organization's information systems and practices. The course, 6. 警告を発する: 検知と対応, will provide you with a solid foundation in incident detection and response, which are important aspects of security auditing. By gaining knowledge and experience in these areas, you'll be able to effectively assess an organization's security posture, identify vulnerabilities, and recommend appropriate security measures, ensuring compliance with security regulations and standards.
Cloud Security Engineer
Cloud Security Engineers are responsible for securing cloud computing environments. The course, 6. 警告を発する: 検知と対応, will provide you with a solid foundation in incident detection and response, which are vital aspects of cloud security engineering. By understanding how to detect and respond to security incidents in cloud environments, you'll be able to contribute to the design and implementation of effective cloud security solutions, ensuring the protection of cloud-based data and applications.
Network Security Engineer
Network Security Engineers design, implement, and maintain network security systems and solutions. The course, 6. 警告を発する: 検知と対応, will provide you with a solid foundation in network security, incident detection, and response, which are essential aspects of network security engineering. By understanding how to detect and respond to security incidents on networks, you'll be able to contribute to the design and implementation of effective network security solutions, ensuring the protection of an organization's network infrastructure.
Malware Analyst
Malware Analysts investigate and analyze malicious software, such as viruses, worms, and Trojan horses. The course, 6. 警告を発する: 検知と対応, will provide you with a solid foundation in incident detection and analysis, which are essential skills for Malware Analysts. By gaining hands-on experience in these areas, you'll be able to effectively identify, analyze, and mitigate malware threats, protecting organizations from the damaging effects of malicious software.
Systems Administrator
Systems Administrators manage and maintain computer systems and networks. The course, 6. 警告を発する: 検知と対応, may be useful in providing you with a basic understanding of incident detection and response, which can complement your skills as a Systems Administrator. By gaining knowledge in these areas, you'll be better equipped to respond to security incidents that may arise in the systems you manage, ensuring the stability and security of the organization's IT infrastructure.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in 6. 警告を発する: 検知と対応.
Comprehensive guide to incident response for computer security. It covers all aspects of incident response, from preparation and planning to investigation and remediation.
Provides a step-by-step guide to handling security incidents. It covers everything from identifying and assessing incidents to investigating and responding to them.
Provides a practical guide to penetration testing. Covers techniques, tools, and methodologies for assessing the security of computer systems.
Provides a comprehensive overview of incident response and a step-by-step guide for handling security breaches. Suitable as additional reading.
Offers a hands-on approach to malware analysis. Provides step-by-step instructions and case studies for analyzing and classifying malware samples.
Offers a deep dive into cryptographic engineering. Provides a theoretical foundation and practical guidance for designing and implementing secure cryptographic systems.
Explores the psychological aspects of security and provides techniques for understanding and mitigating social engineering attacks. Offers a unique perspective on the human element in cybersecurity.
Provides a comprehensive guide to social engineering. It covers everything from the basics of social engineering to the use of tools and techniques for manipulating people.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to 6. 警告を発する: 検知と対応.
8. 実践編:サイバーセキュリティ関連の職に就く準備
Most relevant
2. 安心を担う: セキュリティリスクの管理
Most relevant
5. アセット、脅威、そして脆弱性
Most relevant
1.基礎知識:サイバーセキュリティとは
Most relevant
4. ツールを使いこなす:Linux と SQL
Most relevant
3. つなぎ、守る:ネットワークとネットワーク セキュリティ
Most relevant
7. Python を使ったサイバーセキュリティ タスクの自動化
Most relevant
セキュア ソフトウェア開発:検証、専門的トピック
Most relevant
6. データ可視化(ビジュアライゼーション)による、データの共有
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser