YoVDO

Getting Started with Security Command Center Enterprise

Offered By: Google via Google Cloud Skills Boost

Tags

Vulnerability Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This course provides a comprehensive overview of Google Cloud Security Command Center (SCC) Enterprise, a Cloud-Native Application Protection Platform (CNAPP) solution that helps organizations prevent, detect, and respond to threats across Google Cloud services. You will learn about core SCC Enterprise features, including enhanced threat detection, in-depth vulnerability management, and integrated case management. Fundamental concepts in threat management and vulnerability assessment will also be covered, along with practical demonstrations of how to use SCC Enterprise to identify, investigate, and remediate security risks within your multi-cloud environment.

Syllabus

  • Describe SCC Enterprise’s Core Functionality and Additional Features
    • Module Overview
    • Introducing Security Command Center Enterprise
    • Core Functionality
    • Additional Features
    • Understanding Key Terms
    • Understanding Security Command Center Options
    • Getting Started with Security Command Center
    • Quiz: SCC Enterprise Fundamentals
  • Explore SCC Enterprise Vulnerability Management Features
    • Module Overview
    • Fundamentals of Vulnerability Management
    • Explore Risk Assessment Features
    • Explore Posture Management Features
    • Manage Risks in a Multi-Cloud Environment
    • Vulnerability Analysis Walkthrough
    • Quiz: Vulnerability Management Fundamentals
  • Leverage SCC Enterprise Threat Detection Features
    • Module Overview
    • Fundamentals of Threat Detection
    • Detect and Investigate Cloud Threat Activity
    • Walkthrough: Working With Threats
    • Quiz: Threat Detection Fundamentals
  • Course conclusion
    • Module Overview
    • Course Conclusion
    • Further Reading
  • Your Next Steps
    • Course Badge

Tags

Related Courses

Unlocking Information Security II: An Internet Perspective
Tel Aviv University via edX
Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera
Complete Ethical Hacking Bootcamp
Udemy
Cyber Security Advanced Persistent Threat Defender Preview
Udemy
Performing Threat Modeling with the PASTA Methodology
Pluralsight