6. 警告を発する: 検知と対応


This Google course, part of the Cybersecurity Professional Certificate, equips learners with the skills needed for entry-level cybersecurity roles. The course concentrates on incident detection and response, covering topics such as defining security incidents, understanding the incident response lifecycle, using packet sniffing tools to capture network traffic, and analyzing network communication for security incident detection. Learners will also explore intrusion detection systems (IDS), security information event management (SIEM) tools, and more. Taught by experienced Google professionals, this practical program also includes career preparation guidance.

Upon completion, learners can apply for entry-level cybersecurity roles without prior work experience. The course includes four modules, each offering comprehensive insights and hands-on learning experiences.

  • Module 1: Introduction to Incident Detection and Response
  • Module 2: Network Monitoring and Analysis
  • Module 3: Incident Investigation and Response
  • Module 4: Using IDS and SIEM Tools for Network Traffic and Log Collection

Enroll now and gain the skills necessary to kick-start a career in cybersecurity.

Certificate Available ✔

Get Started / More Info
6. 警告を発する: 検知と対応
Course Modules

This course includes four modules that cover incident detection, network monitoring, investigation, and using IDS and SIEM tools for network security.


This module introduces learners to incident detection and response, providing insights into the incident response lifecycle, incident response teams, communication during incident response, incident response planning, incident response tools, documentation importance, intrusion detection systems (IDS), and security information event management (SIEM) tools. Learners will also engage in practical challenges and assessments to reinforce their understanding of the concepts.


In this module, learners will delve into network monitoring and analysis, understanding the importance of network traffic flow, data exfiltration attacks, packet analysis, packet capture, interpreting network communication from packets, and exploring tools like tcpdump and Wireshark for network traffic analysis.


Module 3 focuses on incident investigation and response, covering incident detection methods, investigation of indicators of compromise (IoC), documentation best practices, triage processes, business continuity considerations, post-incident reviews, and practical application of incident investigation tools.

IDS、SIEM ツールを使いネットワークトラフィックやログを取得する

This module explores the use of intrusion detection systems (IDS) and security information event management (SIEM) tools for network traffic and log collection. Learners will gain insights into the significance of logs, variations in logs, detection tool usage, examining detection signatures, and querying events using tools such as Suricata, Splunk, and Chronicle.

More Computer Security and Networks Courses

Advanced System Security Design

University of Colorado System

Advanced System Security Design course provides learners with state-of-the-art techniques and tools for implementing secure system design, vulnerability analysis,...

Introduction to Applied Cryptography

University of Colorado System

Introduction to Applied Cryptography provides a comprehensive understanding of cryptographic methods, including classical and modern algorithms, symmetric and asymmetric...

Check Point Jump Start: Cloud Security

Check Point Software Technologies Ltd.

Check Point Jump Start: Cloud Security is a comprehensive course providing insights into cloud security challenges and solutions using Check Point CloudGuard, ideal...

Planning for a Google Workspace Deployment

Google Cloud

Planning for a Google Workspace Deployment is the final course in the Google Workspace Administration series. Explore deployment methodology, provisioning, mail...