Gabung Login

Muhammad Ezad Mohd Hanafiah

Menjadi anggota sejak 2025

Diamond League

9044 poin
Model Armor: Mengamankan Deployment AI Earned Jan 11, 2026 EST
Introduction Google Security Operations (SOAR) Earned Jan 10, 2026 EST
Google Security Operations - Deep Dive Earned Jan 8, 2026 EST
Google Security Operations - Fundamentals Earned Jan 8, 2026 EST
Google Threat Intelligence Earned Jan 8, 2026 EST
Security Command Center: Identify and Prioritize Risks Earned Jan 8, 2026 EST
Security Command Center Fundamentals Earned Jan 7, 2026 EST
Build a Certification Study Guide: PSOE Exam Prep Earned Jan 7, 2026 EST
L200 Google Distributed Cloud air-gapped Earned Des 18, 2025 EST
L300 Google Distributed Cloud air-gapped Earned Des 12, 2025 EST

Kursus ini meninjau fitur keamanan penting Model Armor dan membekali Anda untuk bekerja menggunakan layanan ini. Anda akan mempelajari risiko keamanan yang terkait dengan LLM dan cara Model Armor melindungi aplikasi AI Anda.

Pelajari lebih lanjut

This course introduces the SOAR component of Google SecOps, guiding learners through setup, response automation, and reporting. With demos, hands-on examples, and quizzes, participants will learn how to simplify investigations and make day-to-day security operations more efficient. The course is designed around short videos, averaging about five minutes each, divided into granular topics to support different learning styles and fit into the time learners have available.

Pelajari lebih lanjut

Take the next steps in working with the Chronicle Security Operations Platform. Build on fundamental knowledge to go deeper on cusotmization and tuning.

Pelajari lebih lanjut

This course covers the baseline skills needed for the Google Security Operations Platform. The modules will cover specific actions and features that security engineers should become familiar with to start using the toolset.

Pelajari lebih lanjut

Google Threat Intelligence memberikan visibilitas terhadap ancaman yang tak tertandingi dengan menghadirkan kecerdasan ancaman yang mendetail secara tepat waktu kepada tim keamanan di seluruh dunia. Kursus ini membahas berbagai kemampuan Google Threat Intelligence dan cara penggunaan umum produk ini oleh organisasi untuk memitigasi ancaman secara proaktif.

Pelajari lebih lanjut

In the context of a real-world use case, learn how to use Security Command Center’s virtual red teaming feature to identify risks. Then, learn how attack exposure scores help you prioritize issues and how risk reports keep stakeholders in the loop.

Pelajari lebih lanjut

Learn about the fundamental features of Security Command Center on Google Cloud. Spend time in this course to understand assets, detection and compliance. Security Command Center is a key part of your Google Cloud security journey, complete these modules and quiz to earn a completion badge.

Pelajari lebih lanjut

Learn how to use NotebookLM to create a personalized study guide for the Professional Security Operations Engineer certification exam. You'll review NotebookLM features, create a notebook in NotebookLM, and learn how to use a study guide to practice for a certification exam.

Pelajari lebih lanjut

This L200 course comprehensively explores GDC air-gapped's concepts, architecture, and operational aspects, equipping learners with the knowledge to deploy and manage this solution effectively. The course delves into topics such as the roles of vendors and partners, hardware and software components, zero trust security, multi-tenancy, support and operations, observability, Identity and Access Management, managed services, and the GDC Sandbox environment. Furthermore, the course provides insights into compliance and accreditation processes, ensuring learners understand the regulatory landscape and can navigate it successfully. By the end of this course, learners will have a solid understanding of GDC air-gapped and be prepared to leverage its capabilities for their organization's needs.

Pelajari lebih lanjut

This L300 course explores the intricacies of the hardware and networking infrastructure, examines the role of Kubernetes in container orchestration, and how to master the deployment process. The course emphasizes critical security aspects, guiding you through defense-in-depth design, zero-trust architecture, and essential operational security measures for protecting sensitive data. You'll also gain valuable insights into operational aspects, such as resource management, upgrades, and solutions tailored for GDC customers.

Pelajari lebih lanjut