[Completed] Professional Google Cybersecurity Specialization C1/8 Foundations of Cybersecurity
done in 13 hrs over 4 days
Glossery for modules Foundations of Cybersecurity
Terms and definitions from Course 1
A Adversarial artificial intelligence (AI): A technique that manipulates artificial intelligen...
Google Cybersecurity Certificate glossary
A Absolute file path: The full file path, which starts from the root Access controls: Securit...
Glossary terms from week 1
Terms and definitions from Course 1, Week 1 Cybersecurity (or security): The practice of ensur...
Glossary terms from week 2
Terms and definitions from Course 1, Week 2 Adversarial artificial intelligence (AI): A techniqu...
Glossary terms from week 3
Terms and definitions from Course 1, Week 3 Asset: An item perceived as having value to an organ...
Get Started with go certificate program
Welcome to the Google Cybersecurity Certificate
Hello and welcome to the Google Career Certificate focused on cybersecurity. I'm so exc...
Google Cybersecurity Certificate overview
Why are skills in cybersecurity in such high demand? The world is undergoing a digital transforma...
Course 1 overview
Cybersecurity Certificate. You’ve begun an exciting journey! In this course, you will ...
Welcome to week 1
Hi again! Now that you have some idea of what to expect from the program as a...
Helpful resources and tips
(They made me type my name and some reason to commit, par the usual, I am your god, and i suffer ...
Introduction to Cybersecurity
Introduction to cybersecurity
Imagine that you're preparing for a storm. You've received notification that a storm is c...
Toni: My path to cybersecurity
Hi, I'm Toni, I'm a Security Engineering Manager. Our teams protect Google and its users from ser...
Responsibilities of an entry-level cybersecurity analyst
Technology is rapidly changing and so are the tactics and techniques that attackers use. As digit...
Nikki: A day in the life of a security engineer
My name is Nikki and I'm a security engineer at Google. I am part of the insider threat detection...
Common cybersecurity terminology
As you’ve learned, cybersecurity (also known as security) is the practice of ensuring confident...
Core Skills for cyber security Professionals
Core skills for cybersecurity professionals
In this video, we'll discuss both transferable and technical skills that are particularly useful ...
Veronica: My path to working in cybersecurity
Hi, I'm Veronica and I'm a security engineer at Google. My journey into cybersecurity has changed...
Transferable and technical cybersecurity skills
Previously, you learned that cybersecurity analysts need to develop certain core skills to be suc...
The importance of cybersecurity
As we've discussed, security professionals protect many physical and digital assets. These skills...
Wrap-up
Congratulations on completing the first section of this course! Let's quickly review what we've c...
The History if cybersecurity
welcome to week 2
Welcome back! When it comes to security, there is so much to learn, and I'm thrilled to be part o...
Past cybersecurity attacks
The security industry is constantly evolving, but many present-day attacks are not entirely new. ...
Attacks in the digital age
With the expansion of reliable high-speed internet, the number of computers connected to the inte...
Common attacks and their effectiveness
Previously, you learned about past and present attacks that helped shape the cybersecurity indu...
Sean: Keep your cool during a data breach
Hi, my name is Sean. I'm a Technical Program Manager in Google workspace. I am a 30 year security...
Introduction to security frameworks and controls
Imagine you're working as a security analyst and receive multiple alerts about suspicious activit...
The eight CISSP security domains
Introduction to the eight CISSP security domains, Part 1
As the tactics of threat actors evolve, so do the roles of security professionals. Having a solid...
Introduction to the eight CISSP security domains, Part 2
Welcome back. In the last video, we introduced you to the first four security domains. In this vi...
Determine the type of attack
Previously, you learned about the eight Certified Information Systems Security Professional (CISS...
Understand attackers
Previously, you were introduced to the concept of threat actors. As a reminder, a threat actor is...
Wrap-up
This concludes our brief introduction to some of the most influential security attacks throughout...
Frameworks and controles
Secure design
Hi, welcome back! Previously, we discussed frameworks and controls in general. In this video, you...
Introduction to security frameworks and controls
Imagine you're working as a security analyst and receive multiple alerts about suspicious activit...
Controls, frameworks, and compliance
Previously, you were introduced to security frameworks and how they provide a structured approa...
Heather: Protect sensitive data and information
Hello, my name is Heather and I'm the Vice President of Security Engineering at Google. PII has b...
Ethics in Cybersecurity
Ethics in Cybersecurity
In security, new technologies present new challenges. For every new security incident or risk, th...
Ethical concepts that guide cybersecurity decisions
Previously, you were introduced to the concept of security ethics. Security ethics are guidelin...
Holly: The importance of ethics as a cybersecurity professional
Hi, I'm Holly and I'm a Cloud Security Architect with Google Cloud. At the beginning of my adult ...
Wrap-up
You are now better prepared to understand and help make decisions regarding assessing and managin...
Important Cybersecurity tools
Welcome to week 4
Welcome to the final section of this course! Here, we'll be introducing tools and programming lan...
Common cybersecurity tools
As mentioned earlier, security is like preparing for a storm. If you identify a leak, the color o...
Tools for protecting business operations
Previously, you were introduced to several technical skills that security analysts need to develo...
Core cybersecurity knowlege and skills
Introduction to Linux, SQL, and Python
As we discussed previously, organizations use a variety of tools, such as SIEMs, playbooks, and p...
Use tools to protect business operations
Previously, you were introduced to programming, operating systems, and tools commonly used by c...
Glossary terms from week 4
Terms and definitions from the certificate Terms and definitions from Course 1, Week 4 Antiviru...