# [Completed] Professional Google Cybersecurity Specialization C1/8 Foundations of Cybersecurity

done in 13 hrs over 4 days

# Glossery for modules Foundations of Cybersecurity

# Terms and definitions from Course 1

##   


<span lang="EN" style="font-size: 24pt; line-height: 115%; font-family: 'Google Sans'; color: rgb(53, 152, 219);">A</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Adversarial artificial intelligence (AI):</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Antivirus software: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">A software program used to prevent, detect, and eliminate malware and viruses</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Asset:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> An item perceived as having value to an organization </span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Authentication:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> The process of verifying who someone is</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Availability:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> <span style="background-position: 0% 0%; background-repeat: repeat; background-attachment: scroll; background-image: none; background-size: auto; background-origin: padding-box; background-clip: border-box;">The idea that data is accessible</span> to those who are authorized to access it</span>

<span lang="EN" style="font-size: 24pt; line-height: 115%; font-family: 'Google Sans'; color: rgb(53, 152, 219);">B</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Business Email Compromise (BEC): </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans'; background-position: 0% 0%; background-repeat: repeat; background-attachment: scroll; background-image: none; background-size: auto; background-origin: padding-box; background-clip: border-box;">A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage</span>

<span lang="EN" style="font-size: 24pt; line-height: 115%; font-family: 'Google Sans'; color: rgb(53, 152, 219);">C</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Cloud security: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Compliance:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> The process of adhering to internal standards and external regulations</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Computer virus:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> Malicious code written to interfere with computer operations and cause damage to data and software</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Confidentiality:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> Only authorized users can access specific assets or data</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Confidentiality, integrity, availability (CIA) triad: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">A model that helps inform how organizations consider risk when setting up systems and security policies</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Cryptographic attack:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> An attack that affects secure forms of communication between a sender and intended recipient</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Cybersecurity (or security): </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation</span>

<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> </span>

<span lang="EN" style="font-size: 24pt; line-height: 115%; font-family: 'Google Sans'; color: rgb(53, 152, 219);">D</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Database: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">An organized collection of information or data</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Data point: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">A specific piece of information</span>

<span lang="EN" style="font-size: 24pt; line-height: 115%; font-family: 'Google Sans'; color: rgb(53, 152, 219);">H</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Hacker:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> Any person or group who uses computers to gain unauthorized access to data</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Hacktivist: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">A person who uses hacking to achieve a political goal</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Health Insurance Portability and Accountability Act (HIPAA): </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">A U.S. federal law established to protect patients’ health information</span>

<span lang="EN" style="font-size: 24pt; line-height: 115%; font-family: 'Google Sans'; color: rgb(53, 152, 219);">I</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Integrity: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">The idea that the data is correct, authentic, and reliable</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Internal threat: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">A current or former employee, external vendor, or trusted partner who poses a security risk</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Intrusion detection system (IDS): </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">An application that monitors system activity and alerts on possible intrusions</span>

<span lang="EN" style="font-size: 24pt; line-height: 115%; font-family: 'Google Sans'; color: rgb(53, 152, 219);">L</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Linux:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> An open-source operating system</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Log:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> A record of events that occur within an organization’s systems </span>

<span lang="EN" style="font-size: 24pt; line-height: 115%; font-family: 'Google Sans'; color: rgb(53, 152, 219);">M</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Malware:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> Software designed to harm devices or networks</span>

<span lang="EN" style="font-size: 24pt; line-height: 115%; font-family: 'Google Sans'; color: rgb(53, 152, 219);">N</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF): </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Network protocol analyzer (packet sniffer):</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> <span style="background-position: 0% 0%; background-repeat: repeat; background-attachment: scroll; background-image: none; background-size: auto; background-origin: padding-box; background-clip: border-box;">A tool designed to capture and analyze data traffic within a network</span></span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Network security: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">The practice of keeping an organization's network infrastructure secure from unauthorized access</span>

<span lang="EN" style="font-size: 24pt; line-height: 115%; font-family: 'Google Sans'; color: rgb(53, 152, 219);">O</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Open Web Application Security Project (OWASP): </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">A non-profit organization focused on improving software security</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Order of volatility:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans'; background-position: 0% 0%; background-repeat: repeat; background-attachment: scroll; background-image: none; background-size: auto; background-origin: padding-box; background-clip: border-box;"> A sequence outlining the order of data that must be preserved from first to last</span>

<span lang="EN" style="font-size: 24pt; line-height: 115%; font-family: 'Google Sans'; color: rgb(53, 152, 219);">P</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Password attack:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> An attempt to access password secured devices, systems, networks, or data</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Personally identifiable information (PII):</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> Any information used to infer an individual’s identity</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Phishing:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> The use of digital communications to trick people into revealing sensitive data or deploying malicious software</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Physical attack:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> A security incident that affects not only digital but also physical environments where the incident is deployed</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Physical social engineering: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Privacy protection: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">The act of safeguarding personal information from unauthorized use</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Programming:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans'; background-position: 0% 0%; background-repeat: repeat; background-attachment: scroll; background-image: none; background-size: auto; background-origin: padding-box; background-clip: border-box;"> A process that can be used to create a specific set of instructions for a computer to execute tasks</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Protected health information (PHI): </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Information that relates to the past, present, or future physical or mental health or condition of an individual</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Protecting and preserving evidence:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans'; background-position: 0% 0%; background-repeat: repeat; background-attachment: scroll; background-image: none; background-size: auto; background-origin: padding-box; background-clip: border-box;"> The process of properly working with fragile and volatile digital evidence</span>

<span lang="EN" style="font-size: 24pt; line-height: 115%; font-family: 'Google Sans'; color: rgb(53, 152, 219);">S</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Security architecture: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Security controls: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Safeguards designed to reduce specific security risks</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Security ethics:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> Guidelines for making appropriate decisions as a security professional</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Security frameworks:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> Guidelines used for building plans to help mitigate risk and threats to data and privacy</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Security governance: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Practices that help support, define, and direct security efforts of an organization</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans'; background-position: 0% 0%; background-repeat: repeat; background-attachment: scroll; background-image: none; background-size: auto; background-origin: padding-box; background-clip: border-box;">Security information and event management (SIEM)</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans'; background-position: 0% 0%; background-repeat: repeat; background-attachment: scroll; background-image: none; background-size: auto; background-origin: padding-box; background-clip: border-box;">: </span><span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">An application that collects and analyzes log data to monitor critical activities in an organization</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Security posture:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> An organization’s ability to manage its defense of critical assets and data and react to change </span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Sensitive personally identifiable information (SPII):</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> A specific type of PII that falls under stricter handling guidelines</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Social engineering: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">A manipulation technique that exploits human error to gain private information, access, or valuables</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Social media phishing: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Spear phishing: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans'; background-position: 0% 0%; background-repeat: repeat; background-attachment: scroll; background-image: none; background-size: auto; background-origin: padding-box; background-clip: border-box;">A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">SQL (Structured Query Language):</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> A programming language used to create, interact with, and request information from a database</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Supply-chain attack: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans'; background-position: 0% 0%; background-repeat: repeat; background-attachment: scroll; background-image: none; background-size: auto; background-origin: padding-box; background-clip: border-box;">An attack that targets systems, applications, </span><span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">hardware, <span style="background-position: 0% 0%; background-repeat: repeat; background-attachment: scroll; background-image: none; background-size: auto; background-origin: padding-box; background-clip: border-box;">and/or software to locate a vulnerability where malware can be deployed</span></span>

<span lang="EN" style="font-size: 24pt; line-height: 115%; font-family: 'Google Sans'; color: rgb(53, 152, 219);">T</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Technical skills:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> Skills that require knowledge of specific tools, procedures, and policies </span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Threat:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> Any circumstance or event that can negatively impact assets</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Threat actor: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Any person or group who presents a security risk</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Transferable skills:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> Skills from other areas that can apply to different careers</span>

<span lang="EN" style="font-size: 24pt; line-height: 115%; font-family: 'Google Sans'; color: rgb(53, 152, 219);">U</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">USB baiting:</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';"> <span style="background-position: 0% 0%; background-repeat: repeat; background-attachment: scroll; background-image: none; background-size: auto; background-origin: padding-box; background-clip: border-box;">An attack in which a threat actor strategically leaves a malware USB stick for an employee to find </span>and install to unknowingly infect a network</span>

<span lang="EN" style="font-size: 24pt; line-height: 115%; font-family: 'Google Sans'; color: rgb(53, 152, 219);">V</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">Virus: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">refer to <span style="background-position: 0% 0%; background-repeat: repeat; background-attachment: scroll; background-image: none; background-size: auto; background-origin: padding-box; background-clip: border-box;">“computer virus”</span></span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans'; background-position: 0% 0%; background-repeat: repeat; background-attachment: scroll; background-image: none; background-size: auto; background-origin: padding-box; background-clip: border-box;">Vishing: </span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans'; background-position: 0% 0%; background-repeat: repeat; background-attachment: scroll; background-image: none; background-size: auto; background-origin: padding-box; background-clip: border-box;">The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source</span>

<span lang="EN" style="font-size: 24pt; line-height: 115%; font-family: 'Google Sans'; color: rgb(53, 152, 219);">W</span>

**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans'; background-position: 0% 0%; background-repeat: repeat; background-attachment: scroll; background-image: none; background-size: auto; background-origin: padding-box; background-clip: border-box;">Watering hole attack</span>**<span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans'; background-position: 0% 0%; background-repeat: repeat; background-attachment: scroll; background-image: none; background-size: auto; background-origin: padding-box; background-clip: border-box;">: </span><span lang="EN" style="font-size: 12pt; line-height: 115%; font-family: 'Google Sans';">A type of attack when a threat actor compromises a website frequently visited by a specific group of users</span>

# Google Cybersecurity Certificate glossary

##   


<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">A</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Absolute file path: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The full file path, which starts from the root</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Access controls:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Security controls that manage access, authorization, and accountability of information</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Active packet sniffing: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A <span style="background: white; mso-highlight: white;">type of attack where data packets are manipulated in transit</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Address Resolution Protocol (ARP): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A network protocol used to determine the MAC address of the next router or device on the path</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Advanced persistent threat (APT): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">An instance when a threat actor maintains unauthorized access to a system for an extended period of time</span><span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Adversarial artificial intelligence (AI): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Adware: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A type of legitimate software that is sometimes used to display digital advertisements in applications</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Algorithm: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A set of rules used to solve a problem</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Analysis:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The investigation and validation of alerts</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Angler phishing:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;"> A technique where attackers impersonate customer service representatives on social media </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Anomaly-based analysis: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A detection method that identifies abnormal behavior</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Antivirus software: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A software program used to prevent, detect, and eliminate malware and viruses</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Application:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A program that performs a specific task</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Application programming interface (API) token: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A small block of encrypted code that contains information about a user</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Argument (Linux): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Specific information needed by a command</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Argument (Python): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The data brought into a function when it is called</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Array: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A data type that stores data in a comma-separated ordered list</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Assess: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The fifth step of the NIST RMF that means to determine if established controls are implemented correctly</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Asset:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An item perceived as having value to an organization </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Asset classification:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The practice of labeling assets based on sensitivity and importance to an organization</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Asset inventory:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A catalog of assets that need to be protected</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Asset management: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of tracking assets and the risks that affect them </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Asymmetric encryption:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The use of a public and private key pair for encryption and decryption of data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Attack surface: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">All the potential vulnerabilities that a threat actor could exploit</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Attack tree:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A diagram that maps threats to assets</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Attack vectors:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The pathways attackers use to penetrate security defenses </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Authentication:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The process of verifying who someone is</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Authorization:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The concept of granting access to specific resources in a system</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Authorize: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that might exist in an organization</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Automation:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The use of technology to reduce human and manual effort to perform common and repetitive tasks</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Availability:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;"> The idea that data is accessible to those who are authorized to access it</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">B</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Baiting: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A social engineering tactic that tempts people into compromising their security</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Bandwidth: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #222222;">The maximum data transmission capacity over a network, measured by bits per second</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Baseline configuration (baseline image): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A documented set of specifications within a system that is used as a basis for future builds, releases, and updates</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Bash:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The default shell in most Linux distributions</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Basic auth:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The technology used to establish a user’s request to access a server</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Basic Input/Output System (BIOS):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A microchip that contains loading instructions for the computer and is prevalent in older systems </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Biometrics: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">The unique physical characteristics that can be used to verify a person’s identity</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Bit: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The smallest unit of data measurement on a computer</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Boolean data: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data that can only be one of two values: either </span><span lang="EN" style="font-family: 'Courier New'; mso-fareast-font-family: 'Courier New'; background: #EFEFEF;">True</span><span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> or </span><span lang="EN" style="font-family: 'Courier New'; mso-fareast-font-family: 'Courier New'; background: #EFEFEF;">False</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Bootloader: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A software program that boots the operating system</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Botnet: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder"</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Bracket notation: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The indices placed in square brackets </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Broken chain of custody:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Inconsistencies in the collection and logging of evidence in the chain of custody</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Brute force attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The trial and error process of discovering private information </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Bug bounty: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Programs that encourage freelance hackers to find and report vulnerabilities</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Built-in function:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A function that exists within Python and can be called directly</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Business continuity: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An organization's ability to maintain their everyday productivity by establishing risk disaster recovery plans</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Business continuity plan (BCP): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A document that outlines the procedures to sustain business operations during and after a significant disruption</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Business Email Compromise (BEC): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">C</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Categorize: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The second step of the NIST RMF that is used to develop risk management processes and tasks</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">CentOS: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An open-source distribution that is closely related to Red Hat</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Central Processing Unit (CPU): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A computer’s main processor, which is used to perform general computing tasks on a computer</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Chain of custody:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The process of documenting evidence possession and control during an incident lifecycle</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Chronicle:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A cloud-native tool designed to retain, analyze, and search data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cipher: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An algorithm that encrypts information</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cloud-based firewalls:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Software firewalls that are hosted by the cloud service provider</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cloud computing: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The practice of using remote servers, applications, and network services that are hosted on the internet instead of on local physical devices</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cloud network:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cloud security: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Command:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An instruction telling the computer to do something</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Command and control (C2): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The techniques used by malicious actors to maintain communications with compromised systems</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Command-line interface (CLI):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A text-based user interface that uses commands to interact with the computer</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Comment:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A note programmers make about the intention behind their code</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Common Event Format (CEF): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A log format that uses key-value pairs to structure data and identify fields and their corresponding values </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Common Vulnerabilities and Exposures (<span style="color: #444746;">CVE®</span>) list:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An openly accessible dictionary of known vulnerabilities and exposures</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Common Vulnerability Scoring System (CVSS): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A measurement system that scores the severity of a vulnerability</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Compliance: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of adhering to internal standards and external regulations</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Computer security incident response teams (CSIRT):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A specialized group of security professionals that are trained in incident management and response </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Computer virus:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Malicious code written to interfere with computer operations and cause damage to data and software</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Conditional statement: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A statement that evaluates code to determine if it meets a specified set of conditions</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Confidentiality:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The idea that only authorized users can access specific assets or data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Confidential data: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data that often has limits on the number of people who have access to it</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Confidentiality, integrity, availability (CIA) triad: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A model that helps inform how organizations consider risk when setting up systems and security policies</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Configuration file: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A file used to configure the settings of an application</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Containment:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The act of limiting and preventing additional damage caused by an incident</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Controlled zone: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A subnet that protects the internal network from the uncontrolled zone</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cross-site scripting (XSS):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An injection attack that inserts code into a vulnerable website or web application</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Crowdsourcing: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The practice of gathering information using public input and collaboration</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cryptographic attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An attack that affects secure forms of communication between a sender and intended recipient</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cryptographic key: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A mechanism that decrypts ciphertext</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cryptography: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of transforming information into a form that unintended readers can’t understand </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cryptojacking:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A form of malware that installs software to illegally mine cryptocurrencies </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">CVE Numbering Authority (CNA):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An organization that volunteers to analyze and distribute information on eligible CVEs</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cybersecurity (or security):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> <span style="background: white; mso-highlight: white;">The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation</span></span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">D</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Information that is translated, processed, or stored by a computer</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data at rest: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data not currently being accessed</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Database: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An organized collection of information or data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data controller: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A person that determines the procedure and purpose for processing data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data custodian:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Anyone or anything that’s responsible for the safe handling, transport, and storage of information</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data exfiltration: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Unauthorized transmission of data from a system</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data in transit:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Data traveling from one point to another</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data in use:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Data being accessed by one or more users</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data owner: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The person who decides who can access, edit, use, or destroy their information</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data packet: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A basic unit of information that travels from one device to another within a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data point:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A specific piece of information</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data processor: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A person that is responsible for processing data on behalf of the data controller</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data protection officer (DPO): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">An individual that is responsible for monitoring the compliance of an organization's data protection procedures</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data type:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A category for a particular type of data item</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Date and time data:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Data representing a date and/or time</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Debugger:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A software tool that helps to locate the source of an error and assess its causes</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Debugging:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The practice of identifying and fixing errors in code</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Defense in depth: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A layered approach to vulnerability management that reduces risk</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Denial of service (DoS) attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An attack that targets a network or server and floods it with network traffic</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Detect: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A NIST core function related to identifying potential security incidents and improving monitoring capabilities to increase the speed and efficiency of detections</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Detection: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The prompt discovery of security events</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Dictionary data: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Data that consists of one or more key-value pairs</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Digital certificate: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A file that verifies the identity of a public key holder</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Digital forensics:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The practice of collecting and analyzing data to determine what has happened after an attack</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Directory: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A file that organizes where other files are stored</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Disaster recovery plan: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A plan that allows an organization’s security team to outline the steps needed to minimize the impact of a security incident</span>

<span lang="EN" style="font-size: 14.0pt; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Distributed denial of service (DDoS) attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A type of denial or service attack that uses multiple devices or servers located in different locations to flood the target network with unwanted traffic</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Distributions: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The different versions of Linux</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Documentation:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Any form of recorded content that is used for a specific purpose </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">DOM-based XSS attack:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An instance when malicious script exists in the webpage a browser loads</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Domain Name System (DNS):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A networking protocol that translates internet domain names into IP addresses</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Dropper: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A program or a file used to install a rootkit on a target computer</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">E</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Elevator pitch: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A brief summary of your experience, skills, and background</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Encapsulation: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Encryption: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of converting data from a readable format to an encoded format</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Endpoint:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Any device connected on a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Endpoint detection and response (EDR): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">An application that monitors an endpoint for malicious activity</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Eradication:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> <span style="background: white; mso-highlight: white;">The complete removal of the incident elements from all affected systems</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Escalation policy: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A set of actions that outline who should be notified when an incident alert occurs and how that incident should be handled</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Event:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An observable occurrence on a network, system, or device</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Exception: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An error that involves code that cannot be executed even though it is syntactically correct</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Exclusive operator</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: An operator that does not include the value of comparison</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Exploit: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A way of taking advantage of a vulnerability</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Exposure:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A mistake that can be exploited by a threat</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">External threat:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Anything outside the organization that has the potential to harm organizational assets</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">F</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">False negative</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: A state where the presence of a threat is not detected</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>**

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">False positive: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An alert that incorrectly detects the presence of a threat</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Fileless malware: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Malware that does not need to be installed by the user because it uses legitimate programs that are already installed to infect a computer</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">File path: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The location of a file or directory</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Filesystem Hierarchy Standard (FHS):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The component of the Linux OS that organizes data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Filtering:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Selecting data that match a certain condition</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Final report:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Documentation that provides a comprehensive review of an incident</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Firewall: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A network security device that monitors traffic to or from a network </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Float data: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data consisting of a number with a decimal point</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Foreign key: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A column in a table that is a primary key in another table</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Forward proxy server: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A server that regulates and restricts a person’s access to the internet</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Function:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A section of code that can be reused in a program</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">G</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Global variable:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> <span style="background: #FEFEFE;">A variable that is available through the entire program</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Graphical user interface (GUI):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> <span style="background: #FEFEFE;">A user interface that uses icons on the screen to manage different tasks on the computer</span></span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">H</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hacker: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Any person or group who uses computers to gain unauthorized access to data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hacktivist: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A person who uses hacking to achieve a political goal</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hard drive: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #3c4043; background: white; mso-highlight: white;">A hardware component used for long-term memory</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hardware: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The physical components of a computer</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hash collision: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">An instance when different inputs produce the same hash value</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hash function: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An algorithm that produces a code that can’t be decrypted</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hash table: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A data structure that's used to store and reference hash values</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Health Insurance Portability and Accountability Act (HIPAA): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A U.S. federal law established to protect patients’ health information</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Honeypot: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A system or resource created as a decoy vulnerable to attacks with the purpose of attracting potential intruders</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Host-based intrusion detection system (HIDS):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An application that monitors the activity of the host on which it’s installed </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hub: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A network device that broadcasts information to every device on the network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hypertext Transfer Protocol (HTTP): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An application layer protocol that provides a method of communication between clients and website servers</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hypertext Transfer Protocol Secure (HTTPS): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A network protocol that provides a secure method of communication between clients and website servers</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">I</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Identify: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A NIST core function related to management of cybersecurity risk and its effect on an organization’s people and assets</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Identity and access management (IAM): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A collection of processes and technologies that helps organizations manage digital identities in their environment </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">IEEE 802.11 (Wi-Fi): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A set of standards that define communication for wireless LANs</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Immutable:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An object that cannot be changed after it is created and assigned a value</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Implement:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The fourth step of the NIST RMF that means to implement security and privacy plans for an organization</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Improper usage: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An incident type that occurs when an employee of an organization violates the organization’s acceptable use policies</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Incident:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system; or constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Incident escalation</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: The process of identifying a potential security incident, triaging it, and handing it off to a more experienced team member</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Incident handler’s journal:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A form of documentation used in incident response</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Incident response: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Incident response plan:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A document that outlines the procedures to take in each step of incident response</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Inclusive operator: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">An operator that includes the value of comparison</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Indentation: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Space added at the beginning of a line of code</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Index:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A number assigned to every element in a sequence that indicates its position</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Indicators of attack (IoA):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The series of observed events that indicate a real-time incident</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Indicators of compromise (IoC):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Observable evidence that suggests signs of a potential security incident </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Information privacy: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The protection of unauthorized access and distribution of data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Information security (InfoSec):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The practice of keeping data in all states away from unauthorized users</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Injection attack:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Malicious code inserted into a vulnerable application</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Input validation:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Programming that validates inputs from users and other programs</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Integer data: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data consisting of a number that does not include a decimal point</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Integrated development environment (IDE): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A software application for writing code that provides editing assistance and error correction tools</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Integrity: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The idea that the data is correct, authentic, and reliable</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Internal hardware: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">The components required to run the computer</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Internal threat: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A current or former employee, external vendor, or trusted partner who poses a security risk</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Internet Control Message Protocol (ICMP): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">An internet protocol used by devices to tell each other about data transmission errors across the network </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Internet Control Message Protocol flood (ICMP flood): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A type of DoS attack performed by an attacker repeatedly sending ICMP request packets to a network server</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Internet Protocol (IP): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A set of standards used for routing and addressing data packets as they travel between devices on a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Internet Protocol (IP) address: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A unique string of characters that identifies the location of a device on the internet</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Interpreter: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A computer program that translates Python code into runnable instructions line by line</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Intrusion detection system (IDS): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An application that monitors system activity and alerts on possible intrusions</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Intrusion prevention system (IPS): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An application that monitors system activity for intrusive activity and takes action to stop the activity</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">IP spoofing: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Iterative statement: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Code that repeatedly executes a set of instructions</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">K</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">KALI LINUX ™: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An open-source distribution of Linux that is widely used in the security industry</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Kernel:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The component of the Linux OS that manages processes and memory</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Key-value pair: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A set of data that represents two linked items:<span style="mso-spacerun: yes;"> </span>a key, and its corresponding value</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">L</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Legacy operating system: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An operating system that is outdated but still being used</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Lessons learned meeting:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;"> A meeting that includes all involved parties after a major incident</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Library: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A collection of modules that provide code users can access in their programs</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Linux: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An open-source operating system</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">List concatenation:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The concept of combining two lists into one by placing the elements of the second list directly after the elements of the first list</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">List data: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data structure that consists of a collection of data in sequential form</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Loader: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Malicious code that launches after a user initiates a dropper program</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Local Area Network (LAN): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A network that spans small areas like an office building, a school, or a home</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Local variable: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A variable assigned within a function</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Log:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A record of events that occur within an organization’s systems </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Log analysis:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The process of examining logs to identify events of interest </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Logging: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The recording of events occurring on computer systems and networks</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Logic error: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An error that results when the logic used in code produces unintended results</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Log management: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of collecting, storing, analyzing, and disposing of log data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Loop condition: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The part of a loop that determines when the loop terminates</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Loop variable: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A variable that is used to control the iterations of a loop</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">M</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Malware:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Software designed to harm devices or networks</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Malware infection</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: An incident type that occurs when malicious software designed to disrupt a system infiltrates an organization’s computers or network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Media Access Control (MAC) address: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A unique alphanumeric identifier that is assigned to each physical device on a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Method:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A function that belongs to a specific data type</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Metrics: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Key technical attributes such as response time, availability, and failure rate, which are used to assess the performance of a software application</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">MITRE:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A collection of non-profit research and development centers</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Modem: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A device that connects your router to the internet and brings internet access to the LAN</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Module</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: A Python file that contains additional functions, variables, classes, and any kind of runnable code</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Monitor</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: The seventh step of the NIST RMF that means be aware of how systems are operating</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Multi-factor authentication (MFA): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A security measure that requires a user to verify their identity in two or more ways to access a system or network</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">N</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">nano: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A command-line file editor that is available by default in many Linux distributions</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">National Institute of Standards and Technology (NIST) Incident Response Lifecycle:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A framework for incident response consisting of four phases: Preparation; Detection and Analysis; Containment, Eradication and Recovery, and Post-incident activity</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">National Institute of Standards and Technology (NIST) Special Publication (S.P.) 800-53: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A unified framework for protecting the security of information systems within the U.S. federal government</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A group of connected devices</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network-based intrusion detection system (NIDS): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An application that collects and monitors network traffic and network data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network data:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The data that’s transmitted between devices on a network </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network Interface Card (NIC): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hardware that connects computers to a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network log analysis: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of examining network logs to identify events of interest</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network protocol analyzer (packet sniffer):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> <span style="background: white; mso-highlight: white;">A tool designed to capture and analyze data traffic within a network</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network protocols: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A set of rules used by two or more devices on a network to describe the order of delivery and the structure of data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network security: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The practice of keeping an organization's network infrastructure secure from unauthorized access</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network segmentation: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A security technique that divides the network into segments</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network traffic:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The amount of data that moves across a network </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Non-repudiation:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The concept that the authenticity of information can’t be denied</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Notebook: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An online interface for writing, storing, and running code</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Numeric data:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Data consisting of numbers</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">O</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">OAuth: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An open-standard authorization protocol that shares designated access between applications</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Object: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A data type that stores data in a comma-separated list of key-value pairs</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">On-path attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An attack where a malicious actor places themselves in the middle of an authorized connection and intercepts or alters the data in transit</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Open-source intelligence (OSINT): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">The collection and analysis of information from publicly available sources to generate usable intelligence</span><span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Open systems interconnection (OSI) model: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A standardized concept that describes the seven layers computers use to communicate and send data over the network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Open Web Application Security Project (OWASP): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A non-profit organization focused on improving software security</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: #FEFEFE;">Operating system (OS)</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: #FEFEFE;">: </span><span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The interface between computer hardware and the user</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Operator:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A symbol or keyword that represents an operation</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Options:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Input that modifies the behavior of a command</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Order of volatility:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;"> A sequence outlining the order of data that must be preserved from first to last</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">OWASP Top 10: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A globally recognized standard awareness document that lists the top 10 most critical security risks to web applications </span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">P</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Package: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A piece of software that can be combined with other packages to form an application</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Package manager: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A tool that helps users install, manage, and remove packages or applications</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Packet capture (P-cap): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A file containing data packets intercepted from an interface or network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Packet sniffing: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">The practice of capturing and inspecting data packets across a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Parameter (Python):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An object that is included in a function definition for use in that function</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Parrot: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An open-source distribution that is commonly used for security</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Parsing:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The process of converting data into a more readable format</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Passive packet sniffing: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A type of attack where a malicious actor connects to a network hub and looks at all traffic on the network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Password attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An attempt to access password secured devices, systems, networks, or data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Patch update: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A software and operating system update that addresses security vulnerabilities within a program or product</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Payment Card Industry Data Security Standards (PCI DSS): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Any cardholder data that an organization accepts, transmits, or stores</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Penetration test (pen test): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">PEP 8 style guide:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A resource that provides stylistic guidelines for programmers working in Python </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Peripheral devices: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hardware components that are attached and controlled by the computer system</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Permissions: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The type of access granted for a file or directory</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Personally identifiable information (PII): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Any information used to infer an individual's identity</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Phishing: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The use of digital communications to trick people into revealing sensitive data or deploying malicious software</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Phishing kit: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A collection of software tools needed to launch a phishing campaign</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Physical attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A security incident that affects not only digital but also physical environments where the incident is deployed</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Physical social engineering: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Ping of death: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A type of DoS attack caused when a hacker pings a system by sending it an oversized ICMP packet that is bigger than 64KB </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Playbook: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A manual that provides details about any operational action</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Policy: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A set of rules that reduce risk and protect information</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Port: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A software-based location that organizes the sending and receiving of data between devices on a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Port filtering: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A firewall function that blocks or allows certain port numbers to limit unwanted communication</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Post-incident activity: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of reviewing an incident to identify areas for improvement during incident handling </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Potentially unwanted application (PUA):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A type of unwanted software that is bundled in with legitimate programs which might display ads, cause device slowdown, or install other software</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Private data</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">: Information that should be kept from the public</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Prepare: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The first step of the NIST RMF related to activities that are necessary to manage security and privacy risks before a breach occurs</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Prepared statement:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A coding technique that executes SQL statements before passing them on to a database</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Primary key:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A column where every row has a unique entry</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Principle of least privilege: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The concept of granting only the minimal access and authorization required to complete a task or function</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Privacy protection: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The act of safeguarding personal information from unauthorized use </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Procedures:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Step-by-step instructions to perform a specific security task</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Process of Attack Simulation and Threat Analysis (PASTA): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A popular threat modeling framework that’s used across many industries</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Programming:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;"> A process that can be used to create a specific set of instructions for a computer to execute tasks</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Protect: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A NIST core function used to protect an organization through the implementation of policies, procedures, training, and tools that help mitigate cybersecurity threats</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Protected health information (PHI): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Information that relates to the past, present, or future physical or mental health or condition of an individual</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Protecting and preserving evidence: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of properly working with fragile and volatile digital evidence</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Proxy server: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A server that fulfills the requests of its clients by forwarding them to other servers</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Public data</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">: Data that is already accessible to the public and poses a minimal risk to the organization if viewed or shared by others</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Public key infrastructure (PKI):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An encryption framework that secures the exchange of online information</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Python Standard Library: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An extensive collection of Python code that often comes packaged with Python</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">Q</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Query: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A request for data from a database table or a combination of tables</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Quid pro quo:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A type of baiting used to trick someone into believing that they’ll be rewarded in return for sharing access, information, or money</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">R</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Rainbow table:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A file of pre-generated hash values and their associated plaintext</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Random Access Memory (RAM): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #3c4043; background: white; mso-highlight: white;">A hardware component used for short-term memory</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Ransomware:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Rapport: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A friendly relationship in which the people involved understand each other’s ideas and communicate well with each other</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Recover: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A NIST core function related to returning affected systems back to normal operation</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Recovery:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The process of returning affected systems back to normal operations</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Red Hat® Enterprise Linux® </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">(also referred to simply as Red Hat in this course)**:** A subscription-based distribution of Linux built for enterprise use</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Reflected XSS attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An instance when malicious script is sent to a server and activated during the server’s response </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Regular expression (regex):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A sequence of characters that forms a pattern</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Regulations:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Rules set by a government or other authority to control the way something is done</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Relational database: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A structured database containing tables that are related to each other</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Relative file path: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A file path that starts from the user's current directory</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Replay attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #3c4043; background: white; mso-highlight: white;">A network attack performed when a malicious actor intercepts a data packet in transit and delays it or repeats it at another time</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Resiliency</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: <span style="background: white; mso-highlight: white;">The ability to prepare for, respond to, and recover from disruptions</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Respond:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A NIST core function related to making sure that the proper procedures are used to contain, neutralize, and analyze security incidents, and implement improvements to the security process</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Return statement: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A Python statement that executes inside a function and sends information back to the function call</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Reverse proxy server: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A server that regulates and restricts the internet's access to an internal server</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Risk:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Anything that can impact the confidentiality, integrity, or availability of an asset</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Risk mitigation: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Root directory: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The highest-level directory in Linux</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Rootkit</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: <span style="background: white; mso-highlight: white;">Malware that provides remote, administrative access to a computer</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Root user (or superuser): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A user with elevated privileges to modify the system</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Router: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A network device that connects multiple networks together</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">S</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Salting:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> <span style="background: white; mso-highlight: white;">An additional safeguard that’s used to strengthen hash functions</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Scareware: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Malware that employs tactics to frighten users into infecting their device</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Search Processing Language (SPL)</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">: Splunk’s query language</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Secure File Transfer Protocol (SFTP): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A secure protocol used to transfer files from one device to another over a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Secure shell (SSH): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A security protocol used to create a shell with a remote system </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security architecture: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security audit</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: A review of an organization's security controls, policies, and procedures against a set of expectations</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security controls:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Safeguards designed to reduce specific security risks </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security ethics:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Guidelines for making appropriate decisions as a security professional</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security frameworks:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Guidelines used for building plans to help mitigate risk and threats to data and privacy</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security governance: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Practices that help support, define, and direct security efforts of an organization</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security hardening: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of strengthening a system to reduce its vulnerabilities and attack surface</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Security information and event management (SIEM)</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">: </span><span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An application that collects and analyzes log data to monitor critical activities in an organization</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security mindset: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The ability to evaluate risk and constantly seek out and identify the potential or actual breach of a system, application, or data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security operations center (SOC): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An organizational unit dedicated to monitoring networks, systems, and devices for security threats or attacks</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security orchestration, automation, and response (SOAR): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A collection of applications, tools, and workflows that use automation to respond to security events</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security posture:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An organization’s ability to manage its defense of critical assets and data and react to change</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security zone: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A segment of a company’s network that protects the internal network from the internet</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Select</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: The third step of the NIST RMF that means to choose, customize, and capture documentation of the controls that protect an organization</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Sensitive data</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: <span style="background: white; mso-highlight: white;">A type of data that includes personally identifiable information (PII), sensitive personally identifiable information (SPII), or protected health information (PHI)</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Sensitive personally identifiable information (SPII):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A specific type of PII that falls under stricter handling guidelines</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Separation of duties:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The principle that users should not be given levels of authorization that would allow them to misuse a system</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Session: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">a sequence of network HTTP requests and responses associated with the same user</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Session cookie:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A token that websites use to validate a session and determine how long that session should last</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Session hijacking:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An event when attackers obtain a legitimate user’s session ID</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Session ID: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A unique token that identifies a user and their device while accessing a system </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Set data: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data that consists of an unordered collection of unique values</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Shared responsibility:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The idea that all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Shell:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The command-line interpreter </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Signature: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A pattern that is associated with malicious activity</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Signature analysis:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A detection method used to find events of interest</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Simple Network Management Protocol (SNMP): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A network protocol used for monitoring and managing devices on a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Single sign-on (SSO):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A technology that combines several different logins into one</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Smishing</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: The use of text messages to trick users to obtain sensitive information or to impersonate a known source</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Smurf attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A network attack performed when an attacker sniffs an authorized user’s IP address and floods it with ICMP packets</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Social engineering: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A manipulation technique that exploits human error to gain private information, access, or valuables</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Social media phishing: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Spear phishing: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Speed: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The rate at which a device sends and receives data, measured by bits per second</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Splunk Cloud: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A cloud-hosted tool used to collect, search, and monitor log data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Splunk Enterprise: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A self-hosted tool used to retain, analyze, and search an organization's log data<span style="background: white; mso-highlight: white;"> to provide security information and alerts in real-time</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Spyware: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Malware that’s used to gather and sell information without consent</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">SQL (Structured Query Language):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A programming language used to create, interact with, and request information from a database</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">SQL injection: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An attack that executes unexpected queries on a database</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Stakeholder: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">An individual or group that has an interest in any decision or activity of an organization</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Standard error:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An error message returned by the OS through the shell</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Standard input:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Information received by the OS via the command line</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Standard output: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Information returned by the OS through the shell</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Standards:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> References that inform how to set policies</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">STAR method: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An interview technique used to answer behavioral and situational questions </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Stateful: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A class of firewall that keeps track of information passing through it and proactively filters out threats</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Stateless: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A class of firewall that operates based on predefined rules and that does not keep track of information from data packets</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Stored XSS attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An instance when malicious script is injected directly on the server</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">String concatenation: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of joining two strings together </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">String data:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Data consisting of an ordered sequence of characters</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Style guide:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A manual that informs the writing, formatting, and design of documents</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Subnetting: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The subdivision of a network into logical groups called subnets</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Substring: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A continuous sequence of characters within a string</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Sudo: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A command that temporarily grants elevated permissions to specific users</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Supply-chain attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Suricata</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">: An open-source intrusion detection system, intrusion prevention system, and network analysis tool</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Switch: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A device that makes connections between specific devices on a network by sending and receiving data between them</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Symmetric encryption: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The use of a single secret key to exchange information</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Synchronize (SYN) flood attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A type of DoS attack that simulates a TCP/IP connection and floods a server with SYN packets</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Syntax: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The rules that determine what is correctly structured in a computing language</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Syntax error:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An error that involves invalid usage of a programming language</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">T</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Tailgating: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A social engineering tactic in which unauthorized people follow an authorized person into a restricted area</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">TCP/IP model: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A framework used to visualize how data is organized and transmitted across a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">tcpdump: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A command-line network protocol analyzer</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Technical skills:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Skills that require knowledge of specific tools, procedures, and policies </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Telemetry:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The collection and transmission of data for analysis</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Threat:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Any circumstance or event that can negatively impact assets</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Threat actor: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Any person or group who presents a security risk</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Threat hunting: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The proactive search for threats on a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Threat intelligence: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Evidence-based threat information that provides context about existing or emerging threats</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Threat modeling: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">The process of identifying assets, their vulnerabilities, and how each is exposed to threats</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Transferable skills:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Skills from other areas that can apply to different careers </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Transmission Control Protocol (</span><span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">TCP): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An internet communication protocol that allows two devices to form a connection and stream data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Triage</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: The prioritizing of incidents according to their level of importance or urgency</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Trojan horse: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Malware that looks like a legitimate file or program</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">True negative: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A state where there is no detection of malicious activity</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">True positive </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An alert that correctly detects the presence of an attack</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Tuple data:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Data that consists of a collection of data that cannot be changed</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Type error: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An error that results from using the wrong data type</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">U</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Ubuntu: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An open-source, user-friendly distribution that is widely used in security and other industries</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Unauthorized access: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An incident type that occurs when an individual gains digital or physical access to a system or application without permission </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Uncontrolled zone: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Any network outside your organization's control</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Unified Extensible Firmware Interface (UEFI): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A microchip that contains loading instructions for the computer and replaces BIOS on more modern systems</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">USB baiting:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> <span style="background: white; mso-highlight: white;">An attack in which a threat actor strategically leaves a malware USB stick for an employee to find </span>and install to unknowingly infect a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">User:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The person interacting with a computer </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">User Datagram Protocol (UDP):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> <span style="background: white; mso-highlight: white;">A connectionless protocol that does not establish a connection between devices before transmissions</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">User-defined function:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A function that programmers design for their specific needs</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">User interface:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A program that allows the user to control the functions of the operating system</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">User provisioning: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of creating and maintaining a user's digital identity</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">V</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Variable: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A container that stores data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Virtual Private Network (VPN):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A network security service that changes your public IP address and hides your virtual location so that you can keep your data private when you are using a public network like the internet</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Virus: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Malicious code written to interfere with computer operations and cause damage to data and software</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">VirusTotal:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> <span style="background: white; mso-highlight: white;">A service that allows anyone to analyze suspicious files, domains, URLs, and IP addresses for malicious content </span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Vishing:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Visual dashboard:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;"> A way of displaying various types of data quickly in one place</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Vulnerability:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A weakness that can be exploited by a threat</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Vulnerability assessment: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The internal review process of an organization's security systems</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Vulnerability management: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of finding and patching vulnerabilities</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Vulnerability scanner: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Software that automatically compares existing common vulnerabilities and exposures against the technologies on the network</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">W</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Watering hole attack</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: A type of attack when a threat actor compromises a website frequently visited by a specific group of users</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Web-based exploits:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Malicious code or behavior that’s used to take advantage of coding flaws in a web application</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Whaling: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A category of spear phishing attempts that are aimed at high-ranking executives in an organization</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Wide Area Network (WAN): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A network that spans a large geographic area like a city, state, or country</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Wi-Fi Protected Access (WPA): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A wireless security protocol for devices to connect to the internet</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Wildcard: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A special character that can be substituted with any other character</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Wireshark: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An open-source network protocol analyzer</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">World-writable file:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A file that can be altered by anyone in the world</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Worm: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Malware that can duplicate and spread itself across systems on its own</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">Y</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">YARA-L:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A computer language used to create rules for searching through ingested log data</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">Z</span>

**<span lang="EN" style="font-size: 12.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; mso-ansi-language: EN; mso-fareast-language: JA; mso-bidi-language: AR-SA;">Zero-day: </span>**<span lang="EN" style="font-size: 12.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; mso-ansi-language: EN; mso-fareast-language: JA; mso-bidi-language: AR-SA;">An exploit that was previously unknown</span>

# Glossary terms from week 1

#   


## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Terms and definitions from Course 1, Week 1**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Cybersecurity (or security):** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Cloud security:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Internal threat:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A current or former employee, external vendor, or trusted partner who poses a security risk</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Network security:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The practice of keeping an organization's network infrastructure secure from unauthorized access</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Personally identifiable information (PII):**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Any information used to infer an individual’s identity</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Security posture:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> An organization’s ability to manage its defense of critical assets and data and react to change </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Sensitive personally identifiable information (SPII):**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> A specific type of PII that falls under stricter handling guidelines</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Technical skills:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Skills that require knowledge of specific tools, procedures, and policies </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Threat:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Any circumstance or event that can negatively impact assets</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Threat actor:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Any person or group who presents a security risk</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Transferable skills:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Skills from other areas that can apply to different careers </span>

# Glossary terms from week 2

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Terms and definitions from Course 1, Week 2**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Adversarial artificial intelligence (AI):**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Business Email Compromise (BEC):** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Computer virus:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Malicious code written to interfere with computer operations and cause damage to data and software</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Cryptographic attack:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> An attack that affects secure forms of communication between a sender and intended recipient</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Hacker:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Any person who uses computers to gain access to computer systems, networks, or data</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Malware:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Software designed to harm devices or networks</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Password attack:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> An attempt to access password secured devices, systems, networks, or data</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Phishing:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> The use of digital communications to trick people into revealing sensitive data or deploying malicious software</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Physical attack:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> A security incident that affects not only digital but also physical environments where the incident is deployed</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Physical social engineering:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Social engineering:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A manipulation technique that exploits human error to gain private information, access, or valuables</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Social media phishing:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Spear phishing:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Supply-chain attack:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**USB baiting:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Virus:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">refer to “computer virus”</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Vishing:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Watering hole attack**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: A type of attack when a threat actor compromises a website frequently visited by a specific group of user</span>

# Glossary terms from week 3

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Terms and definitions from Course 1, Week 3**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Asset:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> An item perceived as having value to an organization </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Availability:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> The idea that data is accessible to those who are authorized to access it</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Compliance:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> The process of adhering to internal standards and external regulations</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Confidentiality:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> The idea that only authorized users can access specific assets or data</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Confidentiality, integrity, availability (CIA) triad:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A model that helps inform how organizations consider risk when setting up systems and security policies</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Hacktivist:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A person who uses hacking to achieve a political goal</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Health Insurance Portability and Accountability Act (HIPAA):** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A U.S. federal law established to protect patients' health information</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Integrity:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The idea that the data is correct, authentic, and reliable</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF):** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Privacy protection:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The act of safeguarding personal information from unauthorized use</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Protected health information (PHI):** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Information that relates to the past, present, or future physical or mental health or condition of an individual</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Security architecture:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Security controls:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Safeguards designed to reduce specific security risks</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Security ethics:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Guidelines for making appropriate decisions as a security professional</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Security frameworks:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Guidelines used for building plans to help mitigate risk and threats to data and privacy</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Security governance:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Practices that help support, define, and direct security efforts of an organization</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Sensitive personally identifiable information (SPII):** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A specific type of PII that falls under stricter handling guidelines</span>

# Get Started with go certificate program

# Welcome to the Google Cybersecurity Certificate

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-hello-and-welcome-to"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Hello and welcome to" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Hello and welcome to </span></div><div aria-label="toggle video from current lecture segment: the Google Career Certificate focused on cybersecurity." class="rc-Phrase active css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">the Google Career Certificate focused on cybersecurity. </span></div><div aria-label="toggle video from I'm so excited that you're here!" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">I'm so excited that you're here! </span></div><div aria-label="toggle video from My name is Toni, and I am" class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">My name is Toni, and I am </span></div><div aria-label="toggle video from a Security Engineering Manager at Google." class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">a Security Engineering Manager at Google. </span></div><div aria-label="toggle video from I'll be your instructor for" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">I'll be your instructor for </span></div><div aria-label="toggle video from the first course of this certificate program." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">the first course of this certificate program. </span></div><div aria-label="toggle video from By starting this course," class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">By starting this course, </span></div><div aria-label="toggle video from you've already taken a big step towards" class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">you've already taken a big step towards </span></div><div aria-label="toggle video from building new skills that will help you in your career." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">building new skills that will help you in your career. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-cybersecurity-may-se"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Cybersecurity may seem daunting at first," class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Cybersecurity may seem daunting at first, </span></div><div aria-label="toggle video from but you'd be surprised by" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">but you'd be surprised by </span></div><div aria-label="toggle video from the different backgrounds many of us have." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">the different backgrounds many of us have. </span></div><div aria-label="toggle video from I worked as an intelligence analyst before I" class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">I worked as an intelligence analyst before I </span></div><div aria-label="toggle video from got my first job in the security industry," class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">got my first job in the security industry, </span></div><div aria-label="toggle video from and I'm excited to be" class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">and I'm excited to be </span></div><div aria-label="toggle video from your instructor as you begin your journey into security." class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">your instructor as you begin your journey into security. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-the-demand-for-secur"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from The demand for security professionals" class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">The demand for security professionals </span></div><div aria-label="toggle video from is growing at an incredible rate." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">is growing at an incredible rate. </span></div><div aria-label="toggle video from By 2030, the U.S. Bureau of Labor Statistics" class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">By 2030, the U.S. Bureau of Labor Statistics </span></div><div aria-label="toggle video from expects security roles to grow by more than 30%," class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">expects security roles to grow by more than 30%, </span></div><div aria-label="toggle video from which is higher than" class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">which is higher than </span></div><div aria-label="toggle video from the average growth rate for other occupations." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">the average growth rate for other occupations. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-global-access-to-the"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Global access to the internet is expanding." class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Global access to the internet is expanding. </span></div><div aria-label="toggle video from Every day, more people and" class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Every day, more people and </span></div><div aria-label="toggle video from organizations are adopting new digital technologies." class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">organizations are adopting new digital technologies. </span></div><div aria-label="toggle video from Having a diverse community of" class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Having a diverse community of </span></div><div aria-label="toggle video from security professionals with unique backgrounds," class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">security professionals with unique backgrounds, </span></div><div aria-label="toggle video from perspectives, and experiences is" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">perspectives, and experiences is </span></div><div aria-label="toggle video from essential for protecting and serving different markets." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">essential for protecting and serving different markets. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--3"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-working-in-security-"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Working in security has allowed me to" class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Working in security has allowed me to </span></div><div aria-label="toggle video from work with people from all around the world." class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">work with people from all around the world. </span></div><div aria-label="toggle video from Working with people who have" class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Working with people who have </span></div><div aria-label="toggle video from diverse backgrounds ensures that our teams get" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">diverse backgrounds ensures that our teams get </span></div><div aria-label="toggle video from to ask lots of questions" class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">to ask lots of questions </span></div><div aria-label="toggle video from and come up with more creative solutions." class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">and come up with more creative solutions. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--4"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-the-main-objective-i"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from The main objective in security is to" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">The main objective in security is to </span></div><div aria-label="toggle video from protect organizations and people." class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">protect organizations and people. </span></div><div aria-label="toggle video from This line of work allows you to" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">This line of work allows you to </span></div><div aria-label="toggle video from support and interact with people across the globe." class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">support and interact with people across the globe. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--5"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-there-are-many-openi"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from There are many openings for" class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">There are many openings for </span></div><div aria-label="toggle video from entry-level security analysts," class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">entry-level security analysts, </span></div><div aria-label="toggle video from and employers are struggling to find" class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">and employers are struggling to find </span></div><div aria-label="toggle video from enough candidates with the right expertise." class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">enough candidates with the right expertise. </span></div><div aria-label="toggle video from This program is designed to give you the knowledge and" class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">This program is designed to give you the knowledge and </span></div><div aria-label="toggle video from skills you need to start" class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">skills you need to start </span></div><div aria-label="toggle video from or advance in the security profession." class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">or advance in the security profession. </span></div><div aria-label="toggle video from No matter your current skill level," class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">No matter your current skill level, </span></div><div aria-label="toggle video from by the time you finish this certificate program," class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">by the time you finish this certificate program, </span></div><div aria-label="toggle video from you'll be prepared to find" class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">you'll be prepared to find </span></div><div aria-label="toggle video from a security-related job or expand your career in security." class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">a security-related job or expand your career in security. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--6"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-you-may-be-wondering"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from You may be wondering," class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">You may be wondering, </span></div><div aria-label="toggle video from what do security professionals actually do?" class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">what do security professionals actually do? </span></div><div aria-label="toggle video from Have you ever had to update your password" class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Have you ever had to update your password </span></div><div aria-label="toggle video from online to include a number or a special symbol?" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">online to include a number or a special symbol? </span></div><div aria-label="toggle video from If so, then you're already familiar with" class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">If so, then you're already familiar with </span></div><div aria-label="toggle video from basic security measures, like password management." class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">basic security measures, like password management. </span></div><div aria-label="toggle video from And if you've ever received a notification from" class="rc-Phrase css-ugczj4" data-cue="58" data-cue-index="57" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">And if you've ever received a notification from </span></div><div aria-label="toggle video from a service provider about stolen data or a software hack," class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">a service provider about stolen data or a software hack, </span></div><div aria-label="toggle video from then you have first-hand experience" class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">then you have first-hand experience </span></div><div aria-label="toggle video from with the impact of a security breach." class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">with the impact of a security breach. </span></div><div aria-label="toggle video from If you've ever asked yourself" class="rc-Phrase css-ugczj4" data-cue="62" data-cue-index="61" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">If you've ever asked yourself </span></div><div aria-label="toggle video from how organizations safeguard data," class="rc-Phrase css-ugczj4" data-cue="63" data-cue-index="62" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">how organizations safeguard data, </span></div><div aria-label="toggle video from then you already have" class="rc-Phrase css-ugczj4" data-cue="64" data-cue-index="63" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">then you already have </span></div><div aria-label="toggle video from two important traits that are necessary" class="rc-Phrase css-ugczj4" data-cue="65" data-cue-index="64" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">two important traits that are necessary </span></div><div aria-label="toggle video from to thrive in this industry: curiosity and excitement." class="rc-Phrase css-ugczj4" data-cue="66" data-cue-index="65" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">to thrive in this industry: curiosity and excitement. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--7"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-security-analysts-he"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Security analysts help minimize" class="rc-Phrase css-ugczj4" data-cue="67" data-cue-index="66" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Security analysts help minimize </span></div><div aria-label="toggle video from risks to organizations and people." class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">risks to organizations and people. </span></div><div aria-label="toggle video from Analysts work to proactively guard against incidents" class="rc-Phrase css-ugczj4" data-cue="69" data-cue-index="68" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Analysts work to proactively guard against incidents </span></div><div aria-label="toggle video from while continuously monitoring systems and networks." class="rc-Phrase css-ugczj4" data-cue="70" data-cue-index="69" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">while continuously monitoring systems and networks. </span></div><div aria-label="toggle video from And, if an incident does occur," class="rc-Phrase css-ugczj4" data-cue="71" data-cue-index="70" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">And, if an incident does occur, </span></div><div aria-label="toggle video from they investigate and report their findings." class="rc-Phrase css-ugczj4" data-cue="72" data-cue-index="71" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">they investigate and report their findings. </span></div><div aria-label="toggle video from They are always asking" class="rc-Phrase css-ugczj4" data-cue="73" data-cue-index="72" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">They are always asking </span></div><div aria-label="toggle video from questions and looking for solutions." class="rc-Phrase css-ugczj4" data-cue="74" data-cue-index="73" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">questions and looking for solutions. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--8"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-one-of-the-best-thin"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from One of the best things about the security industry" class="rc-Phrase css-ugczj4" data-cue="75" data-cue-index="74" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">One of the best things about the security industry </span></div><div aria-label="toggle video from is the many paths and career options it exposes you to." class="rc-Phrase css-ugczj4" data-cue="76" data-cue-index="75" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">is the many paths and career options it exposes you to. </span></div><div aria-label="toggle video from Each option involves a unique set" class="rc-Phrase css-ugczj4" data-cue="77" data-cue-index="76" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Each option involves a unique set </span></div><div aria-label="toggle video from of skills and responsibilities." class="rc-Phrase css-ugczj4" data-cue="78" data-cue-index="77" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">of skills and responsibilities. </span></div><div aria-label="toggle video from No matter what your background is," class="rc-Phrase css-ugczj4" data-cue="79" data-cue-index="78" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">No matter what your background is, </span></div><div aria-label="toggle video from you'll probably find that you" class="rc-Phrase css-ugczj4" data-cue="80" data-cue-index="79" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">you'll probably find that you </span></div><div aria-label="toggle video from already have some relevant experience." class="rc-Phrase css-ugczj4" data-cue="81" data-cue-index="80" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">already have some relevant experience. </span></div><div aria-label="toggle video from If you enjoy collaborating with and helping others," class="rc-Phrase css-ugczj4" data-cue="82" data-cue-index="81" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">If you enjoy collaborating with and helping others, </span></div><div aria-label="toggle video from solving puzzles, and are motivated by challenges," class="rc-Phrase css-ugczj4" data-cue="83" data-cue-index="82" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">solving puzzles, and are motivated by challenges, </span></div><div aria-label="toggle video from then this is the career for you." class="rc-Phrase css-ugczj4" data-cue="84" data-cue-index="83" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">then this is the career for you. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--9"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-for-example%2C-my-back"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from For example, my background as" class="rc-Phrase css-ugczj4" data-cue="85" data-cue-index="84" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">For example, my background as </span></div><div aria-label="toggle video from an intelligence analyst had" class="rc-Phrase css-ugczj4" data-cue="86" data-cue-index="85" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">an intelligence analyst had </span></div><div aria-label="toggle video from nothing to do with cybersecurity." class="rc-Phrase css-ugczj4" data-cue="87" data-cue-index="86" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">nothing to do with cybersecurity. </span></div><div aria-label="toggle video from However, having" class="rc-Phrase css-ugczj4" data-cue="88" data-cue-index="87" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">However, having </span></div><div aria-label="toggle video from strong critical thinking skills and communication skills" class="rc-Phrase css-ugczj4" data-cue="89" data-cue-index="88" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">strong critical thinking skills and communication skills </span></div><div aria-label="toggle video from provided a solid foundation for" class="rc-Phrase css-ugczj4" data-cue="90" data-cue-index="89" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">provided a solid foundation for </span></div><div aria-label="toggle video from my success when I decided to pursue a career in security." class="rc-Phrase css-ugczj4" data-cue="91" data-cue-index="90" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">my success when I decided to pursue a career in security. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--10"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-if-you%27re-not-sure-w"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from If you're not sure what direction you want to" class="rc-Phrase css-ugczj4" data-cue="92" data-cue-index="91" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">If you're not sure what direction you want to </span></div><div aria-label="toggle video from take in the security industry, that's okay." class="rc-Phrase css-ugczj4" data-cue="93" data-cue-index="92" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">take in the security industry, that's okay. </span></div><div aria-label="toggle video from This program will give you an overview of" class="rc-Phrase css-ugczj4" data-cue="94" data-cue-index="93" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">This program will give you an overview of </span></div><div aria-label="toggle video from many different types of available jobs." class="rc-Phrase css-ugczj4" data-cue="95" data-cue-index="94" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">many different types of available jobs. </span></div><div aria-label="toggle video from It will also let you explore" class="rc-Phrase css-ugczj4" data-cue="96" data-cue-index="95" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">It will also let you explore </span></div><div aria-label="toggle video from certain specialized skill sets to help" class="rc-Phrase css-ugczj4" data-cue="97" data-cue-index="96" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">certain specialized skill sets to help </span></div><div aria-label="toggle video from you figure out where you want to take your career." class="rc-Phrase css-ugczj4" data-cue="98" data-cue-index="97" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">you figure out where you want to take your career. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--11"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-the-google-career-ce"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from The Google Career Certificates are designed by" class="rc-Phrase css-ugczj4" data-cue="99" data-cue-index="98" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">The Google Career Certificates are designed by </span></div><div aria-label="toggle video from industry professionals with decades" class="rc-Phrase css-ugczj4" data-cue="100" data-cue-index="99" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">industry professionals with decades </span></div><div aria-label="toggle video from of experience here at Google." class="rc-Phrase css-ugczj4" data-cue="101" data-cue-index="100" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">of experience here at Google. </span></div><div aria-label="toggle video from You'll have a different expert from" class="rc-Phrase css-ugczj4" data-cue="102" data-cue-index="101" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">You'll have a different expert from </span></div><div aria-label="toggle video from Google guide you through each course in the certificate." class="rc-Phrase css-ugczj4" data-cue="103" data-cue-index="102" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Google guide you through each course in the certificate. </span></div><div aria-label="toggle video from We'll share our knowledge in videos," class="rc-Phrase css-ugczj4" data-cue="104" data-cue-index="103" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">We'll share our knowledge in videos, </span></div><div aria-label="toggle video from provide practice opportunities with hands-on activities," class="rc-Phrase css-ugczj4" data-cue="105" data-cue-index="104" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">provide practice opportunities with hands-on activities, </span></div><div aria-label="toggle video from and take you through real scenarios" class="rc-Phrase css-ugczj4" data-cue="106" data-cue-index="105" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">and take you through real scenarios </span></div><div aria-label="toggle video from that you might encounter on the job." class="rc-Phrase css-ugczj4" data-cue="107" data-cue-index="106" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">that you might encounter on the job. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--12"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-throughout-this-prog"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Throughout this program, you'll gain" class="rc-Phrase css-ugczj4" data-cue="108" data-cue-index="107" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Throughout this program, you'll gain </span></div><div aria-label="toggle video from hands-on practice with detecting" class="rc-Phrase css-ugczj4" data-cue="109" data-cue-index="108" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">hands-on practice with detecting </span></div><div aria-label="toggle video from and responding to attacks," class="rc-Phrase css-ugczj4" data-cue="110" data-cue-index="109" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">and responding to attacks, </span></div><div aria-label="toggle video from monitoring and protecting networks," class="rc-Phrase css-ugczj4" data-cue="111" data-cue-index="110" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">monitoring and protecting networks, </span></div><div aria-label="toggle video from investigating incidents," class="rc-Phrase css-ugczj4" data-cue="112" data-cue-index="111" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">investigating incidents, </span></div><div aria-label="toggle video from and writing code to automate tasks." class="rc-Phrase css-ugczj4" data-cue="113" data-cue-index="112" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">and writing code to automate tasks. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--13"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-the-program-is-made-"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from The program is made up of several courses that are" class="rc-Phrase css-ugczj4" data-cue="114" data-cue-index="113" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">The program is made up of several courses that are </span></div><div aria-label="toggle video from designed to help you land an entry-level job." class="rc-Phrase css-ugczj4" data-cue="115" data-cue-index="114" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">designed to help you land an entry-level job. </span></div><div aria-label="toggle video from You'll learn about topics like: core security concepts;" class="rc-Phrase css-ugczj4" data-cue="116" data-cue-index="115" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">You'll learn about topics like: core security concepts; </span></div><div aria-label="toggle video from security domains; network security;" class="rc-Phrase css-ugczj4" data-cue="117" data-cue-index="116" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">security domains; network security; </span></div><div aria-label="toggle video from computing basics, including Linux and SQL;" class="rc-Phrase css-ugczj4" data-cue="118" data-cue-index="117" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">computing basics, including Linux and SQL; </span></div><div aria-label="toggle video from along with understanding assets," class="rc-Phrase css-ugczj4" data-cue="119" data-cue-index="118" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">along with understanding assets, </span></div><div aria-label="toggle video from threats, and vulnerabilities." class="rc-Phrase css-ugczj4" data-cue="120" data-cue-index="119" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">threats, and vulnerabilities. </span></div><div aria-label="toggle video from Our goal is to help you reach" class="rc-Phrase css-ugczj4" data-cue="121" data-cue-index="120" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Our goal is to help you reach </span></div><div aria-label="toggle video from your goal of joining the security industry." class="rc-Phrase css-ugczj4" data-cue="122" data-cue-index="121" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">your goal of joining the security industry. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--14"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-you%27ll-learn-about-i"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from You'll learn about incident detection and" class="rc-Phrase css-ugczj4" data-cue="123" data-cue-index="122" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">You'll learn about incident detection and </span></div><div aria-label="toggle video from response, as well as how to use" class="rc-Phrase css-ugczj4" data-cue="124" data-cue-index="123" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">response, as well as how to use </span></div><div aria-label="toggle video from programming languages, like Python," class="rc-Phrase css-ugczj4" data-cue="125" data-cue-index="124" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">programming languages, like Python, </span></div><div aria-label="toggle video from to accomplish common security tasks." class="rc-Phrase css-ugczj4" data-cue="126" data-cue-index="125" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">to accomplish common security tasks. </span></div><div aria-label="toggle video from You'll also gain valuable job" class="rc-Phrase css-ugczj4" data-cue="127" data-cue-index="126" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">You'll also gain valuable job </span></div><div aria-label="toggle video from search strategies that will benefit you" class="rc-Phrase css-ugczj4" data-cue="128" data-cue-index="127" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">search strategies that will benefit you </span></div><div aria-label="toggle video from as you begin to find and" class="rc-Phrase css-ugczj4" data-cue="129" data-cue-index="128" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">as you begin to find and </span></div><div aria-label="toggle video from apply for jobs in the security profession." class="rc-Phrase css-ugczj4" data-cue="130" data-cue-index="129" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">apply for jobs in the security profession. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--15"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-completing-this-goog"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Completing this Google Career Certificate" class="rc-Phrase css-ugczj4" data-cue="131" data-cue-index="130" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Completing this Google Career Certificate </span></div><div aria-label="toggle video from will help you develop skills and learn how" class="rc-Phrase css-ugczj4" data-cue="132" data-cue-index="131" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">will help you develop skills and learn how </span></div><div aria-label="toggle video from to use tools to prepare you for" class="rc-Phrase css-ugczj4" data-cue="133" data-cue-index="132" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">to use tools to prepare you for </span></div><div aria-label="toggle video from a job in a fast-growing, high-demand field." class="rc-Phrase css-ugczj4" data-cue="134" data-cue-index="133" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">a job in a fast-growing, high-demand field. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--16"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-the-certificate-is-d"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from The certificate is designed to prepare you for a job in" class="rc-Phrase css-ugczj4" data-cue="135" data-cue-index="134" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">The certificate is designed to prepare you for a job in </span></div><div aria-label="toggle video from 3-6 months if you work on the certificate part-time." class="rc-Phrase css-ugczj4" data-cue="136" data-cue-index="135" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">3-6 months if you work on the certificate part-time. </span></div><div aria-label="toggle video from Once you graduate, you can" class="rc-Phrase css-ugczj4" data-cue="137" data-cue-index="136" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Once you graduate, you can </span></div><div aria-label="toggle video from connect with over 200 employers" class="rc-Phrase css-ugczj4" data-cue="138" data-cue-index="137" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">connect with over 200 employers </span></div><div aria-label="toggle video from who are interested in hiring" class="rc-Phrase css-ugczj4" data-cue="139" data-cue-index="138" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">who are interested in hiring </span></div><div aria-label="toggle video from Google Career Certificate graduates, like you." class="rc-Phrase css-ugczj4" data-cue="140" data-cue-index="139" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Google Career Certificate graduates, like you. </span></div><div aria-label="toggle video from Whether you're looking to switch jobs," class="rc-Phrase css-ugczj4" data-cue="141" data-cue-index="140" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Whether you're looking to switch jobs, </span></div><div aria-label="toggle video from start a new career," class="rc-Phrase css-ugczj4" data-cue="142" data-cue-index="141" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">start a new career, </span></div><div aria-label="toggle video from or level up your skills," class="rc-Phrase css-ugczj4" data-cue="143" data-cue-index="142" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">or level up your skills, </span></div><div aria-label="toggle video from this Google Career Certificate can" class="rc-Phrase css-ugczj4" data-cue="144" data-cue-index="143" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">this Google Career Certificate can </span></div><div aria-label="toggle video from open doors to new job opportunities." class="rc-Phrase css-ugczj4" data-cue="145" data-cue-index="144" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">open doors to new job opportunities. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--17"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-you-don%27t-need-prior"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from You don't need prior experience or knowledge in" class="rc-Phrase css-ugczj4" data-cue="146" data-cue-index="145" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">You don't need prior experience or knowledge in </span></div><div aria-label="toggle video from the security field because" class="rc-Phrase css-ugczj4" data-cue="147" data-cue-index="146" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">the security field because </span></div><div aria-label="toggle video from this certificate program will begin with the basics." class="rc-Phrase css-ugczj4" data-cue="148" data-cue-index="147" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">this certificate program will begin with the basics. </span></div><div aria-label="toggle video from I'll be by your side throughout this first course," class="rc-Phrase css-ugczj4" data-cue="149" data-cue-index="148" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">I'll be by your side throughout this first course, </span></div><div aria-label="toggle video from making sure that you're learning" class="rc-Phrase css-ugczj4" data-cue="150" data-cue-index="149" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">making sure that you're learning </span></div><div aria-label="toggle video from the foundational knowledge needed" class="rc-Phrase css-ugczj4" data-cue="151" data-cue-index="150" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">the foundational knowledge needed </span></div><div aria-label="toggle video from to succeed in the field." class="rc-Phrase css-ugczj4" data-cue="152" data-cue-index="151" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">to succeed in the field. </span></div><div aria-label="toggle video from This program is also flexible." class="rc-Phrase css-ugczj4" data-cue="153" data-cue-index="152" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">This program is also flexible. </span></div><div aria-label="toggle video from You can complete all of" class="rc-Phrase css-ugczj4" data-cue="154" data-cue-index="153" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">You can complete all of </span></div><div aria-label="toggle video from the courses in this certificate on" class="rc-Phrase css-ugczj4" data-cue="155" data-cue-index="154" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">the courses in this certificate on </span></div><div aria-label="toggle video from your own terms and at your own pace, online." class="rc-Phrase css-ugczj4" data-cue="156" data-cue-index="155" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">your own terms and at your own pace, online. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--18"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-we%27ve-gathered-some-"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from We've gathered some amazing instructors to support" class="rc-Phrase css-ugczj4" data-cue="157" data-cue-index="156" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">We've gathered some amazing instructors to support </span></div><div aria-label="toggle video from you on your journey, and" class="rc-Phrase css-ugczj4" data-cue="158" data-cue-index="157" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">you on your journey, and </span></div><div aria-label="toggle video from they'd like to introduce themselves now:" class="rc-Phrase css-ugczj4" data-cue="159" data-cue-index="158" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">they'd like to introduce themselves now: </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--19"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-hi%21-my-name-is-ashle"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Hi! My name is Ashley," class="rc-Phrase css-ugczj4" data-cue="160" data-cue-index="159" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Hi! My name is Ashley, </span></div><div aria-label="toggle video from and I'm a Customer Engineering Enablement" class="rc-Phrase css-ugczj4" data-cue="161" data-cue-index="160" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">and I'm a Customer Engineering Enablement </span></div><div aria-label="toggle video from Lead for Security Operations Sales at Google." class="rc-Phrase css-ugczj4" data-cue="162" data-cue-index="161" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Lead for Security Operations Sales at Google. </span></div><div aria-label="toggle video from I'll take you through security domains," class="rc-Phrase css-ugczj4" data-cue="163" data-cue-index="162" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">I'll take you through security domains, </span></div><div aria-label="toggle video from frameworks and controls," class="rc-Phrase css-ugczj4" data-cue="164" data-cue-index="163" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">frameworks and controls, </span></div><div aria-label="toggle video from as well as common security threats," class="rc-Phrase css-ugczj4" data-cue="165" data-cue-index="164" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">as well as common security threats, </span></div><div aria-label="toggle video from risks, and vulnerabilities." class="rc-Phrase css-ugczj4" data-cue="166" data-cue-index="165" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">risks, and vulnerabilities. </span></div><div aria-label="toggle video from You'll also be introduced to" class="rc-Phrase css-ugczj4" data-cue="167" data-cue-index="166" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">You'll also be introduced to </span></div><div aria-label="toggle video from common tools used by security analysts." class="rc-Phrase css-ugczj4" data-cue="168" data-cue-index="167" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">common tools used by security analysts. </span></div><div aria-label="toggle video from I can't wait to get started!" class="rc-Phrase css-ugczj4" data-cue="169" data-cue-index="168" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">I can't wait to get started! </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--20"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-hi-there%21-my-name-is"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Hi there! My name is Chris," class="rc-Phrase css-ugczj4" data-cue="170" data-cue-index="169" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Hi there! My name is Chris, </span></div><div aria-label="toggle video from and I'm the Chief Information Security Officer" class="rc-Phrase css-ugczj4" data-cue="171" data-cue-index="170" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">and I'm the Chief Information Security Officer </span></div><div aria-label="toggle video from for Google Fiber." class="rc-Phrase css-ugczj4" data-cue="172" data-cue-index="171" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">for Google Fiber. </span></div><div aria-label="toggle video from I'm excited to talk to" class="rc-Phrase css-ugczj4" data-cue="173" data-cue-index="172" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">I'm excited to talk to </span></div><div aria-label="toggle video from you about the structure of a network," class="rc-Phrase css-ugczj4" data-cue="174" data-cue-index="173" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">you about the structure of a network, </span></div><div aria-label="toggle video from network protocols, common network attacks," class="rc-Phrase css-ugczj4" data-cue="175" data-cue-index="174" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">network protocols, common network attacks, </span></div><div aria-label="toggle video from and how to secure a network." class="rc-Phrase css-ugczj4" data-cue="176" data-cue-index="175" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">and how to secure a network. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--21"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-hi-there%21-my-name-is-1"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Hi there! My name is Kim," class="rc-Phrase css-ugczj4" data-cue="177" data-cue-index="176" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Hi there! My name is Kim, </span></div><div aria-label="toggle video from and I'm a Technical Program Manager at Google." class="rc-Phrase css-ugczj4" data-cue="178" data-cue-index="177" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">and I'm a Technical Program Manager at Google. </span></div><div aria-label="toggle video from I will guide you through foundational computing skills" class="rc-Phrase css-ugczj4" data-cue="179" data-cue-index="178" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">I will guide you through foundational computing skills </span></div><div aria-label="toggle video from that support the work of a security analyst." class="rc-Phrase css-ugczj4" data-cue="180" data-cue-index="179" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">that support the work of a security analyst. </span></div><div aria-label="toggle video from We'll also learn about operating systems," class="rc-Phrase css-ugczj4" data-cue="181" data-cue-index="180" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">We'll also learn about operating systems, </span></div><div aria-label="toggle video from the Linux command line, and SQL." class="rc-Phrase css-ugczj4" data-cue="182" data-cue-index="181" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">the Linux command line, and SQL. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--22"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-hi%21-my-name-is-da%27qu"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Hi! My name is Da'Queshia," class="rc-Phrase css-ugczj4" data-cue="183" data-cue-index="182" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Hi! My name is Da'Queshia, </span></div><div aria-label="toggle video from and I'm a Security Engineer at Google." class="rc-Phrase css-ugczj4" data-cue="184" data-cue-index="183" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">and I'm a Security Engineer at Google. </span></div><div aria-label="toggle video from Together we'll explore protecting" class="rc-Phrase css-ugczj4" data-cue="185" data-cue-index="184" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Together we'll explore protecting </span></div><div aria-label="toggle video from organizational assets through a variety of" class="rc-Phrase css-ugczj4" data-cue="186" data-cue-index="185" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">organizational assets through a variety of </span></div><div aria-label="toggle video from security controls and develop" class="rc-Phrase css-ugczj4" data-cue="187" data-cue-index="186" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">security controls and develop </span></div><div aria-label="toggle video from a deeper understanding of risks and vulnerabilities." class="rc-Phrase css-ugczj4" data-cue="188" data-cue-index="187" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">a deeper understanding of risks and vulnerabilities. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--23"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-hi%21-my-name-is-dave%2C"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Hi! My name is Dave," class="rc-Phrase css-ugczj4" data-cue="189" data-cue-index="188" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Hi! My name is Dave, </span></div><div aria-label="toggle video from and I'm a Principal Security Strategist at Google." class="rc-Phrase css-ugczj4" data-cue="190" data-cue-index="189" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">and I'm a Principal Security Strategist at Google. </span></div><div aria-label="toggle video from In our time together, we'll learn about" class="rc-Phrase css-ugczj4" data-cue="191" data-cue-index="190" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">In our time together, we'll learn about </span></div><div aria-label="toggle video from detecting and responding to security incidents." class="rc-Phrase css-ugczj4" data-cue="192" data-cue-index="191" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">detecting and responding to security incidents. </span></div><div aria-label="toggle video from You'll also have the chance to monitor and analyze" class="rc-Phrase css-ugczj4" data-cue="193" data-cue-index="192" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">You'll also have the chance to monitor and analyze </span></div><div aria-label="toggle video from network activity using powerful security tools." class="rc-Phrase css-ugczj4" data-cue="194" data-cue-index="193" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">network activity using powerful security tools. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--24"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-hello%21-i%27m-angel%2C-an"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Hello! I'm Angel," class="rc-Phrase css-ugczj4" data-cue="195" data-cue-index="194" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Hello! I'm Angel, </span></div><div aria-label="toggle video from and I'm a Security Engineer at Google." class="rc-Phrase css-ugczj4" data-cue="196" data-cue-index="195" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">and I'm a Security Engineer at Google. </span></div><div aria-label="toggle video from We'll explore foundational Python programming concepts" class="rc-Phrase css-ugczj4" data-cue="197" data-cue-index="196" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">We'll explore foundational Python programming concepts </span></div><div aria-label="toggle video from to help you automate common security tasks." class="rc-Phrase css-ugczj4" data-cue="198" data-cue-index="197" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">to help you automate common security tasks. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--25"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-hello%21-i%27m-dion.-i%27m"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Hello! I'm Dion." class="rc-Phrase css-ugczj4" data-cue="199" data-cue-index="198" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Hello! I'm Dion. </span></div><div aria-label="toggle video from I'm a Program Manager at Google." class="rc-Phrase css-ugczj4" data-cue="200" data-cue-index="199" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">I'm a Program Manager at Google. </span></div><div aria-label="toggle video from I'm your instructor for" class="rc-Phrase css-ugczj4" data-cue="201" data-cue-index="200" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">I'm your instructor for </span></div><div aria-label="toggle video from the first portion of the final course of the program." class="rc-Phrase css-ugczj4" data-cue="202" data-cue-index="201" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">the first portion of the final course of the program. </span></div><div aria-label="toggle video from There, we'll discuss how to escalate" class="rc-Phrase css-ugczj4" data-cue="203" data-cue-index="202" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">There, we'll discuss how to escalate </span></div><div aria-label="toggle video from incidents and communicate with stakeholders." class="rc-Phrase css-ugczj4" data-cue="204" data-cue-index="203" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">incidents and communicate with stakeholders. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--26"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-and-my-name-is-emily"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from And my name is Emily. I'm a Program Manager at Google." class="rc-Phrase css-ugczj4" data-cue="205" data-cue-index="204" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">And my name is Emily. I'm a Program Manager at Google. </span></div><div aria-label="toggle video from I'll guide you through the final portion of" class="rc-Phrase css-ugczj4" data-cue="206" data-cue-index="205" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">I'll guide you through the final portion of </span></div><div aria-label="toggle video from the program and share ways that you can" class="rc-Phrase css-ugczj4" data-cue="207" data-cue-index="206" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">the program and share ways that you can </span></div><div aria-label="toggle video from engage with the security community" class="rc-Phrase css-ugczj4" data-cue="208" data-cue-index="207" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">engage with the security community </span></div><div aria-label="toggle video from and prepare for your upcoming job search." class="rc-Phrase css-ugczj4" data-cue="209" data-cue-index="208" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">and prepare for your upcoming job search. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--27"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-and%2C-as-you-already-"><div aria-label="toggle video from And, as you already know," class="rc-Phrase css-ugczj4" data-cue="210" data-cue-index="209" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">And, as you already know, </span></div><div aria-label="toggle video from I'll guide you through the first course of this program." class="rc-Phrase css-ugczj4" data-cue="211" data-cue-index="210" role="button"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">I'll guide you through the first course of this program. </span></div><div aria-label="toggle video from This is such a great time to" class="rc-Phrase css-ugczj4" data-cue="212" data-cue-index="211" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">This is such a great time to </span></div><div aria-label="toggle video from grow your career in the field of security." class="rc-Phrase css-ugczj4" data-cue="213" data-cue-index="212" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">grow your career in the field of security. </span></div><div aria-label="toggle video from Sound exciting? Let's get started!" class="rc-Phrase css-ugczj4" data-cue="214" data-cue-index="213" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Sound exciting? Let's get started! </span></div></div>

# Google Cybersecurity Certificate overview

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Why are skills in cybersecurity in such high demand? The world is undergoing a digital transformation. Every day, global access to the internet is expanding, introducing more devices, more applications, and an even larger amount of data to the World Wide Web. As a result, threats, risks, and vulnerabilities are expanding and causing a significant amount of harm to organizations and people. Cybersecurity professionals are in high demand to help keep organizations, people, and data safe. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Throughout the program, you will have multiple opportunities to develop your cybersecurity knowledge and skills. You will explore concepts and scenarios to learn what an entry-level cybersecurity analyst must know and be able to do to thrive in the cybersecurity profession. </span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Google Cybersecurity Certificate courses</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The Google Cybersecurity Certificate has eight courses that focus and build upon core concepts and skills related to the daily work of cybersecurity professionals, including foundational cybersecurity models and frameworks that are used to mitigate risk; protecting networks and data; using programming to automate tasks; identifying and responding to security incidents; and communicating and collaborating with stakeholders. Additionally, you will apply what you’ve learned in each course by completing portfolio projects that can be used to showcase your understanding of essential cybersecurity concepts to potential employers. The courses of the program are as follows: </span>

1. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[**Foundations of Cybersecurity**](https://www.coursera.org/learn/foundations-of-cybersecurity/home/week/1)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">*(current course)* </span>
2. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[**Play It Safe: Manage Security Risks**](https://www.coursera.org/learn/manage-security-risks/home/week/1)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span>
3. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[**Connect and Protect: Networks and Network Security**](https://www.coursera.org/learn/networks-and-network-security/home/week/1)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span>
4. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[**Tools of the Trade: Linux and SQL**](https://www.coursera.org/learn/linux-and-sql/home/week/1)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span>
5. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[**Assets, Threats, and Vulnerabilities**](https://www.coursera.org/learn/assets-threats-and-vulnerabilities/home/week/1)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span>
6. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[**Sound the Alarm: Detection and Response**](https://www.coursera.org/learn/detection-and-response/home/week/1)</span>
7. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[**Automate Cybersecurity Tasks with Python**](https://www.coursera.org/learn/automate-cybersecurity-tasks-with-python/home/week/1)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span>
8. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[**Put It to Work: Prepare for Cybersecurity Jobs**](https://www.coursera.org/learn/prepare-for-cybersecurity-jobs/home/week/1)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span>

<div id="bkmrk-" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![Eight icons show courses sequentially from left to right](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/wUDPfuuARCehSWG8hh8yGQ_391e3fca589640ff865568380c1165f1_S33G003-S33G010.png?expiry=1685577600000&hmac=ohQS_GQORT5Oe19dB2Hm3xwyPfhCOjjze4WMaKXUYNo)</figure></div>## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Benefits for job seekers</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">After completing all eight courses, Google Cybersecurity Certificate graduates have access to job search resources, courtesy of Google. You’ll have the opportunity to:</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Build your resume, participate in mock interviews, and receive job search tips through Big Interview, a job-training platform that’s free for program graduates. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Improve your interview technique with Interview Warmup, a tool built by Google with certificate graduates in mind. Access cybersecurity-specific practice questions, transcripts of your responses, and automatic insights that help you grow your skills and confidence.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Access thousands of job postings and free one-on-one career coaching with Career Circle. (You must be eligible to work in the U.S. to join.)</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Claim your Google Cybersecurity Certificate badge, and share your achievement on LinkedIn® professional networking services to stand out among other candidates to potential employers. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Prepare for the CompTIA Security+ exam, the industry-leading certification for cybersecurity roles. You’ll earn a dual credential when you complete both the Google Cybersecurity Certificate and the CompTIA Security+ exam.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Congratulations on taking this first step to build your skills for a career in cybersecurity. Enjoy the journey!</span>

# Course 1 overview

<div id="bkmrk-" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![Image update](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/0dfZD0UNSmigQ8zVJlpwLA_7398e20a4b264425a08fcaed39dd12f1_x-cert-image_Welcome-banner-C1.png?expiry=1685577600000&hmac=JMAaMU65tZBiMgBnYqGN_u8V-GvWpjzEAmUVZ2xAnkk)</figure></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Cybersecurity Certificate. You’ve begun an exciting journey!</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">In this course, you will learn the primary job responsibilities and core skills of those who work in the field of cybersecurity. You will explore the eight Certified Information Systems Security Professional (CISSP) security domains, various security frameworks and controls, as well as a foundational security model called the confidentiality, integrity, and availability (CIA) triad. You will also be introduced to some common tools used by security analysts that help protect organizations and people alike.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Certificate program progress</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The Google Cybersecurity Certificate program has eight courses. </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Foundations of Cybersecurity**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is the first course.</span>

<div id="bkmrk--1" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![Eight icons show courses sequentially from left to right with course 1 highlighted.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/6XSJVYkRTsirLaWjoKko0A_90d89c72d8714414a6e45aa4b219dff1_S33G003.png?expiry=1685577600000&hmac=Q7M3ClshAcRgUkmMlwG2n5CfDF-9PAKoKyQXPDs2I-E)</figure></div>1. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[**Foundations of Cybersecurity**](https://www.coursera.org/learn/foundations-of-cybersecurity/home/week/1)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">— </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">*(current course)* </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Explore the cybersecurity profession, including significant events that led to the development of the cybersecurity field and its continued importance to organizational operations. Learn about entry-level cybersecurity roles and responsibilities. </span>
2. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[**Play It Safe: Manage Security Risks**](https://www.coursera.org/learn/manage-security-risks/home/week/1)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">— Identify how cybersecurity professionals use frameworks and controls to protect business operations, and explore common cybersecurity tools.</span>
3. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[**Connect and Protect: Networks and Network Security**](https://www.coursera.org/learn/networks-and-network-security/home/week/1)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">— Gain an understanding of network-level vulnerabilities and how to secure networks.</span>
4. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[**Tools of the Trade: Linux and SQL**](https://www.coursera.org/learn/linux-and-sql/home/week/1)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">— Explore foundational computing skills, including communicating with the Linux operating system through the command line and querying databases with SQL.</span>
5. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[**Assets, Threats, and Vulnerabilities**](https://www.coursera.org/learn/assets-threats-and-vulnerabilities/home/week/1)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">— Learn about the importance of security controls and developing a threat actor mindset to protect and defend an organization’s assets from various threats, risks, and vulnerabilities.</span>
6. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[**Sound the Alarm: Detection and Response**](https://www.coursera.org/learn/detection-and-response/home/week/1)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">— Understand the incident response lifecycle and practice using tools to detect and respond to cybersecurity incidents.</span>
7. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[**Automate Cybersecurity Tasks with Python**](https://www.coursera.org/learn/automate-cybersecurity-tasks-with-python/home/week/1)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">— Explore the Python programming language and write code to automate cybersecurity tasks.</span>
8. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[**Put It to Work: Prepare for Cybersecurity Jobs**](https://www.coursera.org/learn/prepare-for-cybersecurity-jobs/home/week/1)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">— Learn about incident classification, escalation, and ways to communicate with stakeholders. This course closes out the program with tips on how to engage with the cybersecurity community and prepare for your job search.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Course 1 content</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Each course of this certificate program is broken into weeks. You can complete courses at your own pace, but the weekly breakdowns are designed to help you finish the entire Google Cybersecurity Certificate in about six months.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">What’s to come? Here’s a quick overview of the skills you’ll learn in each week of this course.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Week 1: Welcome to the exciting world of cybersecurity**</span>

<div id="bkmrk--2" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![Five icons show the course followed by the four weeks sequentially from left to right with week 1 highlighted.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/Ke_F7c8ST46zqT3cWlESjg_0aeac6544d7c4b028c442b526ad7a5f1_FoundationsCyber-R-001-1.png?expiry=1685577600000&hmac=yGfkABvNG-nAboEKzv4cqedMi_ecqmaX-xQcqXUl63o)</figure></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Begin your journey into cybersecurity! You'll explore the cybersecurity field, and learn about the job responsibilities of cybersecurity professionals.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Week 2: The evolution of cybersecurity**</span>

<div id="bkmrk--3" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![Five icons show the course followed by the four weeks sequentially from left to right with week 2 highlighted.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/QlZPMeJlTWG5bPoiB65HXQ_ab434e3472c14816ab45b48e82a231f1_FoundationsCyber-R-001-2.png?expiry=1685577600000&hmac=Nlxf15HFQ8YFUiw8OkHMHyuijyudlZzrQ40C2otJBnU)</figure></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">You will explore how cybersecurity threats have appeared and evolved alongside the adoption of computers. You will also understand how past and present cyber attacks have influenced the development of the security field. In addition, you'll get an overview of the eight security domains.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Week 3: Protect against threats, risks, and vulnerabilities**</span>

<div id="bkmrk--4" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![Five icons show the course followed by the four weeks sequentially from left to right with week 3 highlighted.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/_UKSkqdPTb-Xd9B8smE8dg_d4999b46ab0344cdb1edbdc83490aef1_FoundationsCyber-R-001-3.png?expiry=1685577600000&hmac=mQtDbuLEpPLwPDXtTrfOTaXZClKYDTxzx2-K3cgcc_I)</figure></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">You will learn about security frameworks and controls, which are used to mitigate organizational risk. You'll cover principles of the CIA triad and various National Institute of Standards and Technology (NIST) frameworks. In addition, you'll explore security ethics.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Week 4: Cybersecurity tools and programming languages**</span>

<div id="bkmrk--5" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![Five icons show the course followed by the four weeks sequentially from left to right with week 4 highlighted.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/mPui2kPMTOet2uSC5Y8mXA_98ec1eeec8a64f989970da26500232f1_FoundationsCyber-R-001-4.png?expiry=1685577600000&hmac=r6jvcRBEUEEfELyVe-AKtbKaobg3i3PjqAR1gIBZUiE)</figure></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">You’ll discover common tools used by cybersecurity analysts to identify and eliminate risk. You'll learn about security information and event management (SIEM) tools, network protocol analyzers, and programming languages such as Python and SQL.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">What to expect</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Each course offers many types of learning opportunities:</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Videos** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">led by Google instructors teach new concepts, introduce the use of relevant tools, offer career support, and provide inspirational personal stories. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Readings** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">build on the topics discussed in the videos, introduce related concepts, share useful resources, and describe case studies.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Discussion prompts** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">explore course topics for better understanding and allow you to chat and exchange ideas with other learners in the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[discussion forums](https://www.coursera.org/learn/foundations-of-cybersecurity/discussions)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Self-review activities** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">and</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> **labs** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">give you hands-on practice in applying the skills you are learning and allow you to assess your own work by comparing it to a completed example.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Interactive plug-ins** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">encourage you to practice specific tasks and help you integrate knowledge you have gained in the course.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**In-video quizzes**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> help you check your comprehension as you progress through each video.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Practice quizzes** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">allow you to check your understanding of key concepts and provide valuable feedback.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Graded quizzes** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">demonstrate your understanding of the main concepts of a course. You must score 80% or higher on each graded quiz to obtain a certificate, and you can take a graded quiz multiple times to achieve a passing score.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Tips for success</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">It is strongly recommended that you go through the items in each lesson in the order they appear because new information and concepts build on previous knowledge.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Participate in all learning opportunities to gain as much knowledge and experience as possible.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">If something is confusing, don’t hesitate to replay a video, review a reading, or repeat a self-review activity.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Use the additional resources that are referenced in this course. They are designed to support your learning. You can find all of these resources in the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Resources](https://www.coursera.org/learn/foundations-of-cybersecurity/resources/L1aML)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> tab.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">When you encounter useful links in this course, bookmark them so you can refer to the information later for study or review.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Understand and follow the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Coursera Code of Conduct](https://www.coursera.support/s/article/208280036-Coursera-Code-of-Conduct)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> to ensure that the learning community remains a welcoming, friendly, and supportive place for all members.</span>

# Welcome to week 1

<div aria-labelledby="cds-react-aria-176-tab-TRANSCRIPT" class="css-1mzgzx5" id="bkmrk-hi-again%21-now-that-y" role="tabpanel" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; padding: 16px 0px 0px; position: sticky; top: 292px; display: flex; flex-wrap: nowrap; justify-content: space-around; min-height: calc(100vh + 308px); color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="cds-1 css-xjg7i cds-2 cds-19" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 560.8px; display: flex; flex-wrap: wrap; justify-content: center; gap: 0px; padding-top: 16px;"><div class="cds-1 css-arowdh cds-3 cds-grid-item cds-48 cds-73" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; flex-grow: 0; max-width: 700px; flex-basis: 100%;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="rc-TranscriptHighlighter css-79elbk" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative;"><div class="rc-Transcript css-9li235" data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="interactive_transcript" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; padding: 0px; line-height: 26px; position: relative;"><div class="cds-1 css-xl5mb3 cds-2" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 560.8px; display: flex; flex-wrap: wrap;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from Hi again! Now that you have" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Hi again! Now that you have </span></div><div aria-label="toggle video from some idea of what to expect from the program as a whole," class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">some idea of what to expect from the program as a whole, </span></div><div aria-label="toggle video from let's discuss more about" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">let's discuss more about </span></div><div aria-label="toggle video from what you'll learn in this course." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">what you'll learn in this course.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 560.8px; display: flex; flex-wrap: wrap;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-5" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 16px 0px 0px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting-" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at ::11 and follow transcript</span></span>0:11</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from This course will introduce you to" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">This course will introduce you to </span></div><div aria-label="toggle video from the world of security and how it's used" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">the world of security and how it's used </span></div><div aria-label="toggle video from to protect business operations, users, and devices, so" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">to protect business operations, users, and devices, so </span></div><div aria-label="toggle video from you can contribute to the creation" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">you can contribute to the creation </span></div><div aria-label="toggle video from of a safer internet for all." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">of a safer internet for all.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 560.8px; display: flex; flex-wrap: wrap;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-10" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 16px 0px 0px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting--1" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at ::24 and follow transcript</span></span>0:24</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from In this section, we'll" class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">In this section, we'll </span></div><div aria-label="toggle video from cover foundational security concepts." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">cover foundational security concepts. </span></div><div aria-label="toggle video from First, we'll define security." class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">First, we'll define security. </span></div><div aria-label="toggle video from Then, we'll explore" class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Then, we'll explore </span></div><div aria-label="toggle video from common job responsibilities of security analysts." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">common job responsibilities of security analysts. </span></div><div aria-label="toggle video from Building on that, we'll cover" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Building on that, we'll cover </span></div><div aria-label="toggle video from core skills a security analyst may have." class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">core skills a security analyst may have. </span></div><div aria-label="toggle video from Finally, we'll discuss the value of" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Finally, we'll discuss the value of </span></div><div aria-label="toggle video from security for protecting organizations and people." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">security for protecting organizations and people.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 560.8px; display: flex; flex-wrap: wrap;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-19" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 16px 0px 0px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting--2" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at ::48 and follow transcript</span></span>0:48</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from Later on, we'll cover eight security domains." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Later on, we'll cover eight security domains. </span></div><div aria-label="toggle video from Then, we'll cover common security frameworks and controls." class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Then, we'll cover common security frameworks and controls. </span></div><div aria-label="toggle video from Finally, we'll wrap up" class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Finally, we'll wrap up </span></div><div aria-label="toggle video from the course by discussing common tools" class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">the course by discussing common tools </span></div><div aria-label="toggle video from and programming languages that" class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">and programming languages that </span></div><div aria-label="toggle video from entry-level security analysts may use." class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">entry-level security analysts may use.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 560.8px; display: flex; flex-wrap: wrap;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-25" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 16px 0px 0px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting--3" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at :1:6 and follow transcript</span></span>1:06</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from Coming up, we'll go over some resources that" class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Coming up, we'll go over some resources that </span></div><div aria-label="toggle video from will allow you to get the most out of this program." class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">will allow you to get the most out of this program. </span></div><div aria-label="toggle video from I'm really excited for you to start" class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">I'm really excited for you to start this journey--let's begin!</span></div></div></div></div></div></div></div></div><div class="cds-1 css-hcqebr cds-3 cds-grid-item cds-48 cds-66" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; flex-grow: 0; max-width: 700px; flex-basis: 100%; margin-block: unset;"><div class="cds-220 cds-formControl-root css-1834zxd cds-223" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; border: 0px; margin: 0px; display: inline-flex; padding: 0px; position: relative; min-width: 0px; flex-direction: column; vertical-align: top; width: 560.8px; max-width: 100%;"><div class="css-1whdyhf" data-testid="visually-hidden" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute !important; border: 0px !important; width: 1px !important; height: 1px !important; padding: 0px !important; margin: -1px !important; overflow: hidden !important; clip: rect(0px, 0px, 0px, 0px) !important; white-space: nowrap !important; overflow-wrap: normal !important;">(Required)</div><label class="cds-224 cds-formLabel-root cds-formLabel-onLight css-v56iez cds-229 cds-230" for="cds-react-aria-177" id="bkmrk-" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 5px; display: inline-block; font-weight: 600; color: rgb(31, 31, 31); padding: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; line-height: 1.5rem; letter-spacing: -0.1px; position: relative; transform: initial;"></label><div class="cds-258 cds-243 cds-input-root cds-input-onLight cds-select-field-root css-14fuxgf cds-259" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgba(0, 0, 0, 0.87); cursor: text; display: inline-flex; position: relative; font-size: 1rem; align-items: center; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.1876em; letter-spacing: 0px; border-radius: 4px; background: rgb(255, 255, 255); align-self: stretch; margin-top: 16px;"><div aria-haspopup="listbox" aria-labelledby="cds-react-aria-177-label cds-react-aria-177-value" class="cds-232 cds-233 cds-select-select cds-236 cds-269 cds-253 cds-input-input" id="bkmrk-english" role="button" style="box-sizing: content-box; -webkit-font-smoothing: antialiased; font-style: inherit; font-variant: inherit; font-weight: 400; font-stretch: inherit; font-size: 1rem; line-height: 1.5rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; color: rgb(31, 31, 31); width: 504.8px; border: 0px; height: 24px; margin: 0px; display: block; padding: 12px 44px 12px 12px; min-width: 16px; background: none; animation-name: mui-auto-fill-cancel; letter-spacing: 0px; animation-duration: 10ms; -webkit-tap-highlight-color: transparent; cursor: pointer; user-select: none; border-radius: 0px; appearance: none; overflow: hidden; min-height: 1.1876em; white-space: nowrap; text-overflow: ellipsis; touch-action: manipulation; position: relative;" tabindex="0">English</div><svg aria-hidden="true" class="cds-238 cds-select-icon css-0" data-testid="chevron-down-icon" fill="none" focusable="false" height="20" id="bkmrk--2" viewbox="0 0 20 20" width="20"></svg><fieldset aria-hidden="true" class="cds-280 cds-252 cds-input-notchedOutline" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; border: 1px solid rgb(99, 99, 99); margin: 0px; padding: 0px 8px; min-width: 0px; inset: -5px 0px 0px; overflow: hidden; position: absolute; border-radius: inherit; pointer-events: none;"><legend class="cds-281" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); display: block; max-width: 100%; white-space: normal; margin-bottom: 20px; font-size: 21px; padding: 0px; border-width: 0px 0px 1px; border-image: initial; width: 0.01px; line-height: 11px; text-align: left; transition: width 150ms cubic-bezier(0, 0, 0.2, 1) 0ms; border-color: initial initial rgb(229, 229, 229) initial; border-style: initial initial solid initial;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">​</span></legend></fieldset></div></div><span class="rc-VolunteerLink css-7qr5vk" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; line-height: 20px; padding: 8px 0px 0px; display: block;"><button class="cds-134 cds-105 cds-107 volunteer-link css-1am3j7n cds-116 cds-button-disableElevation" data-track="true" data-track-action="[object Object]" data-track-app="open_course_home" data-track-component="lecture_translation_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(0, 86, 210); font-style: inherit; font-variant: inherit; font-weight: bold; font-stretch: inherit; font-size: 0.875rem; line-height: 1.25rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px; text-transform: none; cursor: pointer; border: 0px; display: inline-flex; outline: 0px; padding: 8px; position: relative; align-items: center; user-select: none; border-radius: 4px; vertical-align: middle; justify-content: center; text-decoration: none; background-color: transparent; -webkit-tap-highlight-color: transparent; min-width: unset; transition: none 0s ease 0s; box-shadow: none; text-align: center; max-width: 320px; letter-spacing: -0.1px;" tabindex="0" type="button"><span class="cds-106 cds-button-label" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 105.475px; display: inherit; align-items: inherit; justify-content: inherit; text-transform: none;">Help Us Translate</span></button></span></div></div></div>

# Helpful resources and tips

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">(They made me type my name and some reason to commit, par the usual, I am your god, and i suffer for you, i am your lord and saviour NaruZKurai)  
  
As a learner, you can choose to complete one or multiple courses in this program. However, to obtain the Google Cybersecurity Certificate, you must complete all the courses. This reading describes what is required to obtain a certificate and best practices for you to have a good learning experience on Coursera.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Course completion to obtain a certificate</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">To submit graded assignments and be eligible to receive a Google Cybersecurity Certificate, you must:</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Pay the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[course certificate fee](https://www.coursera.support/s/article/209818963-Payments-on-Coursera?language=en_US)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> or apply and be approved for a Coursera </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[scholarship](https://www.coursera.support/s/article/209819033-Apply-for-Financial-Aid-or-a-Scholarship?language=en_US)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Pass all graded quizzes in the eight courses with a score of at least 80%. Each graded quiz in a course is part of a cumulative grade for that course. </span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Healthy habits for course completion</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Here is a list of best practices that will help you complete the courses in the program in a timely manner: </span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Plan your time:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Setting regular study times and following them each week can help you make learning a part of your routine. Use a calendar or timetable to create a schedule, and list what you plan to do each day in order to set achievable goals. Find a space that allows you to focus when you watch the videos, review the readings, and complete the activities.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Work at your own pace:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Everyone learns differently, so this program has been designed to let you work at your own pace. Although your personalized deadlines start when you enroll, feel free to move through the program at the speed that works best for you. There is no penalty for late assignments; to earn your certificate, all you have to do is complete all of the work. You can extend your deadlines at any time by going to</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> **Overview**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> in the navigation panel and selecting </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Switch Sessions**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">. If you have already missed previous deadlines, select </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Reset my deadlines**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> instead.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Be curious:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> If you find an idea that gets you excited, act on it! Ask questions, search for more details online, explore the links that interest you, and take notes on your discoveries. The steps you take to support your learning along the way will advance your knowledge, create more opportunities in this high-growth field, and help you qualify for jobs. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Take notes:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Notes will help you remember important information in the future, especially as you’re preparing to enter a new job field. In addition, taking notes is an effective way to make connections between topics and gain a better understanding of those topics.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Review exemplars:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Exemplars are completed assignments that fully meet an activity's criteria. Many activities in this program have exemplars for you to validate your work or check for errors. Although there are often many ways to complete an assignment, exemplars offer guidance and inspiration about how to complete the activity. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Chat (responsibly) with other learners:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">If you have a question, chances are, you’re not alone. Use the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[discussion forums](https://www.coursera.org/learn/foundations-of-cybersecurity/discussions)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> to ask for help from other learners taking this program. You can also visit Coursera’s </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Global Online Community](https://coursera.community/)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">. Other important things to know while learning with others can be found in the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Coursera Honor Code](https://learner.coursera.help/hc/en-us/articles/209818863-Coursera-Honor-Code)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> and </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Code of Conduct](https://learner.coursera.help/hc/en-us/articles/208280036-Coursera-Code-of-Conduct)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Update your profile:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Consider </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[updating your profile](https://www.coursera.org/account/profile)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> on Coursera with your photo, career goals, and more. When other learners find you in the discussion forums, they can click on your name to access your profile and get to know you better.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Documents, spreadsheets, presentations, and labs for course activities</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">To complete certain activities in the program, you will need to use digital documents, spreadsheets, presentations, and/or labs. Security professionals use these software tools to collaborate within their teams and organizations. If you need more information about using a particular tool, refer to these resources:</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Microsoft Word: Help and learning](https://support.microsoft.com/en-us/word)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: Microsoft Support page for Word</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Google Docs](https://support.google.com/docs/topic/9046002?hl=en&ref_topic=1382883)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: Help Center page for Google Docs</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Microsoft Excel: Help and learning](https://support.microsoft.com/en-us/excel)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: Microsoft Support page for Excel</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Google Sheets](https://support.google.com/docs/topic/9054603?hl=en&ref_topic=1382883)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: Help Center page for Google Sheets</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Microsoft PowerPoint: Help and learning](https://support.microsoft.com/en-us/powerpoint)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: Microsoft Support page for PowerPoint</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[How to use Google Slides](https://support.google.com/docs/answer/2763168?hl=en&co=GENIE.Platform%3DDesktop)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: Help Center page for Google Slides </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Common problems with labs](https://support.google.com/qwiklabs/answer/9133560?hl=en&ref_topic=9134804)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: Troubleshooting help for Qwiklabs activities</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Weekly, course, and certificate glossaries</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">This program covers a lot of terms and concepts, some of which you may already know and some of which may be unfamiliar to you. To review terms and help you prepare for graded quizzes, refer to the following glossaries:</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Weekly glossaries**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: At the end of each week’s content, you can review a glossary of terms from that week. Each week’s glossary builds upon the terms from the previous weeks in that course. The weekly glossaries are not downloadable; however, all of the terms and definitions are included in the course and certificate glossaries, which are downloadable.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Course glossaries**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: At the end of each course, you can access and download a glossary that covers all of the terms in that course. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Certificate glossary**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: The certificate glossary includes all of the terms in the entire certificate program and is a helpful resource that you can reference throughout the program or at any time in the future. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">You can access and download the certificate glossaries and save them on your computer. You can always find the course and certificate glossaries through the course’s </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Resources](https://www.coursera.org/learn/foundations-of-cybersecurity/resources/L1aML)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> section. To access the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Cybersecurity Certificate glossary**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">, click the link below and select </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">*Use Template*</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">.</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Cybersecurity Certificate glossary](https://docs.google.com/document/d/1Feb8pHRY-blnpaLOohds2esd6IWdCIp-ikG7G_omSj4/template/preview?usp=sharing&resourcekey=0-YHcAISkCiqGDq5KwO6yNeQ)</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">OR</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">If you don’t have a Google account, you can download the glossary directly from the attachment below.</span>

<div id="bkmrk-google-cybersecurity" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div contenteditable="false" data-e2e="slate-asset-wrapper" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[<div class="asset-wrapper css-cp6qd0" data-testid="asset-v2-wrapper" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; outline: none; user-select: none;"><div class="cml-asset cml-asset-generic cml-nonmedia-asset css-3u3yqw" data-e2e="cml-asset cml-asset-generic cml-nonmedia-asset" data-extension="docx" data-id="Q__8HGJKSWKvlbOKLdTtkg" data-name="Google Cybersecurity Certificate glossary" data-url="https://d3c33hcgiwev3.cloudfront.net/Q__8HGJKSWKvlbOKLdTtkg_ad50d57e3f79455783a12f606c297af1_Google-Cybersecurity-Certificate-glossary.docx?Expires=1685577600&Signature=XQWBe0ts4gQdVdco73bRTOVpPjpSn0Bmk8j8GP01ML~QJA-TdKQRBDzo2EobCMbtN6Ogbttzr9Nvt~oMjfGSlFOuqnX98jMZWLrwVZzsqcPrR-2OggD05X6wQfa76P3GyFfCckFQ2YjmH8rKADZFB88JAiTR-Ae2jCEhcIqbQWk_&Key-Pair-Id=APKAJLTNE6QMUY6HBC5A" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; background-color: rgb(245, 247, 248); border-radius: 8px; height: 84px; padding: 0px 24px; display: flex; -webkit-box-align: center; align-items: center; width: 559.2px; margin-bottom: 12px;"><div data-e2e="asset-icon" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><svg aria-labelledby="cds-react-aria-400-title" class="css-0" fill="none" focusable="false" height="24" id="bkmrk-" role="img" viewbox="0 0 24 24" width="24"></svg></div><div class="css-1yz0hhk" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; flex: 1 1 0%; min-width: 0px; flex-direction: column; white-space: nowrap; overflow-x: hidden; margin-left: 16px;"><div class="css-2ivpt" data-e2e="asset-name" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; font-size: 1rem; line-height: 1.5rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: bold; letter-spacing: -0.1px; text-overflow: ellipsis; overflow: hidden;">Google Cybersecurity Certificate glossary</div><div class="css-13413s3" data-e2e="asset-label" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; letter-spacing: 0px; font-size: 1rem; line-height: 1.5rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; color: rgb(99, 99, 99); margin-top: 4px;">DOCX File</div></div></div></div>](https://d3c33hcgiwev3.cloudfront.net/Q__8HGJKSWKvlbOKLdTtkg_ad50d57e3f79455783a12f606c297af1_Google-Cybersecurity-Certificate-glossary.docx?Expires=1685577600&Signature=XQWBe0ts4gQdVdco73bRTOVpPjpSn0Bmk8j8GP01ML~QJA-TdKQRBDzo2EobCMbtN6Ogbttzr9Nvt~oMjfGSlFOuqnX98jMZWLrwVZzsqcPrR-2OggD05X6wQfa76P3GyFfCckFQ2YjmH8rKADZFB88JAiTR-Ae2jCEhcIqbQWk_&Key-Pair-Id=APKAJLTNE6QMUY6HBC5A)</div></div>## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Course feedback</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Providing feedback on videos, readings, and other materials is easy. With the resource open in your browser, you can find the thumbs-up and thumbs-down symbols. </span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Click </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**thumbs-up**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> for materials you find helpful. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Click </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**thumbs-down**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> for materials that you do not find helpful.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">If you want to flag a specific issue with an item, click the flag icon, select a category, and enter an explanation in the text box. This feedback goes back to the course development team and isn’t visible to other learners. All feedback received helps to create even better certificate programs in the future. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">For technical help, visit the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Learner Help Center](https://learner.coursera.help/hc/en-us)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">.</span>

# Introduction to Cybersecurity

# Introduction to cybersecurity

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-imagine-that-you%27re-" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 700px; display: flex; flex-wrap: wrap; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from Imagine that you're preparing for a storm." class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Imagine that you're preparing for a storm. </span></div><div aria-label="toggle video from You've received notification that a storm is coming." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">You've received notification that a storm is coming. </span></div><div aria-label="toggle video from You prepare by gathering" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">You prepare by gathering </span></div><div aria-label="toggle video from the tools and materials you'll need to stay safe." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">the tools and materials you'll need to stay safe. </span></div><div aria-label="toggle video from You make sure your windows and doors are secure." class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">You make sure your windows and doors are secure. </span></div><div aria-label="toggle video from You assemble a first aid kit," class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">You assemble a first aid kit, </span></div><div aria-label="toggle video from tools, food and water. You're prepared." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">tools, food and water. You're prepared. </span></div><div aria-label="toggle video from The storm hits and there are" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">The storm hits and there are </span></div><div aria-label="toggle video from powerful winds and heavy rain." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">powerful winds and heavy rain. </span></div><div aria-label="toggle video from The storm is using its force to try and breach your home." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">The storm is using its force to try and breach your home. </span></div><div aria-label="toggle video from You notice some water leaks" class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">You notice some water leaks </span></div><div aria-label="toggle video from and begin patching them quickly" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">and begin patching them quickly </span></div><div aria-label="toggle video from in order to minimize any risk or potential damage." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">in order to minimize any risk or potential damage.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-play-video-starting-" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 700px; display: flex; flex-wrap: wrap; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-14" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 30px 0px -7px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting--1" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at ::39 and follow transcript</span></span>0:39</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from Handling a security incident is no different." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Handling a security incident is no different. </span></div><div aria-label="toggle video from Organizations must prepare for the storm by ensuring they" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Organizations must prepare for the storm by ensuring they </span></div><div aria-label="toggle video from have the tools to mitigate and" class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">have the tools to mitigate and </span></div><div aria-label="toggle video from quickly respond to outside threats." class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">quickly respond to outside threats. </span></div><div aria-label="toggle video from The objective is to minimize risk and potential damage." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">The objective is to minimize risk and potential damage.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-play-video-starting--2" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 700px; display: flex; flex-wrap: wrap; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-19" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 30px 0px -7px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting--3" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at ::56 and follow transcript</span></span>0:56</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from As a security analyst," class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">As a security analyst, </span></div><div aria-label="toggle video from you'll work to protect" class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">you'll work to protect </span></div><div aria-label="toggle video from your organization and the people it serves from" class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">your organization and the people it serves from </span></div><div aria-label="toggle video from a variety of risks and outside" class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">a variety of risks and outside </span></div><div aria-label="toggle video from threats. And if a threat does get through," class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">threats. And if a threat does get through, </span></div><div aria-label="toggle video from you and your team will provide" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">you and your team will provide </span></div><div aria-label="toggle video from a solution to remedy the situation." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">a solution to remedy the situation.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-play-video-starting--4" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 700px; display: flex; flex-wrap: wrap; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-26" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 30px 0px -7px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting--5" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at :1:11 and follow transcript</span></span>1:11</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from we'll define security and discuss" class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">To help you better understand what this means, we'll define security and discuss </span></div><div aria-label="toggle video from the roles of security professionals in organizations." class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">the roles of security professionals in organizations.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-play-video-starting--6" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 700px; display: flex; flex-wrap: wrap; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-29" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 30px 0px -7px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting--7" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at :1:19 and follow transcript</span></span>1:19</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from Let's start with some definitions:" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Let's start with some definitions: </span></div><div aria-label="toggle video from Cybersecurity, or security, is the practice" class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Cybersecurity, or security, is the practice </span></div><div aria-label="toggle video from of ensuring confidentiality, integrity," class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">of ensuring confidentiality, integrity, </span></div><div aria-label="toggle video from and availability of information" class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">and availability of information </span></div><div aria-label="toggle video from by protecting networks, devices," class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">by protecting networks, devices, </span></div><div aria-label="toggle video from people, and data from" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">people, and data from </span></div><div aria-label="toggle video from unauthorized access or criminal exploitation." class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">unauthorized access or criminal exploitation.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-play-video-starting--8" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 700px; display: flex; flex-wrap: wrap; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-36" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 30px 0px -7px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting--9" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at :1:39 and follow transcript</span></span>1:39</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from For example, requiring" class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">For example, requiring </span></div><div aria-label="toggle video from complex passwords to access sites and" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">complex passwords to access sites and </span></div><div aria-label="toggle video from services improves confidentiality by" class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">services improves confidentiality by </span></div><div aria-label="toggle video from making it much more difficult for" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">making it much more difficult for </span></div><div aria-label="toggle video from a threat actor to compromise them." class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">a threat actor to compromise them. </span></div><div aria-label="toggle video from A threat actor is any person" class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">A threat actor is any person </span></div><div aria-label="toggle video from or group who presents a security risk." class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">or group who presents a security risk.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-play-video-starting--10" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 700px; display: flex; flex-wrap: wrap; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-43" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 30px 0px -7px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting--11" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at :1:57 and follow transcript</span></span>1:57</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from Now that you know the definition of security," class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Now that you know the definition of security, </span></div><div aria-label="toggle video from let's discuss what security teams do for an organization." class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">let's discuss what security teams do for an organization.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-play-video-starting--12" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 700px; display: flex; flex-wrap: wrap; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-45" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 30px 0px -7px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting--13" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at :2:3 and follow transcript</span></span>2:03</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from Security protects against external and internal threats." class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Security protects against external and internal threats. </span></div><div aria-label="toggle video from An external threat is someone outside of the organization" class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">An external threat is someone outside of the organization </span></div><div aria-label="toggle video from trying to gain access to" class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">trying to gain access to </span></div><div aria-label="toggle video from private information, networks or devices." class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">private information, networks or devices.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-play-video-starting--14" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 700px; display: flex; flex-wrap: wrap; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-49" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 30px 0px -7px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting--15" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at :2:16 and follow transcript</span></span>2:16</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from An internal threat comes" class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">An internal threat comes </span></div><div aria-label="toggle video from from current or former employees," class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">from current or former employees, </span></div><div aria-label="toggle video from external vendors, or trusted partners." class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">external vendors, or trusted partners. </span></div><div aria-label="toggle video from Often these internal threats are accidental," class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Often these internal threats are accidental, </span></div><div aria-label="toggle video from such as an employee clicking on" class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">such as an employee clicking on </span></div><div aria-label="toggle video from a compromised link in an email." class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">a compromised link in an email. </span></div><div aria-label="toggle video from Other times, the internal actor intentionally engages in" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Other times, the internal actor intentionally engages in </span></div><div aria-label="toggle video from activities such as unauthorized data access" class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">activities such as unauthorized data access </span></div><div aria-label="toggle video from or abusing systems for personal use." class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">or abusing systems for personal use.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-play-video-starting--16" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 700px; display: flex; flex-wrap: wrap; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-58" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 30px 0px -7px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting--17" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at :2:40 and follow transcript</span></span>2:40</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from Experienced security professionals" class="rc-Phrase css-ugczj4" data-cue="58" data-cue-index="57" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Experienced security professionals </span></div><div aria-label="toggle video from will help organizations" class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">will help organizations </span></div><div aria-label="toggle video from mitigate or reduce the impact of threats like these." class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">mitigate or reduce the impact of threats like these.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-play-video-starting--18" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 700px; display: flex; flex-wrap: wrap; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-61" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 30px 0px -7px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting--19" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at :2:48 and follow transcript</span></span>2:48</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from Security teams also ensure" class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Security teams also ensure </span></div><div aria-label="toggle video from an organization meets regulatory compliance, or" class="rc-Phrase css-ugczj4" data-cue="62" data-cue-index="61" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">an organization meets regulatory compliance, or </span></div><div aria-label="toggle video from laws and guidelines, that require" class="rc-Phrase css-ugczj4" data-cue="63" data-cue-index="62" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">laws and guidelines, that require </span></div><div aria-label="toggle video from the implementation of specific security standards." class="rc-Phrase css-ugczj4" data-cue="64" data-cue-index="63" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">the implementation of specific security standards.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-play-video-starting--20" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 700px; display: flex; flex-wrap: wrap; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-65" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 30px 0px -7px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting--21" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at :2:59 and follow transcript</span></span>2:59</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from Ensuring that organizations are in" class="rc-Phrase css-ugczj4" data-cue="65" data-cue-index="64" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Ensuring that organizations are in </span></div><div aria-label="toggle video from compliance may allow them to avoid fines" class="rc-Phrase css-ugczj4" data-cue="66" data-cue-index="65" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">compliance may allow them to avoid fines </span></div><div aria-label="toggle video from and audits, while also upholding" class="rc-Phrase css-ugczj4" data-cue="67" data-cue-index="66" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">and audits, while also upholding </span></div><div aria-label="toggle video from their ethical obligation to protect users." class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">their ethical obligation to protect users.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-play-video-starting--22" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 700px; display: flex; flex-wrap: wrap; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-69" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 30px 0px -7px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting--23" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at :3:9 and follow transcript</span></span>3:09</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from Security teams also maintain" class="rc-Phrase css-ugczj4" data-cue="69" data-cue-index="68" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Security teams also maintain </span></div><div aria-label="toggle video from and improve business productivity." class="rc-Phrase css-ugczj4" data-cue="70" data-cue-index="69" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">and improve business productivity. </span></div><div aria-label="toggle video from By establishing a plan for business continuity," class="rc-Phrase css-ugczj4" data-cue="71" data-cue-index="70" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">By establishing a plan for business continuity, </span></div><div aria-label="toggle video from security teams allow people to do their jobs," class="rc-Phrase css-ugczj4" data-cue="72" data-cue-index="71" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">security teams allow people to do their jobs, </span></div><div aria-label="toggle video from even in the case of something like a data breach." class="rc-Phrase css-ugczj4" data-cue="73" data-cue-index="72" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">even in the case of something like a data breach.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-play-video-starting--24" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 700px; display: flex; flex-wrap: wrap; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-74" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 30px 0px -7px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting--25" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at :3:22 and follow transcript</span></span>3:22</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from Being security conscious can also" class="rc-Phrase css-ugczj4" data-cue="74" data-cue-index="73" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Being security conscious can also </span></div><div aria-label="toggle video from reduce expenses associated with risks," class="rc-Phrase css-ugczj4" data-cue="75" data-cue-index="74" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">reduce expenses associated with risks, </span></div><div aria-label="toggle video from such as recovering from data loss or" class="rc-Phrase css-ugczj4" data-cue="76" data-cue-index="75" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">such as recovering from data loss or </span></div><div aria-label="toggle video from operational downtime, and potentially avoiding fines." class="rc-Phrase css-ugczj4" data-cue="77" data-cue-index="76" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">operational downtime, and potentially avoiding fines. </span></div><div aria-label="toggle video from The last benefit of security that we'll" class="rc-Phrase css-ugczj4" data-cue="78" data-cue-index="77" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">The last benefit of security that we'll </span></div><div aria-label="toggle video from discuss is maintaining brand trust." class="rc-Phrase css-ugczj4" data-cue="79" data-cue-index="78" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">discuss is maintaining brand trust. </span></div><div aria-label="toggle video from If services or customer data are compromised," class="rc-Phrase css-ugczj4" data-cue="80" data-cue-index="79" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">If services or customer data are compromised, </span></div><div aria-label="toggle video from this can lower trust in the organization," class="rc-Phrase css-ugczj4" data-cue="81" data-cue-index="80" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">this can lower trust in the organization, </span></div><div aria-label="toggle video from damage the brand, and hurt the business in the long term." class="rc-Phrase css-ugczj4" data-cue="82" data-cue-index="81" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">damage the brand, and hurt the business in the long term. </span></div><div aria-label="toggle video from Loss of customer trust may" class="rc-Phrase css-ugczj4" data-cue="83" data-cue-index="82" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Loss of customer trust may </span></div><div aria-label="toggle video from also lead to less revenue for the business." class="rc-Phrase css-ugczj4" data-cue="84" data-cue-index="83" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">also lead to less revenue for the business.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-play-video-starting--26" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 700px; display: flex; flex-wrap: wrap; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-85" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 30px 0px -7px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting--27" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at :3:51 and follow transcript</span></span>3:51</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from Now, let's go over some common security-based roles." class="rc-Phrase css-ugczj4" data-cue="85" data-cue-index="84" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Now, let's go over some common security-based roles. </span></div><div aria-label="toggle video from After completing this certificate program," class="rc-Phrase css-ugczj4" data-cue="86" data-cue-index="85" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">After completing this certificate program, </span></div><div aria-label="toggle video from here are some job titles you may want to search for:" class="rc-Phrase css-ugczj4" data-cue="87" data-cue-index="86" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">here are some job titles you may want to search for: </span></div><div aria-label="toggle video from Security analyst or specialist," class="rc-Phrase css-ugczj4" data-cue="88" data-cue-index="87" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Security analyst or specialist, </span></div><div aria-label="toggle video from Cybersecurity analyst or specialist," class="rc-Phrase css-ugczj4" data-cue="89" data-cue-index="88" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Cybersecurity analyst or specialist, </span></div><div aria-label="toggle video from Security operation center or SOC" class="rc-Phrase css-ugczj4" data-cue="90" data-cue-index="89" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Security operation center or SOC </span></div><div aria-label="toggle video from analyst, Information security analyst." class="rc-Phrase css-ugczj4" data-cue="91" data-cue-index="90" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">analyst, Information security analyst.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-play-video-starting--28" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 700px; display: flex; flex-wrap: wrap; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-92" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 30px 0px -7px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting--29" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at :4:12 and follow transcript</span></span>4:12</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from You'll also learn more about the responsibilities" class="rc-Phrase css-ugczj4" data-cue="92" data-cue-index="91" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">You'll also learn more about the responsibilities </span></div><div aria-label="toggle video from associated with some of" class="rc-Phrase css-ugczj4" data-cue="93" data-cue-index="92" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">associated with some of </span></div><div aria-label="toggle video from these job titles later in the program." class="rc-Phrase css-ugczj4" data-cue="94" data-cue-index="93" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">these job titles later in the program.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-play-video-starting--30" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 700px; display: flex; flex-wrap: wrap; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; display: flex; padding: 0px 0px 16px;"><button aria-labelledby="button-label-95" class="timestamp" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: rgb(102, 102, 102); font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: 12px; line-height: 26px; font-family: inherit; font-optical-sizing: inherit; font-kerning: inherit; font-feature-settings: inherit; font-variation-settings: inherit; margin: 0px 30px 0px -7px; text-transform: none; cursor: pointer; border: none; height: 26px; background: white;" type="button"><span class="sr-only" id="bkmrk-play-video-starting--31" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Play video starting at :4:19 and follow transcript</span></span>4:19</button><div class="phrases" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div aria-label="toggle video from As you may now realize," class="rc-Phrase css-ugczj4" data-cue="95" data-cue-index="94" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">As you may now realize, </span></div><div aria-label="toggle video from the field of security includes" class="rc-Phrase css-ugczj4" data-cue="96" data-cue-index="95" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">the field of security includes </span></div><div aria-label="toggle video from many topics and concepts and" class="rc-Phrase css-ugczj4" data-cue="97" data-cue-index="96" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">many topics and concepts and </span></div><div aria-label="toggle video from every activity you complete in" class="rc-Phrase css-ugczj4" data-cue="98" data-cue-index="97" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">every activity you complete in </span></div><div aria-label="toggle video from this program moves you one step closer to a new job." class="rc-Phrase css-ugczj4" data-cue="99" data-cue-index="98" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">this program moves you one step closer to a new job. </span></div><div aria-label="toggle video from Let's keep learning together." class="rc-Phrase css-ugczj4" data-cue="100" data-cue-index="99" role="button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; cursor: pointer; touch-action: manipulation; opacity: 1; display: inline;" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);">Let's keep learning together.</span></div></div></div></div>

# Toni: My path to cybersecurity

Hi, I'm Toni, I'm a Security Engineering Manager. Our teams protect Google and its users from serious threats. Usually government-backed attackers, coordinated influence operations and serious cybercrime threat actors. I grew up as an army brat. My dad was in the military and we moved around a lot. I've always had an interest in security sort of generally. I got really hooked on international relations when I was in high school. I did a lot of Model United Nations. And that really sort of brought these two things together for me, the way that security works in the world. I come from a big family. I knew I was going to need financial assistance to go to college. And the Department of Defense provides a lot of educational opportunities that are tied to service. So this was a natural fit for me. I knew I was interested in this area and this was going to provide a career path into something I was passionate about. I started as an intelligence analyst, but not focused on cybersecurity. I worked counterinsurgency for a number of years and geopolitical intelligence issues. Eventually, as I looked and saw that the way that cybersecurity was starting to have an impact both in our daily lives and in that world of international relations, I got more and more drawn to it. Transitioning into cybersecurity was a huge shift for me. I came in without a solid technical background, had to learn a lot of that on the job and through self-paced learning in different types of courses, I needed to learn programming languages like Python and SQL, two of the things that we cover in this certificate, I needed to learn a whole new language about the vocabulary of threats and the different components and how those manifest technically. One of the things that I had to figure out very early in this journey is what kind of learner I was. I work best with a structured learning style. So turning to a lot of these online courses and resources that took this material and structured it sort of from first principles through application resonated very well for me. A lot of this was also learned on the job by co-workers who were willing to share and invest time in helping me understand this. I asked a lot of questions and I still do. Most of cybersecurity work is going to be learned on the job in the specific environment that you're protecting. So you have to work well with your teammates in order to be able to build that knowledge base. My advice would be to stay curious and keep learning, especially focusing on your technical skills and growing those throughout your career. It's really easy to get imposter syndrome in cybersecurity because it's so broad and mastery of all these different areas is a lifetime's work. And sometimes that imposter syndrome can shut us down and make it feel like, why bother trying to keep growing. I'm never going to be able to master this instead of motivating us. So keep learning, push through that fear. The efforts always going to be rewarded.

# Responsibilities of an entry-level cybersecurity analyst

Technology is rapidly changing and so are the tactics and techniques that attackers use. As digital infrastructure evolves, security professionals are expected to continually grow their skills in order to protect and secure sensitive information. In this video, we'll discuss some job responsibilities of an entry-level security analyst.  
  
So, what do security analysts do? Security analysts are responsible for monitoring and protecting information and systems.  
  
Now, we'll discuss three primary responsibilities of a security analyst, starting with protecting computer and network systems. Protecting computer and network systems requires an analyst to monitor an organization's internal network. If a threat is detected, then an analyst is generally the first to respond. Analysts also often take part in exercises to search for weaknesses in an organization's own systems.  
  
For example, a security analyst may contribute to penetration testing or ethical hacking. The goal is to penetrate or hack their own organization's internal network to identify vulnerabilities and suggest ways to strengthen their security measures.  
  
Think of it like this. After you lock your car, you check the door handles to make sure no one can access any valuables you keep inside.  
  
Security analysts also proactively work to prevent threats from happening in the first place. One way they do this is by working with information technology, or IT, teams to install prevention software for the purposes of identifying risks and vulnerabilities.  
  
Analysts may also be involved in software and hardware development. They'll often work with development teams to support product security by setting up appropriate processes and systems to meet the organization's data protection needs.  
  
The last task we'll discuss is conducting periodic security audits. A security audit is a review of an organization's security records, activities, and other related documents. For example, an analyst may examine in-house security issues, such as making sure that confidential information, like individual computer passwords, isn't available to all employees.  
  
Phew, that was a lot to cover! But hopefully you have a general idea of what entry-level security analysts do on a day-to-day basis.  
  
Security analysts are an important part of any organization. Their daily tasks protect small businesses, large companies, nonprofit organizations, and government agencies. They also help to ensure that the people served by those organizations remain safe.

# Nikki: A day in the life of a security engineer

My name is Nikki and I'm a security engineer at Google. I am part of the insider threat detection team at Google, so my role is more focused on catching insider threats or insider suspicious activity within the company. My first experience with cybersecurity was when I was interning at the aquarium. I learned a lot of network security there, they had a lot of phishing attempts, of course, you know, at the aquarium. My manager was really focused on making sure that our networks were secure and I learned a lot from him and that really sparked my interest in cybersecurity. The main reason I chose to pursue a career in cybersecurity is just how flexible the career path is. Once you're in security, there's so many different fields you can dive into. Whether it's through the blue team, protecting the user or the red team, which is just, you know, poking holes in other people's defenses and letting them know where they're going wrong. A day in the life as a entry- level security professional? Um, it can change day to day, but there's two basic parts to it. There's the operation side, which is responding to detections and doing investigations. And then there's the project side where you're working with other teams to build new detections or improve the current detections. The difference between this entry- level cybersecurity analyst and an entry-level cybersecurity engineer is pretty much that the analyst is more focused on operations and the engineer, while they can do operations, they also build the, the detections and they do more project focused work. My favorite task is probably the operations side doing investigations because we can sometimes get something like this actor did such and such on this day. And we're supposed to then dive into what they've been doing, what they've been working on to figure out if there's any suspicious activity or if it was just a false positive. One of the biggest ways I've made an impact as an entry-level cybersecurity professional is actually working on the playbooks that, um, our team uses. A playbook is a list of how to go through a certain detection, and what the analyst needs to look at in order to investigate those incidents. I was really proud of those, those playbooks that I've made so far because a lot of my teammates have even said how helpful they've been to them. If you love solving problems, if you love protecting user data, being at the front lines of a lot of headlines, then this is definitely the role for you.

# Common cybersecurity terminology

#   


<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">As you’ve learned, </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**cybersecurity**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> (also known as security) is the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation. In this reading, you’ll be introduced to some key terms used in the cybersecurity profession. Then, you’ll be provided with a resource that’s useful for staying informed about changes to cybersecurity terminology.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Key cybersecurity terms and concepts</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">There are many terms and concepts that are important for security professionals to know. Being familiar with them can help you better identify the threats that can harm organizations and people alike. A security analyst or cybersecurity analyst focuses on monitoring networks for breaches. They also help develop strategies to secure an organization and research information technology (IT) security trends to remain alert and informed about potential threats. Additionally, an analyst works to prevent incidents. In order for analysts to effectively do these types of tasks, they need to develop knowledge of the following key concepts. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Compliance**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is the process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Security frameworks**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> are guidelines used for building plans to help mitigate risks and threats to data and privacy.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Security controls**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> are safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Security posture**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is an organization’s ability to manage its defense of critical assets and data and react to change. A strong security posture leads to lower risk for the organization.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> **threat actor**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">, or malicious attacker, is any person or group who presents a security risk. This risk can relate to computers, applications, networks, and data.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">An </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**internal threat**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> can be a current or former employee, an external vendor, or a trusted partner who poses a security risk. At times, an internal threat is accidental. For example, an employee who accidentally clicks on a malicious email link would be considered an accidental threat. Other times, the internal threat actor </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">*intentionally*</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> engages in risky activities, such as unauthorized data access.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Network security**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is the practice of keeping an organization's network infrastructure secure from unauthorized access. This includes data, services, systems, and devices that are stored in an organization’s network.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Cloud security**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is the process of ensuring that assets stored in the cloud are properly configured, or set up correctly, and access to those assets is limited to authorized users. The cloud is a network made up of a collection of servers or computers that store resources and data in remote physical locations known as data centers that can be accessed via the internet. Cloud security is a growing subfield of cybersecurity that specifically focuses on the protection of data, applications, and infrastructure in the cloud.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Programming**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is a process that can be used to create a specific set of instructions for a computer to execute tasks. These tasks can include:</span>

<div class="rc-CML" dir="auto" id="bkmrk-automation-of-repeti" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Automation of repetitive tasks (e.g., searching a list of malicious domains)</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Reviewing web traffic </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Alerting suspicious activity</span>

</div></div></div></div></div></div>## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Key takeaways</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Understanding key technical terms and concepts used in the security field will help prepare you for your role as a security analyst. Knowing these terms can help you identify common threats, risks, and vulnerabilities. To explore a variety of cybersecurity terms, visit the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[National Institute of Standards and Technology glossary](https://csrc.nist.gov/glossary)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">. Or use your browser to search for high-quality, reliable cybersecurity glossaries from research institutes or governmental authorities. Glossaries are available in multiple languages.   
i also have a bunch of data in this glossary search on this site  
</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[https://library.naruzkurai.tk/search?term=glossary](https://library.naruzkurai.tk/search?term=glossary)</span>

# Core Skills for cyber security Professionals

# Core skills for cybersecurity professionals

In this video, we'll discuss both transferable and technical skills that are particularly useful for a security analyst.  
  
Transferable skills are skills from other areas that can apply to different careers.  
  
Technical skills may apply to several professions as well. However, at times they may require knowledge of specific tools, procedures, and policies.  
  
Let's discuss some core transferable skills you may already have that will benefit you in a career as a security analyst. Communication is a transferable skill for a security analyst. They will often need to describe certain threats, risks, or vulnerabilities to people who may not have a technical background.  
  
For example, security analysts may be tasked with interpreting and communicating policies and procedures to other employees. Or analysts may be asked to report findings to their supervisors, so the appropriate actions can be taken to secure the organization.  
  
Another transferable skill is collaboration. Security analysts often work in teams with engineers, digital forensic investigators, and program managers. For example, if you are working to roll out a new security feature, you will likely have a project manager, an engineer, and an ethical hacker on your team. Security analysts also need to be able to analyze complex scenarios that they may encounter. For example, a security analyst may need to make recommendations about how different tools can support efficiency and safeguard an organization's internal network.  
  
The last transferable skill that we'll discuss is problem-solving. Identifying a security problem and then diagnosing it and providing solutions is a necessary skill to keep business operations safe. Understanding threat actors and identifying trends can provide insight on how to handle future threats.  
  
Okay, now that we've covered some important transferable skills, let's discuss some technical skills that security analysts need to develop. A basic understanding of programming languages is an important skill to develop because security analysts can use programming to automate tasks and identify error messages.  
  
Like learning any other language, learning a programming language may seem challenging at first. However, this certificate program assumes no prior programming experience, so we'll start at the very beginning and provide several opportunities for hands-on practice with languages like Python and SQL.  
  
Another important technical skill is knowing how to use security information and event management, or SIEM, tools. Security professionals use SIEM tools to identify and analyze security threats, risks, and vulnerabilities. For example, a SIEM tool may alert you that an unknown user has accessed the system. In the event of an unknown user accessing the system, you may use computer forensics to investigate the incident.  
  
Now, let's discuss computer forensics. Similar to an investigator and a forensic scientist working in the criminal justice system, digital forensic investigators will attempt to identify, analyze, and preserve criminal evidence within networks, computers, and electronic devices.  
  
Keep in mind that you may already have some of the core skills we've discussed. And if you don't have the technical skills, that's okay! This program is designed to support you in learning those skills.  
  
For example, over the past seven years working in cybersecurity, I've learned that security analysts need to have intellectual curiosity and the motivation to keep learning in order to succeed. Personally, I dedicate time on a regular basis towards learning more Python and SQL skills in order to meet the demands of the projects I'm working on. You'll get to learn about Python and SQL later in this program.  
  
As you continue this journey, you'll build the knowledge and skills you need to enter the security field.

# Veronica: My path to working in cybersecurity

Hi, I'm Veronica and I'm a security engineer at Google. My journey into cybersecurity has changed my life for the better in so many ways. The most important part is fulfilling work. I get to do something that I absolutely love and that I'm super interested in, and I feel very lucky that this is what I get to do for work. Before I entered my current field, I had no idea what cybersecurity was. My knowledge of cybersecurity was using secure passwords, and that was about it. So if you asked me, you know, would I be in cybersecurity five years ago? I would've said, what is that? Someone without a technical background can 100% be successful in cybersecurity. My path to my current role in cybersecurity started as an IT resident here at Google staff in Techstop. I learned a lot of analytical thinking skills, working on a help desk, troubleshooting, debugging. I didn't realize I had transferable skills until I got into my role in cybersecurity. And from there, I took it upon myself to bug a bunch of security engineers, interviewed a lot of them. I didn't get here alone. It took a village of mentors to get me here, so don't be afraid to ask for help. I don't think someone needs a college degree to go into cybersecurity. Some of the brightest minds that I get to work with don't have a college degree, so I think that's one of the best parts about the industry. Looking back at my career, I wish I would have known that I don't have to check all the boxes, that I don't have to be an expert in the area to shoot my shot, and I also wish I would've known that perfectionism can get in the way of what you want to achieve.

# Transferable and technical cybersecurity skills

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Previously, you learned that cybersecurity analysts need to develop certain core skills to be successful at work.</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> **Transferable skills**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> are skills from other areas of study or practice that can apply to different careers. </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Technical skills** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">may apply to several professions, as well; however, they typically require knowledge of specific tools, procedures, and policies. In this reading, you’ll explore both transferable skills and technical skills further.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Transferable skills</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">You have probably developed many transferable skills through life experiences; some of those skills will help you thrive as a cybersecurity professional. These include:</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Communication:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">As a cybersecurity analyst, you will need to communicate and collaborate with others. Understanding others’ questions or concerns and communicating information clearly to individuals with technical and non-technical knowledge will help you mitigate security issues quickly. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Problem-solving:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> One of your main tasks as a cybersecurity analyst will be to proactively identify and solve problems. You can do this by recognizing attack patterns, then determining the most efficient solution to minimize risk. Don't be afraid to take risks, and try new things. Also, understand that it's rare to find a perfect solution to a problem. You’ll likely need to compromise.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Time management:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Having a heightened sense of urgency and prioritizing tasks appropriately is essential in the cybersecurity field. So, effective time management will help you minimize potential damage and risk to critical assets and data. Additionally, it will be important to prioritize tasks and stay focused on the most urgent issue.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Growth mindset:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">This is an evolving industry, so an important transferable skill is a willingness to learn. Technology moves fast, and that's a great thing! It doesn't mean you will need to learn it all, but it does mean that you’ll need to continue to learn throughout your career. Fortunately, you will be able to apply much of what you learn in this program to your ongoing professional development.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Diverse perspectives:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> The only way to go far is together. By having respect for each other and encouraging diverse perspectives and mutual respect, you’ll undoubtedly find multiple and better solutions to security problems. </span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Technical skills</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">There are many technical skills that will help you be successful in the cybersecurity field. You’ll learn and practice these skills as you progress through the certificate program. Some of the tools and concepts you’ll need to use and be able to understand include: </span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Programming languages:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> By understanding how to use programming languages, cybersecurity analysts can automate tasks that would otherwise be very time consuming. Examples of tasks that programming can be used for include searching data to identify potential threats or organizing and analyzing information to identify patterns related to security issues. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Security information and event management (SIEM) tools:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">SIEM tools collect and analyze log data, or records of events such as unusual login behavior, and support analysts’ ability to monitor critical activities in an organization. This helps cybersecurity professionals identify and analyze potential security threats, risks, and vulnerabilities more efficiently.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Intrusion detection systems (IDSs):** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Cybersecurity analysts use IDSs to monitor system activity and alerts for possible intrusions. It’s important to become familiar with IDSs because they’re a key tool that every organization uses to protect assets and data. For example, you might use an IDS to monitor networks for signs of malicious activity, like unauthorized access to a network.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Threat landscape knowledge:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Being aware of current trends related to threat actors, malware, or threat methodologies is vital. This knowledge allows security teams to build stronger defenses against threat actor tactics and techniques. By staying up to date on attack trends and patterns, security professionals are better able to recognize when new types of threats emerge such as a new ransomware variant. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Incident response:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Cybersecurity analysts need to be able to follow established policies and procedures to respond to incidents appropriately. For example, a security analyst might receive an alert about a possible malware attack, then follow the organization’s outlined procedures to start the incident response process. This could involve conducting an investigation to identify the root issue and establishing ways to remediate it.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">CompTIA Security+</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">In addition to gaining skills that will help you succeed as a cybersecurity professional, the Google Cybersecurity Certificate helps prepare you for the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[CompTIA Security+ exam](https://www.comptia.org/certifications/security)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">, the industry leading certification for cybersecurity roles. You’ll earn a dual credential when you complete both, which can be shared with potential employers. After completing all eight courses in the Google Cybersecurity Certificate, you will unlock a 30% discount for the CompTIA Security+ exam and additional practice materials.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Key takeaways</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Understanding the benefits of core transferable and technical skills can help prepare you to successfully enter the cybersecurity workforce. Throughout this program, you’ll have multiple opportunities to develop these and other key cybersecurity analyst skills.</span>

# The importance of cybersecurity

As we've discussed, security professionals protect many physical and digital assets. These skills are desired by organizations and government entities because risk needs to be managed. Let's continue to discuss why security matters.  
Play video starting at ::17 and follow transcript0:17  
Security is essential for ensuring an organization's business continuity and ethical standing. There are both legal implications and moral considerations to maintaining an organization's security. A data breach, for example, affects everyone that is associated with the organization. This is because data losses or leaks can affect an organization's reputation as well as the lives and reputations of their users, clients, and customers. By maintaining strong security measures, organizations can increase user trust. This may lead to financial growth and ongoing business referrals.  
  
As previously mentioned, organizations are not the only ones that suffer during a data breach. Maintaining and securing user, customer, and vendor data is an important part of preventing incidents that may expose people's personally identifiable information.  
  
Personally identifiable information, known as PII, is any information used to infer an individual's identity. PII includes someone's full name, date of birth, physical address, phone number, email address, internet protocol, or IP address and similar information.  
  
Sensitive personally identifiable information, known as SPII, is a specific type of PII that falls under stricter handling guidelines and may include social security numbers, medical or financial information, and biometric data, such as facial recognition. If SPII is stolen, this has the potential to be significantly more damaging to an individual than if PII is stolen.  
  
PII and SPII data are key assets that a threat actor will look for if an organization experiences a breach. When a person's identifiable information is compromised, leaked, or stolen, identity theft is the primary concern.  
  
Identity theft is the act of stealing personal information to commit fraud while impersonating a victim. And the primary objective of identity theft is financial gain.  
  
We've explored several reasons why security matters. Employers need security analysts like you to fill the current and future demand to protect data, products, and people while ensuring confidentiality, integrity, and safe access to information. This is why the U.S. Bureau of Labor Statistics expects the demand for security professionals to grow by more than 30% by the year 2030.

  
So keep learning, and eventually you'll be able to do your part to create a safer and more secure environment for organizations and people alike!

# Wrap-up

Congratulations on completing the first section of this course! Let's quickly review what we've covered so far, before moving on.  
  
We defined security and introduced the benefits of implementing security in an organization. Then, we discussed different job responsibilities, such as managing threats and installing prevention software. We also introduced some important core skills, like collaboration and computer forensics. We finished by discussing the value of security and how it supports critical business functions.  
  
I hope you've gained a greater understanding of security. If you feel like you need a refresher before moving on, you can always go back and review any content you're unsure about.  
  
By learning the basics, you are laying the foundation for the rest of your security career.  
  
Coming up, we'll explore some well-known attacks that shaped the security industry. I'm excited to continue this journey with you!

# The History if cybersecurity

# welcome to week 2

  
Welcome back! When it comes to security, there is so much to learn, and I'm thrilled to be part of your career journey.  
  
This is such an exciting time to be learning about security! When I learned about international hacks that impacted both private companies and government organizations, I was inspired to want to work in security because I realized how dynamic and important this field is.  
  
One reason there are so many jobs in the security field today, is because of attacks that happened in the 1980s and 1990s. Decades later, security professionals are still actively working to protect organizations and people from variations of these early computer attacks.  
  
In this section of the course, we'll discuss viruses and malware, and introduce the concept of social engineering. Then, we'll discuss how the digital age ushered in a new era of threat actors. Knowing the evolution of each attack is key to protecting against future attacks. Lastly, we'll provide an overview of eight security domains.  
  
Next up, we'll travel back in time, to explore some of the viruses, data breaches, and malware attacks that have helped shape the industry as we know it today.

# Past cybersecurity attacks

The security industry is constantly evolving, but many present-day attacks are not entirely new. Attackers often alter or enhance previous methods. Understanding past attacks can provide direction for how to handle or investigate incidents in your job as a security analyst.  
  
First, let's go over a couple of key terms that will support your understanding of the attacks we'll discuss.  
  
A computer virus is malicious code written to interfere with computer operations and cause damage to data and software. The virus attaches itself to programs or documents on a computer, then spreads and infects one or more computers in a network.  
  
A worm is a type of computer virus that can duplicate and spread on its own without human involvement.  
  
Today, viruses are more commonly referred to as malware, which is software designed to harm devices or networks.  
  
Two examples of early malware attacks that we'll cover are the Brain virus and the Morris worm. They were created by malware developers to accomplish specific tasks. However, the developers underestimated the impact their malware would have and the amount of infected computers there would be. Let's take a closer look at these attacks and discuss how they helped shape security as we know it today.  
  
In 1986, the Alvi brothers created the Brain virus, although the intention of the virus was to track illegal copies of medical software and prevent pirated licenses, what the virus actually did was unexpected. Once a person used a pirated copy of the software, the virus-infected that computer. Then, any disk that was inserted into the computer was also infected. The virus spread to a new computer every time someone used one of the infected disks. Undetected, the virus spread globally within a couple of months. Although the intention was not to destroy data or hardware, the virus slowed down productivity and significantly impacted business operations.  
  
The Brain virus fundamentally altered the computing industry, emphasizing the need for a plan to maintain security and productivity. As a security analyst, you will follow and maintain strategies put in place to ensure your organization has a plan to keep their data and people safe.  
  
Another influential computer attack was the Morris worm. In 1988, Robert Morris developed a program to assess the size of the internet. The program crawled the web and installed itself onto other computers to tally the number of computers that were connected to the internet. Sounds simple, right? The program, however, failed to keep track of the computers and had already compromised and continued to re-install itself until the computers ran out of memory and crashed. About 6,000 computers were affected, representing 10% of the internet at the time.  
  
This attack cost millions of dollars in damages due to business disruptions and the efforts required to remove the worm.  
  
After the Morris worm, Computer Emergency Response Teams, known as CERTs®, were established to respond to computer security incidents. CERTs still exist today, but their place in the security industry has expanded to include more responsibilities.  
  
Later in this program, you'll learn more about the core functions of these security teams and gain hands-on practice with detection and response tools.  
  
Early attacks played a key role in shaping the current security industry. And coming up, we'll discuss how attacks evolved in the digital age.

# Attacks in the digital age

With the expansion of reliable high-speed internet, the number of computers connected to the internet increased dramatically. Because malware could spread through the internet, threat actors no longer needed to use physical disks to spread viruses.  
  
To better understand attacks in the digital age, we'll discuss two notable attacks that relied on the internet: the LoveLetter attack and the Equifax breach.  
  
In the year 2000, Onel De Guzman created the LoveLetter malware to steal internet login credentials. This attack spread rapidly and took advantage of people who had not developed a healthy suspicion for unsolicited emails. Users received an email with the subject line, "I Love You." Each email contained an attachment labeled, "Love Letter For You." When the attachment was opened, the malware scanned a user's address book. Then, it automatically sent itself to each person on the list and installed a program to collect user information and passwords. Recipients would think they were receiving an email from a friend, but it was actually malware. The LoveLetter ended up infecting 45 million computers globally and is believed to have caused over $10 billion dollars in damages. The LoveLetter attack is the first example of social engineering.  
  
Social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables.  
  
After the LoveLetter, attackers understood the power of social engineering. The number of social engineering attacks is increasing with every new social media application that allows public access to people's data. Many people are now prioritizing convenience over privacy. The trade-off of this evolving shift is that these tools may lead to increased vulnerability, if people do not use them appropriately.  
  
As a security professional, your role is to identify and manage inappropriate use of technology that may place your organization and all the people associated with it at risk. One way to safeguard your organization is to conduct regular internal trainings, which you as a future security analyst may be asked to lead or participate in.  
  
Today, it's common for employees to receive training on how to identify social engineering attacks. Specifically, phishing through the emails they receive. Phishing is the use of digital communications to trick people into revealing sensitive data or deploying malicious software.  
  
Now, let's discuss the Equifax breach. In 2017, attackers successfully infiltrated the credit reporting agency, Equifax. This resulted in one of the largest known data breaches of sensitive information. Over 143 million customer records were stolen, and the breach affected approximately 40% of all Americans.  
  
The records included personally identifiable information including social security numbers, birth dates, driver's license numbers, home addresses, and credit card numbers. From a security standpoint, the breach occurred due to multiple failures on Equifax's part. It wasn't just one vulnerability that the attackers took advantage of, there were several. The company failed to take the actions needed to fix multiple known vulnerabilities in the months leading up to the data breach.  
  
In the end, Equifax settled with the U.S. government and paid over $575 million dollars to resolve customer complaints and cover required fines.  
  
While there have been other data breaches before and after the Equifax breach, the large settlement with the U.S. government alerted companies to the financial impact of a breach and the need to implement preventative measures.  
  
These are just a couple of well-known incidents that have shaped the security industry. Knowing about them will help you in your security career. Understanding different types of malware and social engineering attacks will allow you to communicate about security risks during future job interviews.  
  
As a future security professional, constantly adapting and educating yourself on threat actors' tactics and techniques will be a part of your job. By noticing similar trends, patterns, and methodologies, you may be able to identify a potential breach and limit future damage.  
  
Finally, understanding how security affects people's lives is a good reminder of why the work you will do is so important!

# Common attacks and their effectiveness

#   


<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Previously, you learned about past and present attacks that helped shape the cybersecurity industry. These included the LoveLetter attack, also called the ILOVEYOU virus, and the Morris worm. One outcome was the establishment of response teams, which are now commonly referred to as computer security incident response teams (CSIRTs). In this reading, you will learn more about common methods of attack. Becoming familiar with different attack methods, </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">*and*</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> the evolving tactics and techniques threat actors use, will help you better protect organizations and people.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Phishing</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Phishing**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is the use of digital communications to trick people into revealing sensitive data or deploying malicious software. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Some of the most common types of phishing attacks today include: </span>

<div class="rc-CML" dir="auto" id="bkmrk-business-email-compr" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Business Email Compromise (BEC):** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information, in order to obtain a financial advantage.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Spear phishing:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A malicious email attack that targets a specific user or group of users. The email seems to originate from a trusted source.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Whaling:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A form of spear phishing. Threat actors target company executives to gain access to sensitive data.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Vishing:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Smishing:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source.</span>

</div></div></div></div></div></div>## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Malware</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Malware**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is software designed to harm devices or networks. There are many types of malware. The primary purpose of malware is to obtain money, or in some cases, an intelligence advantage that can be used against a person, an organization, or a territory. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Some of the most common types of malware attacks today include: </span>

<div class="rc-CML" dir="auto" id="bkmrk-viruses%3A-malicious-c" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Viruses:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Malicious code written to interfere with computer operations and cause damage to data, software, and hardware. A virus attaches itself to programs or documents, on a computer. It then spreads and infects one or more computers in a network.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Worms:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Malware that can duplicate and spread itself across systems on its own. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Ransomware:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A malicious attack where threat actors encrypt an organization's data and demand payment to restore access. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Spyware:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Malware that’s used to gather and sell information without consent. Spyware can be used to access devices. This allows threat actors to collect personal data, such as private emails, texts, voice and image recordings, and locations.</span>

</div></div></div></div></div></div>## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">  
</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Social engineering**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is a manipulation technique that exploits human error to gain private information, access, or valuables. Human error is usually a result of trusting someone without question. It’s the mission of a threat actor, acting as a social engineer, to create an environment of false trust and lies to exploit as many people as possible. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Some of the most common types of social engineering attacks today include:</span>

<div class="rc-CML" dir="auto" id="bkmrk-social-media-phishin" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Social media phishing:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A threat actor collects detailed information about their target from social media sites. Then, they initiate an attack.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Watering hole attack:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A threat actor attacks a website frequently visited by a specific group of users.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**USB baiting:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A threat actor strategically leaves a malware USB stick for an employee to find and install, to unknowingly infect a network. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Physical social engineering:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location.</span>

</div></div></div></div></div></div>### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Social engineering principles** </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Social engineering is incredibly effective. This is because people are generally trusting and conditioned to respect authority. The number of social engineering attacks is increasing with every new social media application that allows public access to people's data. Although sharing personal data—such as your location or photos—can be convenient, it’s also a risk.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Reasons why social engineering attacks are effective include:</span>

<div class="rc-CML" dir="auto" id="bkmrk-authority%3A-threat-ac" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Authority:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Threat actors impersonate individuals with power. This is because people, in general, have been conditioned to respect and follow authority figures. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Intimidation:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Threat actors use bullying tactics. This includes persuading and intimidating victims into doing what they’re told. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Consensus/Social proof:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Because people sometimes do things that they believe many others are doing, threat actors use others’ trust to pretend they are legitimate. For example, a threat actor might try to gain access to private data by telling an employee that other people at the company have given them access to that data in the past. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Scarcity:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A tactic used to imply that goods or services are in limited supply. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Familiarity:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Threat actors establish a fake emotional connection with users that can be exploited. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Trust:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Threat actors establish an emotional relationship with users that can be exploited </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">*over time*</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">. They use this relationship to develop trust and gain personal information.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Urgency:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A threat actor persuades others to respond quickly and without questioning.</span>

</div></div></div></div></div></div>## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Key takeaways</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">In this reading, you learned about some common attacks and their impacts. You also learned about social engineering and why it’s so successful. While this is only a brief introduction to attack types, you will have many opportunities throughout the program to further develop your understanding of how to identify and defend against cybersecurity attacks. </span>

# Sean: Keep your cool during a data breach

Hi, my name is Sean. I'm a Technical Program Manager in Google workspace. I am a 30 year security veteran within the security space across six different industries. During your first data breach, the most important thing that you can do is keep your cool. Everyone around is going to be freaking out. If you are on the security team and you are managing the incident, you have to legitimately be the cool guy in the room. Be that person that has the pause in the conversation. Somebody might be like, do you know what's going on? I absolutely do. I think the biggest breach I've ever had was a phone call. An engineer for another financial, bought a server off eBay. That server fired it up hadn't been wiped. Twenty million credit card records were on it. That triggered a whole review of we had not been controlling for how do third parties because we were now outsourcing data centers. How do third parties wipe the servers that we no longer use? The first thing you're going to do is to contain the breach. If you are still hemorrhaging data, you go through your progressions to stop hemorrhaging data. So if that means shutting down a server, shutting down a data center, shutting down comms, whatever, stopping the data loss is that is your number one priority. Your job as an incident manager or as somebody working a breach is to stop the breach and then investigate the breach. So executing your incident management by plan is the most important thing that an entry level person can keep in mind.  
(Required)  
en  
​

# Introduction to security frameworks and controls

Imagine you're working as a security analyst and receive multiple alerts about suspicious activity on the network. You realize that you'll need to implement additional security measures to keep these alerts from becoming serious incidents. But where do you start?  
  
As an analyst, you'll start by identifying your organization's critical assets and risks. Then you'll implement the necessary frameworks and controls.  
  
In this video, we'll discuss how security professionals use frameworks to continuously identify and manage risk. We'll also cover how to use security controls to manage or reduce specific risks.  
  
Security frameworks are guidelines used for building plans to help mitigate risks and threats to data and privacy. Security frameworks provide a structured approach to implementing a security lifecycle. The security lifecycle is a constantly evolving set of policies and standards that define how an organization manages risks, follows established guidelines, and meets regulatory compliance, or laws.  
  
There are several security frameworks that may be used to manage different types of organizational and regulatory compliance risks. The purpose of security frameworks include protecting personally identifiable information, known as PII, securing financial information, identifying security weaknesses, managing organizational risks, and aligning security with business goals.  
  
Frameworks have four core components and understanding them will allow you to better manage potential risks. The first core component is identifying and documenting security goals. For example, an organization may have a goal to align with the E.U.'s General Data Protection Regulation, also known as GDPR. GDPR is a data protection law established to grant European citizens more control over their personal data. A security analyst may be asked to identify and document areas where an organization is out of compliance with GDPR.  
  
The second core component is setting guidelines to achieve security goals. For example, when implementing guidelines to achieve GDPR compliance, your organization may need to develop new policies for how to handle data requests from individual users.  
  
The third core component of security frameworks is implementing strong security processes. In the case of GDPR, a security analyst working for a social media company may help design procedures to ensure the organization complies with verified user data requests. An example of this type of request is when a user attempts to update or delete their profile information.  
  
The last core component of security frameworks is monitoring and communicating results. As an example, you may monitor your organization's internal network and report a potential security issue affecting GDPR to your manager or regulatory compliance officer.  
  
Now that we've introduced the four core components of security frameworks, let's tie them all together. Frameworks allow analysts to work alongside other members of the security team to document, implement, and use the policies and procedures that have been created. It's essential for an entry-level analyst to understand this process because it directly affects the work they do and how they collaborate with others. Next, we'll discuss security controls.  
Security controls are safeguards designed to reduce specific security risks. For example, your company may have a guideline that requires all employees to complete a privacy training to reduce the risk of data breaches. As a security analyst, you may use a software tool to automatically assign and track which employees have completed this training.  
  
Security frameworks and controls are vital to managing security for all types of organizations and ensuring that everyone is doing their part to maintain a low level of risk.  
  
Understanding their purpose and how they are used allows analysts to support an organization's security goals and protect the people it serves.  
  
In the following videos, we'll discuss some well-known frameworks and principles that analysts need to be aware of to minimize risk and protect data and users.

# The eight CISSP security domains

# Introduction to the eight CISSP security domains, Part 1

As the tactics of threat actors evolve, so do the roles of security professionals. Having a solid understanding of core security concepts will support your growth in this field. One way to better understand these core concepts is by organizing them into categories, called security domains.  
  
As of 2022, CISSP has defined eight domains to organize the work of security professionals. It's important to understand that these domains are related and that gaps in one domain can result in negative consequences to an entire organization.  
  
It's also important to understand the domains because it may help you better understand your career goals and your role within an organization. As you learn more about the elements of each domain, the work involved in one may appeal to you more than the others. This domain may become a career path for you to explore further.  
  
CISSP defines eight domains in total, and we'll discuss all eight between this video and the next. In this video, we're going to cover the first four: security and risk management, asset security, security architecture and engineering, and communication and network security.  
  
Let's start with the first domain, security and risk management. Security and risk management focuses on defining security goals and objectives, risk mitigation, compliance, business continuity, and the law. For example, security analysts may need to update company policies related to private health information if a change is made to a federal compliance regulation such as the Health Insurance Portability and Accountability Act, also known as HIPAA.  
  
The second domain is asset security. This domain focuses on securing digital and physical assets. It's also related to the storage, maintenance, retention, and destruction of data. When working with this domain, security analysts may be tasked with making sure that old equipment is properly disposed of and destroyed, including any type of confidential information.  
  
The third domain is security architecture and engineering. This domain focuses on optimizing data security by ensuring effective tools, systems, and processes are in place. As a security analyst, you may be tasked with configuring a firewall. A firewall is a device used to monitor and filter incoming and outgoing computer network traffic. Setting up a firewall correctly helps prevent attacks that could affect productivity.  
  
The fourth security domain is communication and network security. This domain focuses on managing and securing physical networks and wireless communications. As a security analyst, you may be asked to analyze user behavior within your organization.  
  
Imagine discovering that users are connecting to unsecured wireless hotspots. This could leave the organization and its employees vulnerable to attacks. To ensure communications are secure, you would create a network policy to prevent and mitigate exposure.  
  
Maintaining an organization's security is a team effort, and there are many moving parts. As an entry-level analyst, you will continue to develop your skills by learning how to mitigate risks to keep people and data safe.  
  
You don't need to be an expert in all domains. But, having a basic understanding of them will aid you in your journey as a security professional.  
  
You're doing great! We have just introduced the first four security domains, and in the next video, we'll discuss four more! See you soon!

# Introduction to the eight CISSP security domains, Part 2

Welcome back. In the last video, we introduced you to the first four security domains. In this video, we'll introduce you to the next four security domains: identity and access management, security assessment and testing, security operations, and software development security.  
  
Familiarizing yourself with these domains will allow you to navigate the complex world of security. The domains outline and organize how a team of security professionals work together. Depending on the organization, analyst roles may sit at the intersection of multiple domains or focus on one specific domain. Knowing where a particular role fits within the security landscape will help you prepare for job interviews and work as part of a full security team.  
  
Let's move into the fifth domain: identity and access management. Identity and access management focuses on keeping data secure, by ensuring users follow established policies to control and manage physical assets, like office spaces, and logical assets, such as networks and applications. Validating the identities of employees and documenting access roles are essential to maintaining the organization's physical and digital security. For example, as a security analyst, you may be tasked with setting up employees' keycard access to buildings.  
  
The sixth domain is security assessment and testing. This domain focuses on conducting security control testing, collecting and analyzing data, and conducting security audits to monitor for risks, threats, and vulnerabilities. Security analysts may conduct regular audits of user permissions, to make sure that users have the correct level of access. For example, access to payroll information is often limited to certain employees, so analysts may be asked to regularly audit permissions to ensure that no unauthorized person can view employee salaries.  
  
The seventh domain is security operations. This domain focuses on conducting investigations and implementing preventative measures. Imagine that you, as a security analyst, receive an alert that an unknown device has been connected to your internal network. You would need to follow the organization's policies and procedures to quickly stop the potential threat.  
  
The final, eighth domain is software development security. This domain focuses on using secure coding practices, which are a set of recommended guidelines that are used to create secure applications and services. A security analyst may work with software development teams to ensure security practices are incorporated into the software development life-cycle. If, for example, one of your partner teams is creating a new mobile app, then you may be asked to advise on the password policies or ensure that any user data is properly secured and managed.  
  
That ends our introduction to CISSP's eight security domains. Challenge yourself to better understand each of these domains and how they affect the overall security of an organization. While they may still be a bit unclear to you this early in the program, these domains will be discussed in greater detail in the next course. See you there!  
  
​

# Determine the type of attack

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Previously, you learned about the eight Certified Information Systems Security Professional (CISSP) security domains. The domains can help you better understand how a security analyst's job duties can be organized into categories. Additionally, the domains can help establish an understanding of how to manage risk. In this reading, you will learn about additional methods of attack. You’ll also be able to recognize the types of risk these attacks present.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Attack types</span>

<div id="bkmrk-" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![Graphic of the eight icons that represent the CISSP security domains.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/fJ0g68UxToW3OSJob2ecKg_30973561259c420c8fe8ae7697cf10f1_CS_R-021_Security-domains.png?expiry=1685664000000&hmac=mOqr5-iKBzMDuD3iTctbYBfUyUJSyhyST-HBel-xN6o)</figure></div>### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Password attack**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**password attack**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is an attempt to access password-secured devices, systems, networks, or data. Some forms of password attacks that you’ll learn about later in the certificate program are: </span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Brute force</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Rainbow table</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Password attacks fall under the communication and network security domain. </span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Social engineering attack**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Social engineering** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">is a manipulation technique that exploits human error to gain private information, access, or valuables. Some forms of social engineering attacks that you will continue to learn about throughout the program are: </span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Phishing</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Smishing</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Vishing</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Spear phishing</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Whaling</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Social media phishing</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Business Email Compromise (BEC)</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Watering hole attack</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">USB (Universal Serial Bus) baiting</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Physical social engineering </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Social engineering attacks are related to the security and risk management domain.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Physical attack**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**physical attack**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is a security incident that affects not only digital but also physical environments where the incident is deployed. Some forms of physical attacks are:</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Malicious USB cable</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Malicious flash drive</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Card cloning and skimming</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Physical attacks fall under the asset security domain. </span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Adversarial artificial intelligence**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Adversarial artificial intelligence** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">is a technique that manipulates </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[artificial intelligence and machine learning<svg aria-labelledby="cds-react-aria-263-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--1" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.nccoe.nist.gov/ai/adversarial-machine-learning)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> technology to conduct attacks more efficiently. Adversarial artificial intelligence falls under both the communication and network security and the identity and access management domains.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Supply-chain attack**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> **supply-chain attack**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed. Because every item sold undergoes a process that involves third parties, this means that the security breach can occur at any point in the supply chain. These attacks are costly because they can affect multiple organizations and the individuals who work for them. Supply-chain attacks fall under the security and risk management, security architecture and engineering, and security operations domains.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Cryptographic attack**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**cryptographic attack**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> affects secure forms of communication between a sender and intended recipient. Some forms of cryptographic attacks are: </span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Birthday</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Collision</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Downgrade</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Cryptographic attacks fall under the communication and network security domain. </span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Key takeaways</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The eight CISSP security domains can help an organization and its security team fortify against and prepare for a data breach. Data breaches range from simple to complex and fall under one or more domains. Note that the methods of attack discussed are only a few of many. These and other types of attacks will be discussed throughout the certificate program. </span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Resources for more information</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">To view detailed information and definitions of terms covered in this reading, visit the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[National Institute of Standards and Technology (NIST) glossary<svg aria-labelledby="cds-react-aria-264-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--2" role="img" viewbox="0 0 16 16" width="16"></svg>](https://csrc.nist.gov/glossary/term/nist)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">.</span>

# Understand attackers

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Previously, you were introduced to the concept of threat actors. As a reminder, a </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**threat actor**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is any person or group who presents a security risk. In this reading, you’ll learn about different types of threat actors. You will also learn about their motivations, intentions, and how they’ve influenced the security industry.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Threat actor types</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Advanced persistent threats**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Advanced persistent threats (APTs) have significant expertise accessing an organization's network without authorization. APTs tend to research their targets (e.g., large corporations or government entities) in advance and can remain undetected for an extended period of time. Their intentions and motivations can include:</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Damaging critical infrastructure, such as the power grid and natural resources</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Gaining access to intellectual property, such as trade secrets or patents</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Insider threats**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Insider threats abuse their authorized access to obtain data that may harm an organization. Their intentions and motivations can include: </span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Sabotage</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Corruption</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Espionage</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Unauthorized data access or leaks </span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Hacktivists**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Hacktivists are threat actors that are driven by a political agenda. They abuse digital technology to accomplish their goals, which may include: </span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Demonstrations</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Propaganda</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Social change campaigns</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Fame</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Hacker types</span>

<div id="bkmrk-" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![Six hackers on computers.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/OHc71ylUQoWnWRkgeKXEgw_2c16d4ed0420478c938c9af9257ccff1_image1.png?expiry=1685664000000&hmac=f7UEspBi7F2rJozrONL1GrcsD764Mzk8IeKbEdjhhOQ)</figure></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> **hacker** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">is any person who uses computers to gain access to computer systems, networks, or data. They can be beginner or advanced technology professionals who use their skills for a variety of reasons. There are three main categories of hackers:</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Authorized hackers are also called ethical hackers. They follow a code of ethics and adhere to the law to conduct organizational risk evaluations. They are motivated to safeguard people and organizations from malicious threat actors.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Semi-authorized hackers are considered researchers. They search for vulnerabilities but don’t take advantage of the vulnerabilities they find.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Unauthorized hackers are also called unethical hackers. They are malicious threat actors who do not follow or respect the law. Their goal is to collect and sell confidential data for financial gain. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Note:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">There are multiple hacker types that fall into one or more of these three categories.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">New and unskilled threat actors have various goals, including: </span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">To learn and enhance their hacking skills</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">To seek revenge</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">To exploit security weaknesses by using existing malware, programming scripts, and other tactics </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Other types of hackers are not motivated by any particular agenda other than completing the job they were contracted to do. These types of hackers can be considered unethical or ethical hackers. They have been known to work on both illegal and legal tasks for pay.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">There are also hackers who consider themselves vigilantes. Their main goal is to protect the world from unethical hackers.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Key takeaways</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Threat actors and hackers are technically skilled individuals. Understanding their motivations and intentions will help you be better prepared to protect your organization and the people it serves from malicious attacks carried out by some of these individuals and groups. </span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Resources for more information</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">To learn more about how security teams work to keep organizations and people safe, explore the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Hacking Google <svg aria-labelledby="cds-react-aria-43-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--1" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.youtube.com/playlist?list=PL590L5WQmH8dsxxz7ooJAgmijwOz0lh2H)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">series of videos.</span>

# Wrap-up

This concludes our brief introduction to some of the most influential security attacks throughout history and CISSP's eight security domains. Let's review what we've discussed.  
  
First, we covered viruses, including the Brain virus and the Morris worm, and discussed how these early forms of malware shaped the security industry. We also discussed how many attacks today are variants of these early examples. Understanding previous attacks is critical for security professionals who are working to protect organizations and people from possible future variants.  
  
We also discussed social engineering and threat actor motives by learning about the LoveLetter attack and the Equifax data breach. These incidents showed the widespread impacts and associated costs of more recent security breaches in the digital age.  
  
Finally, we introduced CISSP's eight security domains and how they can be used to categorize different areas of focus within the security profession.  
  
I hope you're feeling confident about your foundational security knowledge! Learning the history of security can allow you to better understand the current industry. CISSP's eight security domains provide a way to organize the work of security professionals.  
  
Remember, every security professional is essential. Your unique point of view, professional background, and knowledge are valuable. So, the diversity you bring to the field will further improve the security industry as you work to keep organizations and people safe.

# Frameworks and controles

# Secure design

Hi, welcome back! Previously, we discussed frameworks and controls in general. In this video, you'll learn about specific frameworks and controls that organizations can voluntarily use to minimize risks to their data and to protect users. Let's get started!  
  
The CIA triad is a foundational model that helps inform how organizations consider risk when setting up systems and security policies. CIA stands for confidentiality, integrity, and availability.  
  
Confidentiality means that only authorized users can access specific assets or data. For example, strict access controls that define who should and should not have access to data, must be put in place to ensure confidential data remains safe.  
  
Integrity means the data is correct, authentic, and reliable. To maintain integrity, security professionals can use a form of data protection like encryption to safeguard data from being tampered with.  
  
Availability means data is accessible to those who are authorized to access it. As an example, a director may have more access to certain data than a department manager because directors usually oversee more employees.  
  
Let's define a term that came up during our discussion of the CIA triad: asset. An asset is an item perceived as having value to an organization. And value is determined by the cost associated with the asset in question. For example, an application that stores sensitive data, such as social security numbers or bank accounts, is a valuable asset to an organization. It carries more risk and therefore requires tighter security controls in comparison to a website that shares publicly available news content.  
  
As you may remember, earlier in the course, we discussed frameworks and controls in general. Now, we'll discuss a specific framework developed by the U.S.-based National Institute of Standards and Technology: the Cybersecurity Framework, also referred to as the NIST CSF. The NIST Cybersecurity Framework is a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk. It's important to become familiar with this framework because security teams use it as a baseline to manage short and long-term risk.

  
Managing and mitigating risks and protecting an organization's assets from threat actors are key goals for security professionals. Understanding the different motives a threat actor may have, alongside identifying your organization's most valuable assets is important.  
Some of the most dangerous threat actors to consider are disgruntled employees. They are the most dangerous because they often have access to sensitive information and know where to find it. In order to reduce this type of risk, security professionals would use the principle of availability, as well as organizational guidelines based on frameworks to ensure staff members can only access the data they need to perform their jobs.  
  
Threat actors originate from all across the globe, and a diverse workforce of security professionals helps organizations identify attackers' intentions. A variety of perspectives can assist organizations in understanding and mitigating the impact of malicious activity.  
  
That concludes our introduction to the CIA triad and NIST CSF framework, which are used to develop processes to secure organizations and the people they serve.  
  
You may be asked in an interview if you know about security frameworks and principles. Or you may be asked to explain how they're used to secure organizational assets. In either case, throughout this program, you'll have multiple opportunities to learn more about them and apply what we've discussed to real-world situations.  
  
Coming up, we'll discuss the ethics of security. See you soon!

# Introduction to security frameworks and controls

Imagine you're working as a security analyst and receive multiple alerts about suspicious activity on the network. You realize that you'll need to implement additional security measures to keep these alerts from becoming serious incidents. But where do you start?  
  
As an analyst, you'll start by identifying your organization's critical assets and risks. Then you'll implement the necessary frameworks and controls.  
  
In this video, we'll discuss how security professionals use frameworks to continuously identify and manage risk. We'll also cover how to use security controls to manage or reduce specific risks.  
  
Security frameworks are guidelines used for building plans to help mitigate risks and threats to data and privacy. Security frameworks provide a structured approach to implementing a security lifecycle. The security lifecycle is a constantly evolving set of policies and standards that define how an organization manages risks, follows established guidelines, and meets regulatory compliance, or laws.  
  
There are several security frameworks that may be used to manage different types of organizational and regulatory compliance risks. The purpose of security frameworks include protecting personally identifiable information, known as PII, securing financial information, identifying security weaknesses, managing organizational risks, and aligning security with business goals.  
  
Frameworks have four core components and understanding them will allow you to better manage potential risks. The first core component is identifying and documenting security goals. For example, an organization may have a goal to align with the E.U.'s General Data Protection Regulation, also known as GDPR. GDPR is a data protection law established to grant European citizens more control over their personal data. A security analyst may be asked to identify and document areas where an organization is out of compliance with GDPR.  
  
The second core component is setting guidelines to achieve security goals. For example, when implementing guidelines to achieve GDPR compliance, your organization may need to develop new policies for how to handle data requests from individual users.  
  
The third core component of security frameworks is implementing strong security processes. In the case of GDPR, a security analyst working for a social media company may help design procedures to ensure the organization complies with verified user data requests. An example of this type of request is when a user attempts to update or delete their profile information.  
  
The last core component of security frameworks is monitoring and communicating results. As an example, you may monitor your organization's internal network and report a potential security issue affecting GDPR to your manager or regulatory compliance officer.  
  
Now that we've introduced the four core components of security frameworks, let's tie them all together. Frameworks allow analysts to work alongside other members of the security team to document, implement, and use the policies and procedures that have been created. It's essential for an entry-level analyst to understand this process because it directly affects the work they do and how they collaborate with others. Next, we'll discuss security controls.  
  
Security controls are safeguards designed to reduce specific security risks. For example, your company may have a guideline that requires all employees to complete a privacy training to reduce the risk of data breaches. As a security analyst, you may use a software tool to automatically assign and track which employees have completed this training.  
  
Security frameworks and controls are vital to managing security for all types of organizations and ensuring that everyone is doing their part to maintain a low level of risk.  
  
Understanding their purpose and how they are used allows analysts to support an organization's security goals and protect the people it serves.  
  
In the following videos, we'll discuss some well-known frameworks and principles that analysts need to be aware of to minimize risk and protect data and users.

# Controls, frameworks, and compliance

#   


<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Previously, you were introduced to security frameworks and how they provide a structured approach to implementing a security lifecycle. As a reminder, a security lifecycle is a constantly evolving set of policies and standards. In this reading, you will learn more about how security frameworks, controls, and compliance regulations—or laws—are used together to manage security and make sure everyone does their part to minimize risk.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">How controls, frameworks, and compliance are related</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**confidentiality, integrity, and availability (CIA) triad**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is a model that helps inform how organizations consider risk when setting up systems and security policies. </span>

<div class="rc-CML" dir="auto" id="bkmrk--1" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![A triangle representing the CIA (confidentiality, integrity, availability) triad](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/tRYBVP2USbGPopkOfhzPpw_6ab653e71a614420b313c9e7675893f1_PULBC_YPYaRtzxvZUx-luk79t2pB_kZEoF2XeW17w6D2BekL7XaIUhCIAf65kNzAZU-WXYJ6IwhMr_jwiPhYMd2kWk5TyfeNFUy4ax3hyj_fJbtGSEw4UB0bzaA-E-gKD5tG8yud6Q2kmQFomLoF4CGW-0cCnhAyOvriAcCqrRKDlJMkaNOReSToFqs5I_cjfFOVTU9cmwiYyFETx2_4Gbf80z4rpW3ioqxBAw?expiry=1685836800000&hmac=0oZBxy-XGKlpDrM2Rm_5TMQW4hzfu1TAqkXXOnF-Fzc)</figure></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">CIA are the three foundational principles used by cybersecurity professionals to establish appropriate controls that mitigate threats, risks, and vulnerabilities.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">As you may recall, </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**security**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**controls**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> are safeguards designed to reduce specific security risks. So they are used alongside frameworks to ensure that security goals and processes are implemented correctly and that organizations meet regulatory compliance requirements.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Security frameworks**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> are guidelines used for building plans to help mitigate risks and threats to data and privacy. They have four core components:</span>

<div class="rc-CML" dir="auto" id="bkmrk-identifying-and-docu" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">1. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Identifying and documenting security goals </span>
2. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Setting guidelines to achieve security goals </span>
3. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Implementing strong security processes</span>
4. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Monitoring and communicating results</span>

</div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Compliance**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is the process of adhering to internal standards and external regulations.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Specific controls, frameworks, and compliance</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The National Institute of Standards and Technology (NIST) is a U.S.-based agency that develops multiple voluntary compliance frameworks that organizations worldwide can use to help manage risk. The more aligned an organization is with compliance, the lower the risk.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Examples of frameworks that were introduced previously include the NIST Cybersecurity Framework (CSF) and the NIST Risk Management Framework (RMF). </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Note:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Specifications and guidelines can change depending on the type of organization you work for.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">In addition to the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[NIST CSF<svg aria-labelledby="cds-react-aria-77-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--2" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.nist.gov/cyberframework)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> and </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[NIST RMF<svg aria-labelledby="cds-react-aria-78-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--3" role="img" viewbox="0 0 16 16" width="16"></svg>](https://csrc.nist.gov/projects/risk-management/about-rmf)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">, there are several other controls, frameworks, and compliance standards that it is important for security professionals to be familiar with to help keep organizations and the people they serve safe.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**The Federal Energy Regulatory Commission - North American Electric Reliability Corporation (FERC-NERC)**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">FERC-NERC is a regulation that applies to organizations that work with electricity or that are involved with the U.S. and North American power grid. These types of organizations have an obligation to prepare for, mitigate, and report any potential security incident that can negatively affect the power grid. They are also legally required to adhere to the Critical Infrastructure Protection (CIP) Reliability Standards defined by the FERC. </span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**The Federal Risk and Authorization Management Program (FedRAMP®)**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">FedRAMP is a U.S. federal government program that standardizes security assessment, authorization, monitoring, and handling of cloud services and product offerings. Its purpose is to provide consistency across the government sector and third-party cloud providers. </span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Center for Internet Security (CIS®)**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">CIS is a nonprofit with multiple areas of emphasis. It provides a set of controls that can be used to safeguard systems and networks against attacks. Its purpose is to help organizations establish a better plan of defense. CIS also provides actionable controls that security professionals may follow if a security incident occurs. </span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**General Data Protection Regulation (GDPR)**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">GDPR is a European Union (E.U.) general data regulation that protects the processing of E.U. residents’ data and their right to privacy in and out of E.U. territory. For example, if an organization is not being transparent about the data they are holding about an E.U. citizen and why they are holding that data, this is an infringement that can result in a fine to the organization. Additionally, if a breach occurs and an E.U. citizen’s data is compromised, they must be informed. The affected organization has 72 hours to notify the E.U. citizen about the breach.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Payment Card Industry Data Security Standard (PCI DSS)**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">PCI DSS is an international security standard meant to ensure that organizations storing, accepting, processing, and transmitting credit card information do so in a secure environment. The objective of this compliance standard is to reduce credit card fraud. </span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**The Health Insurance Portability and Accountability Act (HIPAA)**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">HIPAA is a U.S. federal law established in 1996 to protect patients' health information. This law prohibits patient information from being shared without their consent. It is governed by three rules: </span>

<div class="rc-CML" dir="auto" id="bkmrk-privacy-security%C2%A0-br" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">1. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Privacy</span>
2. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Security </span>
3. <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Breach notification </span>

</div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Organizations that store patient data have a legal obligation to inform patients of a breach because if patients' </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Protected Health Information**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> (PHI) is exposed, it can lead to identity theft and insurance fraud. PHI relates to the past, present, or future physical or mental health or condition of an individual, whether it’s a plan of care or payments for care. Along with understanding HIPAA as a law, security professionals also need to be familiar with the Health Information Trust Alliance (HITRUST®), which is a security framework and assurance program that helps institutions meet HIPAA compliance.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**International Organization for Standardization (ISO)** </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">ISO was created to establish international standards related to technology, manufacturing, and management across borders. It helps organizations improve their processes and procedures for staff retention, planning, waste, and services. </span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**System and Organizations Controls (SOC type 1, SOC type 2)**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The American Institute of Certified Public Accountants® (AICPA) auditing standards board developed this standard. The SOC1 and SOC2 are a series of reports that focus on an organization's user access policies at different organizational levels such as: </span>

<div class="rc-CML" dir="auto" id="bkmrk-associate-supervisor" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Associate</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Supervisor</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Manager</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Executive</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Vendor </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Others </span>

</div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">They are used to assess an organization’s financial compliance and levels of risk. They also cover confidentiality, privacy, integrity, availability, security, and overall data safety. Control failures in these areas can lead to fraud.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Pro tip**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: There are a number of regulations that are frequently revised. You are encouraged to keep up-to-date with changes and explore more frameworks, controls, and compliance. Two suggestions to research: the Gramm-Leach-Bliley Act and the Sarbanes-Oxley Act.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">United States Presidential Executive Order 14028</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">On May 12, 2021, President Joe Biden released an executive order related to improving the nation’s cybersecurity to remediate the increase in threat actor activity. Remediation efforts are directed toward federal agencies and third parties with ties to U.S. </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[critical infrastructure<svg aria-labelledby="cds-react-aria-79-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--4" role="img" viewbox="0 0 16 16" width="16"></svg>](https://csrc.nist.gov/glossary/term/critical_infrastructure#:~:text=Definition(s)%3A,any%20combination%20of%20those%20matters.)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">. For additional information, review the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Executive Order on Improving the Nation’s Cybersecurity<svg aria-labelledby="cds-react-aria-80-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--5" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Key takeaways</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">In this reading you learned more about controls, frameworks, and compliance. You also learned how they work together to help organizations maintain a low level of risk.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">As a security analyst, it’s important to stay up-to-date on common frameworks, controls, and compliance regulations and be aware of changes to the cybersecurity landscape to help ensure the safety of both organizations and people.</span>

# Heather: Protect sensitive data and information

  
Hello, my name is Heather and I'm the Vice President of Security Engineering at Google. PII has been an important topic on the internet since the beginning of the internet. And we have been talking about increasingly sophisticated ways to protect that data over time. When we think about collecting PII on behalf of another person, we should make sure we're very deliberate about how it's handled and where it's stored, and that we understand where it's stored all the time. Depending on what kind of role you're in, you might also need to protect that data to comply with regulation or law. And so, it's important to understand how the data relates to some of those obligations. If an organization fails to meet their obligations, a number of things might happen. First, you might see a government regulator become more interested in understanding the practices around how a company is handling data. Secondly, consumers, customers, businesses may actually begin to directly inquire of the company how they're handling data. And this may become part of the customer relationship and increasingly important if that data is very sensitive. And third, the last consequence is legal action. And it's not uncommon for us to see victims of cybersecurity incidents now suing companies for mishandling their data. You can keep up to date with compliance, regulation and laws around PII by consulting the relevant website in the jurisdiction that you have a question for. Many government websites now post the laws, regulations, and compliance requirements for data that's being handled. The regulations and laws that govern how PII can be handled are very complex, all over the world, countries, states, counties are regulating it at different levels. It's important to understand and to be aware that these laws exist. However, if you need to ask a question about a specific law, it's important to seek advice from legal counsel for that particular jurisdiction. It may be very different than the jurisdiction that you're in.

# Ethics in Cybersecurity

# Ethics in Cybersecurity

In security, new technologies present new challenges. For every new security incident or risk, the right or wrong decision isn't always clear.  
  
For example, imagine that you're working as an entry-level security analyst and you have received a high risk alert. You investigate the alert and discover data has been transferred without authorization.  
  
You work diligently to identify who made the transfer and discover it is one of your friends from work. What do you do?  
  
Ethically, as a security professional, your job is to remain unbiased and maintain security and confidentiality.  
  
While it's normal to want to protect a friend, regardless of who the user in question may be, your responsibility and obligation is to adhere to the policies and protocols you've been trained to follow. In many cases, security teams are entrusted with greater access to data and information than other employees. Security professionals must respect that privilege and act ethically at all times.  
  
Security ethics are guidelines for making appropriate decisions as a security professional. As another example, if you as an analyst have the ability to grant yourself access to payroll data and can give yourself a raise, just because you have access to do so, does that mean you should? The answer is no. You should never abuse the access you've been granted and entrusted with.  
  
Let's discuss ethical principles that may raise questions as you navigate solutions for mitigating risks. These are confidentiality, privacy protections, and laws.

  
Let's begin with the first ethical principle, confidentiality. Earlier we discussed confidentiality as part of the CIA triad. Now let's discuss how confidentiality can be applied to ethics. As a security professional, you'll encounter proprietary or private information, such as PII. It's your ethical duty to keep that information confidential and safe. For example, you may want to help out a coworker by providing computer system access outside of properly documented channels. However, this ethical violation can result in serious consequences, including reprimands, the loss of your professional reputation, and legal repercussions for both you and your friend.  
\\  
The second ethical principle to consider is privacy protections. Privacy protection means safeguarding personal information from unauthorized use. For example, imagine you receive a personal email after hours from your manager requesting a colleague's home phone number. Your manager explains that they can't access the employee database at the moment, but they need to discuss an urgent matter with that person.  
  
As a security analyst, your role is to follow the policies and procedures of your company, which in this example, state that employee information is stored in a secure database and should never be accessed or shared in any other format. So, accessing and sharing the employee's personal information would be unethical. In situations like this, it can be difficult to know what to do. So, the best response is to adhere to the policies and procedures set by your organization.  
  
A third important ethical principle we must discuss is the law. Laws are rules that are recognized by a community and enforced by a governing entity.  
  
For example, consider a staff member at a hospital who has been trained to handle PII, and SPII for compliance. The staff member has files with confidential data that should never be left unsupervised, but the staff member is late for a meeting. Instead of locking the files in a designated area, the files are left on the staff member's desk, unsupervised. Upon the employee's return, the files are missing. The staff member has just violated multiple compliance regulations, and their actions were unethical and illegal, since their negligence has likely resulted in the loss of private patient and hospital data.  
  
As you enter the security field, remember that technology is constantly evolving, and so are attackers' tactics and techniques. Because of this, security professionals must continue to think critically about how to respond to attacks.  
  
Having a strong sense of ethics can guide your decisions to ensure that the proper processes and procedures are followed to mitigate these continually evolving risks.

# New Page



# Ethical concepts that guide cybersecurity decisions

#   


<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Previously, you were introduced to the concept of security ethics. </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Security ethics**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> are guidelines for making appropriate decisions as a security professional. Being ethical requires that security professionals remain unbiased and maintain the security and confidentiality of private data. Having a strong sense of ethics can help you navigate your decisions as a cybersecurity professional so you’re able to mitigate threats posed by threat actors’ constantly evolving tactics and techniques. In this reading, you’ll learn about more ethical concepts that are essential to know so you can make appropriate decisions about how to legally and ethically respond to attacks in a way that protects organizations and people alike. </span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Ethical concerns and laws related to counterattacks </span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**United States standpoint on counterattacks** </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">In the U.S., deploying a counterattack on a threat actor is illegal because of laws like the Computer Fraud and Abuse Act of 1986 and the Cybersecurity Information Sharing Act of 2015, among others. You can only defend. The act of counterattacking in the U.S. is perceived as an act of vigilantism. A</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">vigilante is a person who is not a member of law enforcement who decides to stop a crime on their own. And because threat actors are criminals, counterattacks can lead to further escalation of the attack, which can cause even more damage and harm. Lastly, if the threat actor in question is a state-sponsored hacktivist, a counterattack can lead to serious international implications. A </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**hacktivist**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is a person who uses hacking to achieve a political goal. The political goal may be to promote social change or civil disobedience. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">For these reasons, the only individuals in the U.S. who are allowed to counterattack are approved employees of the federal government or military personnel. </span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**International standpoint on counterattacks**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The International Court of Justice (ICJ), which updates its guidance regularly, states that a person or group can counterattack if: </span>

<div class="rc-CML" dir="auto" id="bkmrk-the-counterattack-wi" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The counterattack will only affect the party that attacked first.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The counterattack is a direct communication asking the initial attacker to stop.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The counterattack does not escalate the situation.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The counterattack effects can be reversed.</span>

</div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Organizations typically do not counterattack because the above scenarios and parameters are hard to measure. There is a lot of uncertainty dictating what is and is not lawful, and at times negative outcomes are very difficult to control. Counterattack actions generally lead to a worse outcome, especially when you are not an experienced professional in the field. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">To learn more about specific scenarios and ethical concerns from an international perspective, review updates provided in the “Tallinn Manual 2.0 On The International Law Applicable to Cyber Operations” or access the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Tallinn Manual online<svg aria-labelledby="cds-react-aria-246-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--1" role="img" viewbox="0 0 16 16" width="16"></svg>](https://ccdcoe.org/research/tallinn-manual/ "Tallinn Manual")</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Ethical principles and methodologies</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Because counterattacks are generally disapproved of or illegal, the security realm has created frameworks and controls—such as the confidentiality, integrity, and availability (CIA) triad and others discussed earlier in the program—to address issues of confidentiality, privacy protections, and laws. To better understand the relationship between these issues and the ethical obligations of cybersecurity professionals, review the following key concepts as they relate to using ethics to protect organizations and the people they serve. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Confidentiality**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> means that only authorized users can access specific assets or data. Confidentiality as it relates to professional ethics means that there needs to be a high level of respect for privacy to safeguard private assets and data.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Privacy protection**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> means safeguarding personal information from unauthorized use. Personally identifiable information (PII) and sensitive personally identifiable information (SPII)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">are types of personal data that can cause people harm if they are stolen. </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**PII** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">data is any information used to infer an individual's identity, like their name and phone number. </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**SPII**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> data is a specific type of PII that falls under stricter handling guidelines, including social security numbers and credit card numbers. To effectively safeguard PII and SPII</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">data, security professionals hold an ethical obligation to secure private information, identify security vulnerabilities, manage organizational risks, and align security with business goals. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Laws**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> are rules that are recognized by a community and enforced by a governing entity. As a security professional, you will have an ethical obligation to protect your organization, its internal infrastructure, and the people involved with the organization. To do this:</span>

<div class="rc-CML" dir="auto" id="bkmrk-you-must-remain-unbi" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">You must remain unbiased and conduct your work honestly, responsibly, and with the highest respect for the law. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Be transparent and just, and rely on evidence.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Ensure that you are consistently invested in the work you are doing, so you can appropriately and ethically address issues that arise. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Stay informed and strive to advance your skills, so you can contribute to the betterment of the cyber landscape. </span>

</div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> As an example, consider the</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> **Health Insurance Portability and Accountability Act (HIPAA)**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">, which is a U.S. federal law established to protect patients' health information, also known as PHI, or protected health information. This law prohibits patient information from being shared without their consent. So, as a security professional, you might help ensure that the organization you work for adheres to both its legal and ethical obligation to inform patients of a breach if their health care data is exposed.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Key takeaways</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">As a future security professional, ethics will play a large role in your daily work. Understanding ethics and laws will help you make the correct choices if and when you encounter a security threat or an incident that results in a breach.</span>

# Holly: The importance of ethics as a cybersecurity professional

Hi, I'm Holly and I'm a Cloud Security Architect with Google Cloud. At the beginning of my adult career, I sold hosiery while I was going to school. That led me into an opportunity to work in banking, which then led me into an opportunity to work in telecommunications. From there I managed to get myself into a security vendor and learn security. Part of the way that I was able to change from my original half of my tech career being a database administrator to getting into cybersecurity was through getting certificates like you're doing today. Those really helped me gain credibility with potential employers when I didn't have the experience in this particular field yet. Ethics are really the crux of cybersecurity, you need to be able to be ethical in all of your actions in order to be a cybersecurity professional. Examples of unethical behavior are usually honestly just slight laziness, people taking shortcuts and not really thinking about the consequences of their actions. So, certainly when people share passwords to systems or give out private information, or look into systems for their own personal information or purposes about people they know or about celebrities. One of the most difficult situations that I ever faced in my technology career related to ethics was shortly after 9/11, my boss's boss's boss came to me with a bunch of keywords that were clearly related to the attack in New York and asked me to query the database that I administered that had everybody's text messages in it for the entire telecommunications company without anything in writing and without a court order. I was in a very uncomfortable position to tell someone that much senior than me that I wasn't comfortable doing that. I suggested that he bring something in writing to me to do that and he found someone else who did it for him. When you're faced with one of these difficult decisions, it's good to think about what would be the consequences of your decision. My encouragement to those of you out here taking this program is that the rewards that you get from helping to protect your company or your users or your organization from cyber criminals is really great. We get to be the good guys and help protect our industry and our customers from cyber attacks and cyber criminals. That's rewarding.

# Wrap-up

  
You are now better prepared to understand and help make decisions regarding assessing and managing risks. Let's review what we've covered.  
  
We discussed security frameworks and controls and how they're used to develop processes and procedures that protect organizations and the people they serve. We also discussed core components of frameworks, such as identifying security goals and establishing guidelines to achieve those goals.  
  
Then, we introduced specific frameworks and controls, including the CIA triad and the NIST CSF, and how they are used to manage risk.  
  
And finally, we discussed security ethics, including common ethical issues to consider, such as confidentiality, privacy protections, and laws.  
  
You're almost there, only one more section to go in this course. Coming up, you'll learn about common tools and programming languages used by security analysts to protect organizational operations. Hope you're as excited as I am to keep going!

# Important Cybersecurity tools

# Welcome to week 4

Welcome to the final section of this course! Here, we'll be introducing tools and programming languages that are commonly used in the security field. They are essential for monitoring security in an organization because they enhance efficiency by automating tasks. Although we're only introducing these concepts and tools at this point, later in the program, you'll have opportunities to use them in a variety of hands-on activities.  
  
In the following videos, you'll learn about security information and event management, or SIEM, tools. You'll also be introduced to other tools such as playbooks and network protocol analyzers.  
  
Then, you'll learn about the Linux operating system and security-related tasks that are initiated through programming languages, such as SQL and Python.  
  
For me, SQL is one of the most useful tools. It allows me to explore all the different data sources we collect, and it allows my team to analyze the data for trends.  
  
Take your time going through the videos and if you need to, re-watch them. Also know that these tools will be discussed in much more detail, and you will be able to practice them firsthand, later in the certificate program.  
  
While every organization has their own set of tools and training materials that you'll learn to use on the job, this program will provide you with foundational knowledge that will help you succeed in the security industry. Let's get started!  
  
​

# Common cybersecurity tools

As mentioned earlier, security is like preparing for a storm. If you identify a leak, the color or shape of the bucket you use to catch the water doesn't matter. What is important is mitigating the risks and threats to your home, by using the tools available to you.  
  
As an entry-level security analyst, you'll have a lot of tools in your toolkit that you can use to mitigate potential risks.  
  
In this video, we'll discuss the primary purposes and functions of some commonly used security tools. And later in the program, you'll have hands-on opportunities to practice using them. Before discussing tools further, let's briefly discuss logs, which are the source of data that the tools we'll cover are designed to organize.  
  
A log is a record of events that occur within an organization's systems. Examples of security-related logs include records of employees signing into their computers or accessing web-based services. Logs help security professionals identify vulnerabilities and potential security breaches.  
  
The first tools we'll discuss are security information and event management tools, or SIEM tools. A SIEM tool is an application that collects and analyzes log data to monitor critical activities in an organization. The acronym S-I-E-M may be pronounced as 'sim' or 'seem', but we'll use 'sim' throughout this program. SIEM tools collect real-time, or instant, information, and allow security analysts to identify potential breaches as they happen.  
  
Imagine having to read pages and pages of logs to determine if there are any security threats. Depending on the amount of data, it could take hours or days. SIEM tools reduce the amount of data an analyst must review by providing alerts for specific types of risks and threats. Next, let's go over examples of commonly used SIEM tools: Splunk and Chronicle.  
  
Splunk is a data analysis platform, and Splunk Enterprise provides SIEM solutions. Splunk Enterprise is a self-hosted tool used to retain, analyze, and search an organization's log data.  
  
Another SIEM tool is Google's Chronicle. Chronicle is a cloud-native SIEM tool that stores security data for search and analysis. Cloud-native means that Chronicle allows for fast delivery of new features.  
  
Both of these SIEM tools, and SIEMs in general, collect data from multiple places, then analyze and filter that data to allow security teams to prevent and quickly react to potential security threats.  
  
As a security analyst, you may find yourself using SIEM tools to analyze filtered events and patterns, perform incident analysis, or proactively search for threats. Depending on your organization's SIEM setup and risk focus, the tools and how they function may differ, but ultimately, they are all used to mitigate risk.  
  
Other key tools that you will use in your role as a security analyst, and that you'll have hands-on opportunities to use later in the program, are playbooks and network protocol analyzers.  
  
A playbook is a manual that provides details about any operational action, such as how to respond to an incident. Playbooks, which vary from one organization to the next, guide analysts in how to handle a security incident before, during, and after it has occurred. Playbooks can pertain to security or compliance reviews, access management, and many other organizational tasks that require a documented process from beginning to end.  
  
Another tool you may use as a security analyst is a network protocol analyzer, also called packet sniffer. A packet sniffer is a tool designed to capture and analyze data traffic within a network. Common network protocol analyzers include tcpdump and Wireshark.  
  
As an entry-level analyst, you don't have to be an expert in these tools. As you continue through this certificate program and get more hands-on practice, you'll continuously build your understanding of how to use these tools to identify, assess, and mitigate risks.

# Tools for protecting business operations

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Previously, you were introduced to several technical skills that security analysts need to develop. You were also introduced to some tools entry-level security analysts may have in their toolkit. In this reading, you’ll learn more about how technical skills and tools help security analysts mitigate risks.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">An entry-level analyst’s toolkit</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Every organization may provide a different toolkit, depending on its security needs. As a future analyst, it’s important that you are familiar with industry standard tools and can demonstrate your ability to learn how to use similar tools in a potential workplace. </span>

<div id="bkmrk-" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: pre-wrap; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![A person with a toolkit with different tools inside](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/AdQEfO77TLqdl3ed2dURuA_a519cb171bec4be092e5478eb1373df1_CS_R-014_Animation-still-S48A015.png?expiry=1685836800000&hmac=hdIS3XQU1REIm8kSj8tOQjsqXByKRzJDpx9CEcE-IMk)</figure></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Security information and event management (SIEM) tools**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> **SIEM tool**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is an application that collects and analyzes log data to monitor critical activities in an organization. A </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**log**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is a record of events that occur within an organization’s systems. Depending on the amount of data you’re working with, it could take hours or days to filter through log data on your own. SIEM tools reduce the amount of data an analyst must review by providing alerts for specific types of threats, risks, and vulnerabilities.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">SIEM tools provide a series of dashboards</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">that visually organize data into categories, allowing users to select the data they wish to analyze. Different SIEM tools</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">have different dashboard types that display the information you have access to. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">SIEM tools also come with different hosting options, including on-premise and cloud. Organizations may choose one hosting option over another based on a security team member’s expertise. For example, because a cloud-hosted version tends to be easier to set up, use, and maintain than an on-premise version, a less experienced security team may choose this option for their organization.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Network protocol analyzers (packet sniffers)</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**network protocol analyzer**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">, also known as a</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> **packet sniffer**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">, is a tool designed to capture and analyze data traffic in a network. This means that the tool keeps a record of all the data that a computer within an organization's network encounters. Later in the program, you’ll have an opportunity to practice using some common network protocol analyzer (packet sniffer) tools. </span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Playbooks</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> **playbook**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is a manual that provides details about any operational action, such as how to respond to a security incident. Organizations usually have multiple playbooks documenting processes and procedures for their teams to follow. Playbooks vary from one organization to the next, but they all have a similar purpose: To guide analysts through a series of steps to complete specific security-related tasks. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">For example, consider the following scenario: You are working as a security analyst for an incident response firm. You are given a case involving a small medical practice that has suffered a security breach. Your job is to help with the forensic investigation and provide evidence to a cybersecurity insurance company. They will then use your investigative findings to determine whether the medical practice will receive their insurance payout. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">In this scenario, playbooks would outline the specific actions you need to take to conduct the investigation. Playbooks also help ensure that you are following proper protocols and procedures. When working on a forensic case, there are two playbooks you might follow:</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The first type of playbook you might consult is called the</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> **chain of custody** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">playbook.</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Chain of custody is the process of documenting evidence possession and control during an incident lifecycle. As a security analyst involved in a forensic analysis, you will work with the computer data that was breached. You and the forensic team will also need to document who, what, where, and why you have the collected evidence. The evidence is your responsibility while it is in your possession. Evidence must be kept safe and tracked. Every time evidence is moved, it should be reported. This allows all parties involved to know exactly where the evidence is at all times.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The second playbook your team might use is called the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**protecting and preserving evidence** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">playbook. Protecting and preserving evidence is the process of properly working with fragile and volatile digital evidence. As a security analyst, understanding what fragile and volatile digital evidence is, along with why there is a procedure, is critical. As you follow this playbook, you will consult the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**order of volatility**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">,</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">which is a sequence outlining the order of data that must be preserved from first to last. It prioritizes volatile data, which is data that may be lost if the device in question powers off, regardless of the reason. While conducting an investigation, improper management of digital evidence can compromise and alter that evidence. When evidence is improperly managed during an investigation, it can no longer be used. For this reason, the first priority in any investigation is to properly preserve the data. You can preserve the data by making copies and conducting your investigation using those copies.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Key takeaways</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">In this reading, you learned about a few tools a security analyst may have in their toolkit, depending on where they work. You also explored two important types of playbooks: chain of custody and protecting and preserving evidence. However, these are only two procedures that occur at the beginning of a forensic investigation. If forensic investigations interest you, you are encouraged to further explore this career path or security practice. In the process, you may learn about forensic tools that you want to add to your toolkit. While all of the forensic components that make up an investigation will not be covered in this certificate program, some forensic concepts will be discussed in later courses.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Resources for more information</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The Google Cybersecurity Action Team's </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Threat Horizon Report<svg aria-labelledby="cds-react-aria-77-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--1" role="img" viewbox="0 0 16 16" width="16"></svg>](https://services.google.com/fh/files/blogs/gcat_threathorizons_full_sept2022.pdf)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> provides strategic intelligence for dealing with threats to cloud enterprise.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The Cybersecurity &amp; Infrastructure Security Agency (CISA) has a list of </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Free Cybersecurity Services and Tools<svg aria-labelledby="cds-react-aria-78-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--2" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.cisa.gov/free-cybersecurity-services-and-tools)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">. Review the list to learn more about open-source cybersecurity tools.</span>

# Core cybersecurity knowlege and skills

# Introduction to Linux, SQL, and Python

As we discussed previously, organizations use a variety of tools, such as SIEMs, playbooks, and packet sniffers to better manage, monitor, and analyze security threats. But those aren't the only tools in an analyst's toolkit. Analysts also use programming languages and operating systems to accomplish essential tasks.  
  
In this video, we'll introduce you to Python and SQL programming, and the Linux operating system. All of which you'll have an opportunity to practice using later in the certificate program.  
  
Organizations can use programming to create a specific set of instructions for a computer to execute tasks. Programming allows analysts to complete repetitive tasks and processes with a high degree of accuracy and efficiency. It also helps reduce the risk of human error, and can save hours or days compared to performing the work manually. Now that you're aware of what programming languages are used for, let's discuss a specific and related operating system called Linux, and two programming languages: SQL and Python.  
  
Linux is an open-source, or publicly available, operating system. Unlike other operating systems you may be familiar with, for example MacOS or Windows, Linux relies on a command line as the primary user interface. Linux itself is not a programming language, but it does allow for the use of text-based commands between the user and the operating system. You'll learn more about Linux later in the program.  
  
A common use of Linux for entry-level security analysts is examining logs to better understand what's occurring in a system. For example, you might find yourself using commands to review an error log when investigating uncommonly high network traffic.  
  
Next, let's discuss SQL. SQL stands for Structured Query Language. SQL is a programming language used to create, interact with, and request information from a database. A database is an organized collection of information or data. There may be millions of data points in a database. So an entry-level security analyst would use SQL to filter through the data points to retrieve specific information.  
  
The last programming language we'll introduce is Python. Security professionals can use Python to perform tasks that are repetitive and time-consuming and that require a high level of detail and accuracy.  
  
As a future analyst, it's important to understand that every organization's toolkit may be somewhat different based on their security needs. The main point is that you're familiar with some industry standard tools because that will show employers that you have the ability to learn how to use their tools to protect the organization and the people it serves.  
You're doing great! Later in the course, you'll learn more about Linux and programming languages, and you'll practice using these tools in security-related scenarios.

# Create a cybersecurity portfolio

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Throughout this certificate program, you will have multiple opportunities to develop a professional cybersecurity portfolio to showcase your security skills and knowledge.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">In this reading, you’ll learn what a portfolio is and why it’s important to develop a professional cybersecurity portfolio. You’ll also learn about options for creating an online or self-hosted portfolio that you can share with potential employers when you begin to look for cybersecurity jobs.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">What is a portfolio, and why is it necessary?</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Cybersecurity professionals use portfolios to demonstrate their security education, skills, and knowledge. Professionals typically use portfolios when they apply for jobs to show potential employers that they are passionate about their work and can do the job they are applying for. Portfolios are more in depth than a resume, which is typically a one-to-two page summary of relevant education, work experience, and accomplishments. You will have the opportunity to develop a resume, and finalize your portfolio, in the last course of this program. </span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Options for creating your portfolio </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">There are many ways to present a portfolio, including self-hosted and online options such as:</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Documents folder</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Google Drive or Dropbox™</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Google Sites</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Git repository</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Option 1: Documents folder**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Description:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A documents folder is a folder created and saved to your computer’s hard drive. You manage the folder, subfolders, documents, and images within it. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Document folders allow you to have direct access to your documentation. Ensuring that your professional documents, images, and other information are well organized can save you a lot of time when you’re ready to apply for jobs. For example, you may want to create a main folder titled something like “Professional documents.” Then, within your main folder, you could create subfolders with titles such as:</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Resume</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Education</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Portfolio documents</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Cybersecurity tools</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Programming </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Setup:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Document folders can be created in multiple ways, depending on the type of computer you are using. If you’re unsure about how to create a folder on your device, you can search the internet for instructional videos or documents related to the type of computer you use.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Option 2: Google Drive or Dropbox**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Description:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Google Drive and Dropbox offer similar features that allow you to store your professional documentation on a cloud platform. Both options also have file-sharing features, so you can easily share your portfolio documents with potential employers. Any additions or changes you make to a document within that folder will be updated automatically for anyone with access to your portfolio.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Similar to a documents folder, keeping your Google Drive or Dropbox-based portfolio well organized will be helpful as you begin or progress through your career.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Setup:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> To learn how to upload and share files on these applications, visit the Google Drive and Dropbox websites for more information. </span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Option 3: Google Sites**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Description:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Google Sites and similar website hosting options have a variety of easy-to-use features to help you present your portfolio items, including customizable layouts, responsive webpages, embedded content capabilities, and web publishing.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Responsive webpages automatically adjust their content to fit a variety of devices and screen sizes. This is helpful because potential employers can review your content using any device and your media will display just as you intend.</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">When you’re ready, you can publish your website and receive a unique URL. You can add this link to your resume so hiring managers can easily access your work.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Setup:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">To learn how to create a website in Google Sites, visit the Google Sites website. </span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Option 4: Git repository**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Description:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A Git repository is a folder within a project. In this instance, the project is your portfolio, and you can use your repository to store the documents, labs, and screenshots you complete during each course of the certificate program. There are several Git repository sites you can use, including:</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">GitLab</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Bitbucket™</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">GitHub</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Each Git repository allows you to showcase your skills and knowledge in a customizable space. To create an online project portfolio on any of the repositories listed, you need to use a version of Markdown. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Setup:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> To learn about how to create a GitHub account and use Markdown, follow the steps outlined in the document </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Get started with GitHub<svg aria-labelledby="cds-react-aria-459-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk-" role="img" viewbox="0 0 16 16" width="16"></svg>](https://docs.google.com/document/d/13nqRTU4H14NFytodh_tbafXthjNRD7aWU_4Cjq7pKG8/template/preview)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Portfolio projects</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">As previously mentioned, you will have multiple opportunities throughout the certificate program to develop items to include in your portfolio. These opportunities include:</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Drafting a professional statement</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Conducting a security audit</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Analyzing network structure and security</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Using Linux commands to manage file permissions</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Applying filters to SQL queries</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Identifying vulnerabilities for a small business</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Documenting incidents with an incident handler’s journal </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Importing and parsing a text file in a security-related scenario</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Creating or revising a resume</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Note:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Do not include any private, copyrighted, or proprietary documents in your portfolio. Also, if you use one of the sites described in this reading, keep your site set to “private” until it is finalized.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Key takeaways</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Now that you’re aware of some options for creating and hosting a professional portfolio, you can consider these as you develop items for your portfolio throughout the certificate program. The more proactive you are about creating a polished portfolio, the higher your chances of impressing a potential employer and obtaining a new job opportunity in the cybersecurity profession. </span>

# Make portfolio

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">To pass this course item, you must complete the activity and receive at least 80%, or 4 out of 5 points, on the questions that follow. Once you have completed the activity and questions, review the feedback provided. You can learn more about graded and practice items in the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[program and course overview<svg aria-labelledby="cds-react-aria-619-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk-" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/foundations-of-cybersecurity/supplement/QBRd5/program-and-course-overview)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">.</span>

<div id="bkmrk--1" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="css-pcgb2l" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 48px; margin-bottom: 48px;"><div class="css-r172lo" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: calc(100% - 26px);"><div class="cds-797 css-hfjryq cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div><div class="css-pcgb2l" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 48px; margin-bottom: 48px;"><div class="css-r172lo" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: calc(100% - 26px);"><div class="cds-797 css-hfjryq cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/kYvVLkX-T9uQnRYn7ZpwKg_02d8433a352e4dadadd0787c5d7cd0f1_ejYXKqjxBerEzG8HYoUj1oY3u18LiIGtIXggZuKSUfGYgDdx2KJDWz9c40gC8bXohTB9txDuFrE7_Ym6jgqXIz3h4CieyzpylSPy-Ls-vRcglq5yHV-A6yzuvI_CWUMxngE438I0xcozotRn5sWlPDcZ-IV2f1R0Tmd6liCQoJJrtjfb_HOZ9W86t7nwlkaVow7TZLp8mvoDKCCXCGR9p2fg4kAWIrje20fNxw?expiry=1685923200000&hmac=NljQtjmB-igfCq4obd6G8OnQNfq4GAIQ7nk615ER4wg)</figure></div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Activity Overview </span>

<div id="bkmrk--2" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="css-pcgb2l" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 48px; margin-bottom: 48px;"><div class="css-r172lo" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: calc(100% - 26px);"><div class="cds-797 css-hfjryq cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/prhXif2nS7yvLPgBjzhyMw_b9be6d6dfc2c42ae9e29b5cbd7f6d8e1_jlA6sOwDSQSe7UjwJ1Avlg_edd8467fef774f78be91af2a4cafadf1_pvMMp8zplWKrfvoXlOmy8Mo0HnBQ08NGIdma5Jml0EcLFEn8KwEzK0NDLpA7_DqRy1NJwRQ_CUUFrLTYpdf0lkhm0StFLV3YzLMzziJAUvV4769HH6nmBGBdM0tRTlyu51bq92Q8uaRO17Hx-owAqkWXRhEYK3RKr9OovEf1QjBd17_Gv2z7VjKng7etXlcii3yGwsKqxCTQpmorYexozgmssLEV3Wn5dZXq8A?expiry=1685923200000&hmac=I-udCawhgWHeleRExqYX2RmPOCOndU586AARmgabLIY)</figure></div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">In this activity, you will review the provided template and professional statement outline to create a professional statement that you can include as part of your cybersecurity portfolio documentation. Previously, you learned about options for creating and hosting a cybersecurity portfolio. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A professional statement is an introduction to employers that briefly describes who you are and what you care about. It allows you to showcase your interest in cybersecurity, work experience, knowledge, skills, and achievements. As you continue to learn more and refine your understanding of key cybersecurity concepts, you can return to this professional statement and revise it as needed.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">To review the importance of building a professional portfolio and options for creating your portfolio, read </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Create a cybersecurity portfolio<svg aria-labelledby="cds-react-aria-620-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--3" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/foundations-of-cybersecurity/supplement/RTDuH/create-a-cybersecurity-portfolio)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Be sure to complete this activity and answer the questions that follow before moving on. The next course item will provide you with a completed exemplar to compare to your own work. You will not be able to access the exemplar until you have completed this activity and answered the questions.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Scenario</span>

<div id="bkmrk--4" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="css-pcgb2l" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 48px; margin-bottom: 48px;"><div class="css-r172lo" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: calc(100% - 26px);"><div class="cds-797 css-hfjryq cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/692J4KCfTI-pNfb5pFM3Cg_575fee21158e4e358ac45d9f77e576e1_WLn89eW_SAK7z8YSGwAWKQ_c61a7ef696de4ff29d313f90a1a8a1f1_voqiSaGV5kfSTqHebqlVYv5Vj1ZxyZIxbZmlSvVy4wD9RCelIqhPOp5ioB_R9zmXYBJ1nqYwnrMSsfmd3xnju9RBOxPWP5XrYBw_6PyZ_tfHGKxBEp39b-QcEtwSPmvbz0gH2bC3fA44GIMWtUopovLMf5uF6pomFPxa4zEzHDFqr2Y0_wa2DyGvPa7M57pOLddSmKZqAn6U57gahHCAATlgWrC5u5NYrV6tiQ?expiry=1685923200000&hmac=RXYhmS8JMTjjfXSSuNdsQ8tztg0AAMxfGH-MyXaQ1Cw)</figure></div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">You are excited to enter the field of cybersecurity. As you search for jobs, you find an entry-level position that interests you and aligns to your skills and knowledge. You decide to create a professional statement to introduce yourself to your potential employer and showcase who you are in a way that helps your application stand out.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Note**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">:</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Creating a unique and authentic professional statement helps establish people’s perception of who you are and what you care about. </span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Step-By-Step Instructions</span>

<div id="bkmrk--5" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="css-pcgb2l" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 48px; margin-bottom: 48px;"><div class="css-r172lo" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: calc(100% - 26px);"><div class="cds-797 css-hfjryq cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/GFsLkVh6SSKtLrMZ6ToE1g_329780548b8049739f0c047d81a894e1_aoRJynoGTrOMjzBeKJBUJg_9d5cc5e713734525b52fb5c08252cbf1__tPIaokCeqjVfYG0qC70BmqWqo_aRg5z1CHPTLYt2jssggSljVzOXpy6eXRdTx8nGZ8GundH_dGSm1dBs0yU6Q_CzHuLPSUkjS4H6vxePL4LRZHc2gornQzWk-xih4dvtWS-lK3OpBJzg45AEa9AWjOkFzaVltYpCMKCILUEgIrTIX3LS3ySLgXwUUUyDAcWwCP2laS2NYeKaKUwUhzn7QsPzYSDGF28SkgK_g?expiry=1685923200000&hmac=wXE-Sky6ANd8nbVkykeR4ouo3qFBm28_hDZ4cKwMGIc)</figure></div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Follow the instructions to complete each step of the activity. Then, answer the five questions at the end of the activity before going to the next course item to compare your work to a completed exemplar.</span>

### <button aria-expanded="true" class="cds-794 cds-AccordionHeader-button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: inherit; font: inherit; margin: 0px; text-transform: none; cursor: pointer; border: 0px; display: flex; outline: none; padding: 16px; position: relative; align-items: flex-start; user-select: none; border-radius: 4px; vertical-align: middle; place-content: flex-start center; text-decoration: none; background-color: transparent; -webkit-tap-highlight-color: transparent; text-align: inherit; flex-direction: row; -webkit-box-flex: 1; flex-grow: 1; z-index: 1;" tabindex="0" type="button"><svg aria-hidden="true" class="cds-AccordionHeader-chevron cds-AccordionHeader-expanded css-0" fill="none" focusable="false" height="20" id="bkmrk--7" viewbox="0 0 20 20" width="20"></svg></button>

<div class="cds-AccordionHeader-content" id="bkmrk-step-1%3A-access-the-t" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; flex-direction: column; -webkit-box-flex: 1; flex-grow: 1;"><div class="cds-AccordionHeader-labelGroup" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; flex-direction: column; align-items: flex-start; flex-shrink: 1;"><span class="cds-797 css-13n3rak cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: bold; line-height: 1.5rem; letter-spacing: -0.1px; color: rgb(31, 31, 31);">Step 1: Access the template</span></div></div>### <button aria-expanded="true" class="cds-794 cds-AccordionHeader-button" id="bkmrk--9" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: inherit; font: inherit; margin: 0px; text-transform: none; cursor: pointer; border: 0px; display: flex; outline: none; padding: 16px; position: relative; align-items: flex-start; user-select: none; border-radius: 4px; vertical-align: middle; place-content: flex-start center; text-decoration: none; background-color: transparent; -webkit-tap-highlight-color: transparent; text-align: inherit; flex-direction: row; -webkit-box-flex: 1; flex-grow: 1; z-index: 1;" tabindex="0" type="button"></button>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">To use the template for this course item, click the following link and select </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">*Use Template*</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">. Keep it open as you proceed to the next steps. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Link to template: </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Professional statement template<svg aria-labelledby="cds-react-aria-623-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--10" role="img" viewbox="0 0 16 16" width="16"></svg>](https://docs.google.com/document/d/149i6MBJ0zyikvwNFBb0CkBaPCqj8B5sr9JH2_baNFRc/template/preview)</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">OR</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">If you don’t have a Google account, you can download the template directly from the following attachment.</span>

<div id="bkmrk-professional-stateme" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="css-pcgb2l" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 48px; margin-bottom: 48px;"><div class="css-r172lo" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: calc(100% - 26px);"><div class="css-kz1sc2" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin-left: -16px; padding: 0px;"><div class="css-1yfylmr" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; padding: 0px;"><div class="cds-AccordionRoot-focusContainer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; margin: 0px; padding: 2px;"><div class="cds-AccordionRoot-container cds-AccordionRoot-silent" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; background-color: rgb(255, 255, 255); border-radius: 4px; border: 1px solid transparent;"><div class="cds-856 cds-857" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; height: auto; overflow: visible; transition: height 300ms cubic-bezier(0.4, 0, 0.2, 1) 0ms; min-height: 0px;"><div class="cds-859" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex;"><div class="cds-860" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 495.333px;"><div aria-labelledby="cds-react-aria-621-accordion-header" role="region" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;" title="Step 1: Access the template"><div class="css-vquajy" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px 16px 16px;"><div class="cds-797 css-hfjryq cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div contenteditable="false" data-e2e="slate-asset-wrapper" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[<div class="asset-wrapper css-cp6qd0" data-testid="asset-v2-wrapper" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; outline: none; user-select: none;"><div class="cml-asset cml-asset-generic cml-nonmedia-asset css-3u3yqw" data-e2e="cml-asset cml-asset-generic cml-nonmedia-asset" data-extension="docx" data-id="0A93fTl3Q22XxtGLKZI0vw" data-name="Professional statement template" data-url="https://d3c33hcgiwev3.cloudfront.net/0A93fTl3Q22XxtGLKZI0vw_459e3aa6d6ad41b480ef2740a65f9bf1_Professional-statement-template.docx?Expires=1685923200&Signature=hbnR1d-Bo~Zz2JFpstcPAT7cdNp-ZEbfhaLxJJvHceCszwXcD8ZDjrxRdiZarXqQm~Zc9RQ8Izc26Yc-gPMFdCLUud-JSJBZN8Mq~dmigOcl30uwWMfBReIUFwZaJAxEzpk~dZxp1rruWOjaInOeHFCzMnC9ziBO8Z4zWWifuFQ_&Key-Pair-Id=APKAJLTNE6QMUY6HBC5A" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; background-color: rgb(245, 247, 248); border-radius: 8px; height: 84px; padding: 0px 24px; display: flex; -webkit-box-align: center; align-items: center; width: 463.333px; margin-bottom: 12px;"><div data-e2e="asset-icon" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><svg aria-labelledby="cds-react-aria-624-title" class="css-0" fill="none" focusable="false" height="24" id="bkmrk--11" role="img" viewbox="0 0 24 24" width="24"></svg></div><div class="css-1yz0hhk" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; flex: 1 1 0%; min-width: 0px; flex-direction: column; white-space: nowrap; overflow-x: hidden; margin-left: 16px;"><div class="css-2ivpt" data-e2e="asset-name" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; font-size: 1rem; line-height: 1.5rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: bold; letter-spacing: -0.1px; text-overflow: ellipsis; overflow: hidden;">Professional statement template</div><div class="css-13413s3" data-e2e="asset-label" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; letter-spacing: 0px; font-size: 1rem; line-height: 1.5rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; color: rgb(99, 99, 99); margin-top: 4px;">DOCX File</div></div></div></div>](https://d3c33hcgiwev3.cloudfront.net/0A93fTl3Q22XxtGLKZI0vw_459e3aa6d6ad41b480ef2740a65f9bf1_Professional-statement-template.docx?Expires=1685923200&Signature=hbnR1d-Bo~Zz2JFpstcPAT7cdNp-ZEbfhaLxJJvHceCszwXcD8ZDjrxRdiZarXqQm~Zc9RQ8Izc26Yc-gPMFdCLUud-JSJBZN8Mq~dmigOcl30uwWMfBReIUFwZaJAxEzpk~dZxp1rruWOjaInOeHFCzMnC9ziBO8Z4zWWifuFQ_&Key-Pair-Id=APKAJLTNE6QMUY6HBC5A)</div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>### <button aria-expanded="false" class="cds-794 cds-AccordionHeader-button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: inherit; font: inherit; margin: 0px; text-transform: none; cursor: pointer; border: 0px; display: flex; outline: none; padding: 16px; position: relative; align-items: flex-start; user-select: none; border-radius: 4px; vertical-align: middle; place-content: flex-start center; text-decoration: none; background-color: transparent; -webkit-tap-highlight-color: transparent; text-align: inherit; flex-direction: row; -webkit-box-flex: 1; flex-grow: 1; z-index: 1;" tabindex="0" type="button"><svg aria-hidden="true" class="cds-AccordionHeader-chevron css-0" fill="none" focusable="false" height="20" id="bkmrk--13" viewbox="0 0 20 20" width="20"></svg></button>

<div class="cds-AccordionHeader-content" id="bkmrk-step-2%3A-access-suppo" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; flex-direction: column; -webkit-box-flex: 1; flex-grow: 1;"><div class="cds-AccordionHeader-labelGroup" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; flex-direction: column; align-items: flex-start; flex-shrink: 1;"><span class="cds-797 css-13n3rak cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: bold; line-height: 1.5rem; letter-spacing: -0.1px; color: rgb(31, 31, 31);">Step 2: Access supporting materials</span></div></div>### <button aria-expanded="false" class="cds-794 cds-AccordionHeader-button" id="bkmrk--15" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: inherit; font: inherit; margin: 0px; text-transform: none; cursor: pointer; border: 0px; display: flex; outline: none; padding: 16px; position: relative; align-items: flex-start; user-select: none; border-radius: 4px; vertical-align: middle; place-content: flex-start center; text-decoration: none; background-color: transparent; -webkit-tap-highlight-color: transparent; text-align: inherit; flex-direction: row; -webkit-box-flex: 1; flex-grow: 1; z-index: 1;" tabindex="0" type="button"></button>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[<svg aria-labelledby="cds-react-aria-627-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--17" role="img" viewbox="0 0 16 16" width="16"></svg>](https://docs.google.com/document/d/12fvZXSrCHs2cE9GUNkc0ypfCb77QdKVFnofQ4aBuxFU/template/preview)</span>

<div id="bkmrk--18" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="css-pcgb2l" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 48px; margin-bottom: 48px;"><div class="css-r172lo" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: calc(100% - 26px);"><div class="css-kz1sc2" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin-left: -16px; padding: 0px;"><div class="css-1yfylmr" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; padding: 0px;"><div class="cds-AccordionRoot-focusContainer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; margin: 0px; padding: 2px;"><div class="cds-AccordionRoot-container cds-AccordionRoot-silent" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; background-color: rgb(255, 255, 255); border-radius: 4px; border: 1px solid transparent;"><div class="cds-856 cds-858" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; height: 0px; overflow: hidden; transition: height 300ms cubic-bezier(0.4, 0, 0.2, 1) 0ms; visibility: hidden; min-height: 0px;"><div class="cds-859" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex;"><div class="cds-860" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 495.333px;"><div aria-labelledby="cds-react-aria-625-accordion-header" role="region" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;" title="Step 2: Access supporting materials"><div class="css-vquajy" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px 16px 16px;"><div class="cds-797 css-hfjryq cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div contenteditable="false" data-e2e="slate-asset-wrapper" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[<div class="asset-wrapper css-cp6qd0" data-testid="asset-v2-wrapper" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; outline: none; user-select: none;"><div class="cml-asset cml-asset-generic cml-nonmedia-asset css-3u3yqw" data-e2e="cml-asset cml-asset-generic cml-nonmedia-asset" data-extension="docx" data-id="W0byXAegSDalrO__PMtdKQ" data-name="Professional statement outline" data-url="https://d3c33hcgiwev3.cloudfront.net/W0byXAegSDalrO__PMtdKQ_7fbaba3ea16941f195798793e9bee6f1_Professional-statement-outline.docx?Expires=1685923200&Signature=F11WV1mSLrvbNNZ6GN4je9Hh0uAxsI2JtUsRcTGG~ApvO~Q9B98i4D48kwxbKrHS~Qjy1dcnmvRlM0u~-7DFDpoHo0wV4UX1m7tz9bIHxiq0ivXupvJ79Mncnfjh0eSEwItdarfIIr-7yFDXW25OFwkTgiBkWWvyCTwLZ8vkH2c_&Key-Pair-Id=APKAJLTNE6QMUY6HBC5A" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; background-color: rgb(245, 247, 248); border-radius: 8px; height: 84px; padding: 0px 24px; display: flex; -webkit-box-align: center; align-items: center; width: 463.333px; margin-bottom: 12px;"><div data-e2e="asset-icon" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><svg aria-labelledby="cds-react-aria-628-title" class="css-0" fill="none" focusable="false" height="24" id="bkmrk--19" role="img" viewbox="0 0 24 24" width="24"></svg></div><div class="css-1yz0hhk" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; flex: 1 1 0%; min-width: 0px; flex-direction: column; white-space: nowrap; overflow-x: hidden; margin-left: 16px;"><div class="css-2ivpt" data-e2e="asset-name" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; font-size: 1rem; line-height: 1.5rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: bold; letter-spacing: -0.1px; text-overflow: ellipsis; overflow: hidden;">  
</div><div class="css-13413s3" data-e2e="asset-label" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; letter-spacing: 0px; font-size: 1rem; line-height: 1.5rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; color: rgb(99, 99, 99); margin-top: 4px;">  
</div></div></div></div>](https://d3c33hcgiwev3.cloudfront.net/W0byXAegSDalrO__PMtdKQ_7fbaba3ea16941f195798793e9bee6f1_Professional-statement-outline.docx?Expires=1685923200&Signature=F11WV1mSLrvbNNZ6GN4je9Hh0uAxsI2JtUsRcTGG~ApvO~Q9B98i4D48kwxbKrHS~Qjy1dcnmvRlM0u~-7DFDpoHo0wV4UX1m7tz9bIHxiq0ivXupvJ79Mncnfjh0eSEwItdarfIIr-7yFDXW25OFwkTgiBkWWvyCTwLZ8vkH2c_&Key-Pair-Id=APKAJLTNE6QMUY6HBC5A)</div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>### <button aria-expanded="false" class="cds-794 cds-AccordionHeader-button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: inherit; font: inherit; margin: 0px; text-transform: none; cursor: pointer; border: 0px; display: flex; outline: none; padding: 16px; position: relative; align-items: flex-start; user-select: none; border-radius: 4px; vertical-align: middle; place-content: flex-start center; text-decoration: none; background-color: transparent; -webkit-tap-highlight-color: transparent; text-align: inherit; flex-direction: row; -webkit-box-flex: 1; flex-grow: 1; z-index: 1;" tabindex="0" type="button"><svg aria-hidden="true" class="cds-AccordionHeader-chevron css-0" fill="none" focusable="false" height="20" id="bkmrk--21" viewbox="0 0 20 20" width="20"></svg></button>

<div class="cds-AccordionHeader-content" id="bkmrk-step-3%3A-draft-your-p" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; flex-direction: column; -webkit-box-flex: 1; flex-grow: 1;"><div class="cds-AccordionHeader-labelGroup" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; flex-direction: column; align-items: flex-start; flex-shrink: 1;"><span class="cds-797 css-13n3rak cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: bold; line-height: 1.5rem; letter-spacing: -0.1px; color: rgb(31, 31, 31);">Step 3: Draft your professional statement</span></div></div>### <button aria-expanded="false" class="cds-794 cds-AccordionHeader-button" id="bkmrk--23" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: inherit; font: inherit; margin: 0px; text-transform: none; cursor: pointer; border: 0px; display: flex; outline: none; padding: 16px; position: relative; align-items: flex-start; user-select: none; border-radius: 4px; vertical-align: middle; place-content: flex-start center; text-decoration: none; background-color: transparent; -webkit-tap-highlight-color: transparent; text-align: inherit; flex-direction: row; -webkit-box-flex: 1; flex-grow: 1; z-index: 1;" tabindex="0" type="button"></button>

<div id="bkmrk-%C2%A0-%C2%A0-%C2%A0-%C2%A0-%C2%A0-%C2%A0-%C2%A0-%C2%A0" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="css-pcgb2l" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 48px; margin-bottom: 48px;"><div class="css-r172lo" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: calc(100% - 26px);"><div class="css-kz1sc2" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin-left: -16px; padding: 0px;"><div class="css-1yfylmr" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; padding: 0px;"><div class="cds-AccordionRoot-focusContainer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; margin: 0px; padding: 2px;"><div class="cds-AccordionRoot-container cds-AccordionRoot-silent" id="bkmrk-%C2%A0-%C2%A0-%C2%A0-%C2%A0-%C2%A0-%C2%A0-%C2%A0-%C2%A0-1" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; background-color: rgb(255, 255, 255); border-radius: 4px; border: 1px solid transparent;"><div class="cds-856 cds-858" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; height: 0px; overflow: hidden; transition: height 300ms cubic-bezier(0.4, 0, 0.2, 1) 0ms; visibility: hidden; min-height: 0px;"><div class="cds-859" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex;"><div class="cds-860" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 495.333px;"><div aria-labelledby="cds-react-aria-629-accordion-header" id="bkmrk-%C2%A0-%C2%A0-%C2%A0-%C2%A0-%C2%A0-%C2%A0-%C2%A0-%C2%A0-2" role="region" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;" title="Step 3: Draft your professional statement"><div class="css-vquajy" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px 16px 16px;"><div class="cds-797 css-hfjryq cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">1. 1. 
    2. 
    3.
2. 
3. 
4. 
5. 

</div></div></div></div></div></div></div></div></div></div></div></div></div></div><div class="css-pcgb2l" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 48px; margin-bottom: 48px;"><div class="css-r172lo" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: calc(100% - 26px);"><div class="css-kz1sc2" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin-left: -16px; padding: 0px;"><div class="css-1yfylmr" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; padding: 0px;"><div class="cds-AccordionRoot-focusContainer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; margin: 0px; padding: 2px;"><div class="cds-AccordionRoot-container cds-AccordionRoot-silent" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; background-color: rgb(255, 255, 255); border-radius: 4px; border: 1px solid transparent;">  
</div></div></div></div></div></div></div></div>### <button aria-expanded="false" class="cds-794 cds-AccordionHeader-button" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: inherit; font: inherit; margin: 0px; text-transform: none; cursor: pointer; border: 0px; display: flex; outline: none; padding: 16px; position: relative; align-items: flex-start; user-select: none; border-radius: 4px; vertical-align: middle; place-content: flex-start center; text-decoration: none; background-color: transparent; -webkit-tap-highlight-color: transparent; text-align: inherit; flex-direction: row; -webkit-box-flex: 1; flex-grow: 1; z-index: 1;" tabindex="0" type="button"><svg aria-hidden="true" class="cds-AccordionHeader-chevron css-0" fill="none" focusable="false" height="20" id="bkmrk--25" viewbox="0 0 20 20" width="20"></svg></button>

<div class="cds-AccordionHeader-content" id="bkmrk-step-4%3A-refine-your-" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; flex-direction: column; -webkit-box-flex: 1; flex-grow: 1;"><div class="cds-AccordionHeader-labelGroup" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; flex-direction: column; align-items: flex-start; flex-shrink: 1;"><span class="cds-797 css-13n3rak cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: bold; line-height: 1.5rem; letter-spacing: -0.1px; color: rgb(31, 31, 31);">Step 4: Refine your professional statement</span></div></div>### <button aria-expanded="false" class="cds-794 cds-AccordionHeader-button" id="bkmrk--27" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; overflow: visible; appearance: button; touch-action: manipulation; color: inherit; font: inherit; margin: 0px; text-transform: none; cursor: pointer; border: 0px; display: flex; outline: none; padding: 16px; position: relative; align-items: flex-start; user-select: none; border-radius: 4px; vertical-align: middle; place-content: flex-start center; text-decoration: none; background-color: transparent; -webkit-tap-highlight-color: transparent; text-align: inherit; flex-direction: row; -webkit-box-flex: 1; flex-grow: 1; z-index: 1;" tabindex="0" type="button"></button>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[<svg aria-labelledby="cds-react-aria-633-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--29" role="img" viewbox="0 0 16 16" width="16"></svg>](https://docs.google.com/document/d/1uodGPtGAS247wACdtJ7ITe3BcwFL993sQy5P9_pAj48/template/preview)</span>

<div id="bkmrk--30" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="css-pcgb2l" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 48px; margin-bottom: 48px;"><div class="css-r172lo" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: calc(100% - 26px);"><div class="css-kz1sc2" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin-left: -16px; padding: 0px;"><div class="css-1yfylmr" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; padding: 0px;"><div class="cds-AccordionRoot-focusContainer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; margin: 0px; padding: 2px;"><div class="cds-AccordionRoot-container cds-AccordionRoot-silent" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; background-color: rgb(255, 255, 255); border-radius: 4px; border: 1px solid transparent;"><div class="cds-856 cds-858" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; height: 0px; overflow: hidden; transition: height 300ms cubic-bezier(0.4, 0, 0.2, 1) 0ms; visibility: hidden; min-height: 0px;"><div class="cds-859" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex;"><div class="cds-860" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 495.333px;"><div aria-labelledby="cds-react-aria-631-accordion-header" role="region" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;" title="Step 4: Refine your professional statement"><div class="css-vquajy" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px 16px 16px;"><div class="cds-797 css-hfjryq cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div contenteditable="false" data-e2e="slate-asset-wrapper" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[<div class="asset-wrapper css-cp6qd0" data-testid="asset-v2-wrapper" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; outline: none; user-select: none;"><div class="cml-asset cml-asset-generic cml-nonmedia-asset css-3u3yqw" data-e2e="cml-asset cml-asset-generic cml-nonmedia-asset" data-extension="docx" data-id="UaRwfVDDTKOgoNF5d1Z3vA" data-name="Refine your personal statement" data-url="https://d3c33hcgiwev3.cloudfront.net/UaRwfVDDTKOgoNF5d1Z3vA_afb9ba37953e4d88a894cb51c73561f1_Refine-your-personal-statement.docx?Expires=1685923200&Signature=NVx--6w8yfaS2Og1E-yt4yPu~XO3gRtu3FtSxFSBg-5R6TIVZBK4TqcMetyZAmxkYujjoiHf5mt3JpKf5Ji8iDGaCjHw8XIwWa9lhX0i91hmcfzdODp7izV8QhgQGfQHN9QEX1vN-ZDAkaTdX001ef-IsOwlfr6C2gEtPp~hIdA_&Key-Pair-Id=APKAJLTNE6QMUY6HBC5A" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; background-color: rgb(245, 247, 248); border-radius: 8px; height: 84px; padding: 0px 24px; display: flex; -webkit-box-align: center; align-items: center; width: 463.333px; margin-bottom: 12px;"><div data-e2e="asset-icon" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><svg aria-labelledby="cds-react-aria-634-title" class="css-0" fill="none" focusable="false" height="24" id="bkmrk--31" role="img" viewbox="0 0 24 24" width="24"></svg></div><div class="css-1yz0hhk" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; flex: 1 1 0%; min-width: 0px; flex-direction: column; white-space: nowrap; overflow-x: hidden; margin-left: 16px;"><div class="css-2ivpt" data-e2e="asset-name" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; font-size: 1rem; line-height: 1.5rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: bold; letter-spacing: -0.1px; text-overflow: ellipsis; overflow: hidden;">  
</div><div class="css-13413s3" data-e2e="asset-label" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; letter-spacing: 0px; font-size: 1rem; line-height: 1.5rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; color: rgb(99, 99, 99); margin-top: 4px;">  
</div></div></div></div>](https://d3c33hcgiwev3.cloudfront.net/UaRwfVDDTKOgoNF5d1Z3vA_afb9ba37953e4d88a894cb51c73561f1_Refine-your-personal-statement.docx?Expires=1685923200&Signature=NVx--6w8yfaS2Og1E-yt4yPu~XO3gRtu3FtSxFSBg-5R6TIVZBK4TqcMetyZAmxkYujjoiHf5mt3JpKf5Ji8iDGaCjHw8XIwWa9lhX0i91hmcfzdODp7izV8QhgQGfQHN9QEX1vN-ZDAkaTdX001ef-IsOwlfr6C2gEtPp~hIdA_&Key-Pair-Id=APKAJLTNE6QMUY6HBC5A)</div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Pro Tip: Save a copy of your work**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Finally, be sure to save a copy of your completed activity. You can use it for your professional portfolio to demonstrate your knowledge and/or experience to potential employers.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">What to Include in Your Response</span>

<div id="bkmrk--32" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="css-pcgb2l" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 48px; margin-bottom: 48px;"><div class="css-r172lo" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: calc(100% - 26px);"><div class="cds-797 css-hfjryq cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/GWubPPW9QU-5mcCspTeQ4Q_498f40070ab7452aa60339150cdd54f1_jN_ziXQPeAiCRoxrM5AR6fzUbC2xeyPTAb6jucq7bFC-gD6ANvmydKfvP3aBbCloerFCOAYRQVl6_HdEgWEyy0g3AFuCIHMC1BY1ikjvaNuT3MrBRam0TtFBs4RhEJFWsyY5pdpnnyyW2mRfZXY6Beu0b_az7XYNM_LmEedUBPo1fzIp2B8wMYqObLCMVftw4JzGS2SheyWV2WddO0zJqW1h3lhuNgxKRFr4zA?expiry=1685923200000&hmac=7egWYi4pa4vkkh093k9woGvFnHIT6jQbOkpgdLEOpv0)</figure></div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Be sure to address the following elements in your completed activity:</span>

<div id="bkmrk-be-intentional-about" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="css-pcgb2l" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 48px; margin-bottom: 48px;"><div class="css-r172lo" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: calc(100% - 26px);"><div class="cds-797 css-hfjryq cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Be intentional about how you want to be perceived by potential employers. </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Include your strengths and values, and be genuine about why you want to enter the cybersecurity profession.</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Regularly update your statement to reflect your growing professional skills and knowledge. </span>

</div></div></div></div></div><div class="css-pcgb2l" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 48px; margin-bottom: 48px;"><div class="css-r172lo" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: calc(100% - 26px);"><div class="cds-797 css-hfjryq cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div></div></div>### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Step 5: Assess your activity**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Following is the self-assessment for your professional statement. You will use these statements to review your own work. The self-assessment process is an important part of the learning experience because it allows you to </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">*objectively* </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">assess your professional statement.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">There are a total of 5 points possible for this activity and each statement is worth 1 point. The items correspond to each step you completed for the activity. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">To complete the self-assessment, first open your professional statement. Then respond yes or no to each statement. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">When you complete and submit your responses, you will receive a percentage score. This score will help you confirm whether you completed the required steps of the activity. The recommended passing grade for this project is at least 80% (or 4/5 points). If you want to increase your score, you can revise your project and then resubmit your responses to reflect any changes you made. Try to achieve at least 4 points before continuing on to the next course item.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">1</span>.

<div id="bkmrk-question-1" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div aria-labelledby="nXr5x3r9Ee29WxJ2nyHfEw-legend" class="rc-FormPartsQuestion" role="group" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 510.667px; font-size: 14px; margin-top: 48px; margin-bottom: 48px;"><div class="rc-FormPartsQuestion__row" data-test="legend" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex;"><div class="rc-FormPartsQuestion__numberCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 30px;"><span class="screenreader-only" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Question 1</span></span></div><div class="rc-FormPartsQuestion__contentCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Your professional statement includes strengths. </span>

<div id="bkmrk-1-point" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div aria-labelledby="nXr5x3r9Ee29WxJ2nyHfEw-legend" class="rc-FormPartsQuestion" role="group" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 510.667px; font-size: 14px; margin-top: 48px; margin-bottom: 48px;"><div class="rc-FormPartsQuestion__row" data-test="legend" id="bkmrk-1-point-1" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex;"><div class="rc-FormPartsQuestion__contentCell" id="bkmrk--33" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div><div class="rc-FormPartsQuestion__pointsCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 136px; display: flex; -webkit-box-direction: reverse; -webkit-box-orient: horizontal; flex-direction: row-reverse;"><div class="css-1xe0vjc" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; background-color: rgb(229, 231, 232); border-radius: 4px; padding: 4px; height: fit-content;"><span class="cds-797 css-139dys0 cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 0.875rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: bold; line-height: 1.25rem; letter-spacing: -0.1px; color: rgb(31, 31, 31);"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">1 point</span></span></div></div></div><div class="rc-FormPartsQuestion__row" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 13px;"><div class="rc-FormPartsQuestion__numberCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 30px;">  
</div><div class="rc-FormPartsQuestion__contentCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="rc-FormPartsMcq" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1mkdutb" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="rc-Option" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; transform: translate(-3px, 4px);"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><svg aria-hidden="true" aria-labelledby="RadioUncheckedc0293256-8410-4239-f66e-2503474c04e5 RadioUncheckedc0293256-8410-4239-f66e-2503474c04e5Desc" class="_ufjrdd" focusable="false" role="img" style="fill: rgb(102, 102, 102); height: 24px; width: 24px;" viewbox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"></svg></label></label><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML rc-Option__input-text" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; z-index: 1;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Yes</span>

<div id="bkmrk--34" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div aria-labelledby="nXr5x3r9Ee29WxJ2nyHfEw-legend" class="rc-FormPartsQuestion" role="group" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 510.667px; font-size: 14px; margin-top: 48px; margin-bottom: 48px;"><div class="rc-FormPartsQuestion__row" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 13px;"><div class="rc-FormPartsQuestion__contentCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="rc-FormPartsMcq" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1mkdutb" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="rc-Option" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; transform: translate(-3px, 4px);"><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML rc-Option__input-text" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; z-index: 1;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div><div class="css-1mkdutb" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin-top: 12px;"><div class="rc-Option" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; transform: translate(-3px, 4px);"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><svg aria-hidden="true" aria-labelledby="RadioUnchecked804aea8b-f95d-45cb-8dc2-56a60cd853a3 RadioUnchecked804aea8b-f95d-45cb-8dc2-56a60cd853a3Desc" class="_ufjrdd" focusable="false" role="img" style="fill: rgb(102, 102, 102); height: 24px; width: 24px;" viewbox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"></svg></label></label><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML rc-Option__input-text" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; z-index: 1;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">No</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">2</span>.

<div id="bkmrk-question-2" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div aria-labelledby="nsPsxbLdEe2Aew4cA-NsSw-legend" class="rc-FormPartsQuestion" role="group" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 510.667px; font-size: 14px; margin-top: 66px; margin-bottom: 48px;"><div class="rc-FormPartsQuestion__row" data-test="legend" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex;"><div class="rc-FormPartsQuestion__numberCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 30px;"><span class="screenreader-only" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Question 2</span></span></div><div class="rc-FormPartsQuestion__contentCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Your professional statement includes values.</span>

<div id="bkmrk-1-point-2" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div aria-labelledby="nsPsxbLdEe2Aew4cA-NsSw-legend" class="rc-FormPartsQuestion" role="group" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 510.667px; font-size: 14px; margin-top: 66px; margin-bottom: 48px;"><div class="rc-FormPartsQuestion__row" data-test="legend" id="bkmrk-1-point-3" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex;"><div class="rc-FormPartsQuestion__contentCell" id="bkmrk--35" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div><div class="rc-FormPartsQuestion__pointsCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 136px; display: flex; -webkit-box-direction: reverse; -webkit-box-orient: horizontal; flex-direction: row-reverse;"><div class="css-1xe0vjc" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; background-color: rgb(229, 231, 232); border-radius: 4px; padding: 4px; height: fit-content;"><span class="cds-797 css-139dys0 cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 0.875rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: bold; line-height: 1.25rem; letter-spacing: -0.1px; color: rgb(31, 31, 31);"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">1 point</span></span></div></div></div><div class="rc-FormPartsQuestion__row" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 13px;"><div class="rc-FormPartsQuestion__numberCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 30px;">  
</div><div class="rc-FormPartsQuestion__contentCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="rc-FormPartsMcq" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1mkdutb" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="rc-Option" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; transform: translate(-3px, 4px);"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><svg aria-hidden="true" aria-labelledby="RadioUnchecked99cc6403-a655-439a-ba61-7267fda28180 RadioUnchecked99cc6403-a655-439a-ba61-7267fda28180Desc" class="_ufjrdd" focusable="false" role="img" style="fill: rgb(102, 102, 102); height: 24px; width: 24px;" viewbox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"></svg></label></label><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML rc-Option__input-text" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; z-index: 1;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Yes</span>

<div id="bkmrk--36" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div aria-labelledby="nsPsxbLdEe2Aew4cA-NsSw-legend" class="rc-FormPartsQuestion" role="group" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 510.667px; font-size: 14px; margin-top: 66px; margin-bottom: 48px;"><div class="rc-FormPartsQuestion__row" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 13px;"><div class="rc-FormPartsQuestion__contentCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="rc-FormPartsMcq" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1mkdutb" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="rc-Option" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; transform: translate(-3px, 4px);"><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML rc-Option__input-text" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; z-index: 1;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div><div class="css-1mkdutb" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin-top: 12px;"><div class="rc-Option" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; transform: translate(-3px, 4px);"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><svg aria-hidden="true" aria-labelledby="RadioUnchecked1e68bba2-bdc3-4fbd-8690-cd668f7dea79 RadioUnchecked1e68bba2-bdc3-4fbd-8690-cd668f7dea79Desc" class="_ufjrdd" focusable="false" role="img" style="fill: rgb(102, 102, 102); height: 24px; width: 24px;" viewbox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"></svg></label></label><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML rc-Option__input-text" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; z-index: 1;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">No</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">3</span>.

<div id="bkmrk-question-3" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div aria-labelledby="0cdP-rLdEe2Aew4cA-NsSw-legend" class="rc-FormPartsQuestion" role="group" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 510.667px; font-size: 14px; margin-top: 66px; margin-bottom: 48px;"><div class="rc-FormPartsQuestion__row" data-test="legend" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex;"><div class="rc-FormPartsQuestion__numberCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 30px;"><span class="screenreader-only" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Question 3</span></span></div><div class="rc-FormPartsQuestion__contentCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Your professional statement explains your interest in the cybersecurity profession.</span>

<div id="bkmrk-1-point-4" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div aria-labelledby="0cdP-rLdEe2Aew4cA-NsSw-legend" class="rc-FormPartsQuestion" role="group" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 510.667px; font-size: 14px; margin-top: 66px; margin-bottom: 48px;"><div class="rc-FormPartsQuestion__row" data-test="legend" id="bkmrk-1-point-5" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex;"><div class="rc-FormPartsQuestion__contentCell" id="bkmrk--37" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div><div class="rc-FormPartsQuestion__pointsCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 136px; display: flex; -webkit-box-direction: reverse; -webkit-box-orient: horizontal; flex-direction: row-reverse;"><div class="css-1xe0vjc" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; background-color: rgb(229, 231, 232); border-radius: 4px; padding: 4px; height: fit-content;"><span class="cds-797 css-139dys0 cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 0.875rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: bold; line-height: 1.25rem; letter-spacing: -0.1px; color: rgb(31, 31, 31);"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">1 point</span></span></div></div></div><div class="rc-FormPartsQuestion__row" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 13px;"><div class="rc-FormPartsQuestion__numberCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 30px;">  
</div><div class="rc-FormPartsQuestion__contentCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="rc-FormPartsMcq" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1mkdutb" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="rc-Option" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; transform: translate(-3px, 4px);"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><svg aria-hidden="true" aria-labelledby="RadioUnchecked407c0cb3-2fd1-456f-c0b2-dcea8a715724 RadioUnchecked407c0cb3-2fd1-456f-c0b2-dcea8a715724Desc" class="_ufjrdd" focusable="false" role="img" style="fill: rgb(102, 102, 102); height: 24px; width: 24px;" viewbox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"></svg></label></label><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML rc-Option__input-text" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; z-index: 1;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Yes</span>

<div id="bkmrk--38" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div aria-labelledby="0cdP-rLdEe2Aew4cA-NsSw-legend" class="rc-FormPartsQuestion" role="group" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 510.667px; font-size: 14px; margin-top: 66px; margin-bottom: 48px;"><div class="rc-FormPartsQuestion__row" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 13px;"><div class="rc-FormPartsQuestion__contentCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="rc-FormPartsMcq" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1mkdutb" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="rc-Option" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; transform: translate(-3px, 4px);"><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML rc-Option__input-text" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; z-index: 1;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div><div class="css-1mkdutb" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin-top: 12px;"><div class="rc-Option" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; transform: translate(-3px, 4px);"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><svg aria-hidden="true" aria-labelledby="RadioUnchecked5115205e-e86b-4851-eb6f-ee8e7061ab1e RadioUnchecked5115205e-e86b-4851-eb6f-ee8e7061ab1eDesc" class="_ufjrdd" focusable="false" role="img" style="fill: rgb(102, 102, 102); height: 24px; width: 24px;" viewbox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"></svg></label></label><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML rc-Option__input-text" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; z-index: 1;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">No</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">4</span>.

<div id="bkmrk-question-4" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div aria-labelledby="-gLXc7LdEe2nQwogNkogjQ-legend" class="rc-FormPartsQuestion" role="group" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 510.667px; font-size: 14px; margin-top: 66px; margin-bottom: 48px;"><div class="rc-FormPartsQuestion__row" data-test="legend" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex;"><div class="rc-FormPartsQuestion__numberCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 30px;"><span class="screenreader-only" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Question 4</span></span></div><div class="rc-FormPartsQuestion__contentCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Your professional statement explains who you are and how you can add value to an organization.</span>

<div id="bkmrk-1-point-6" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div aria-labelledby="-gLXc7LdEe2nQwogNkogjQ-legend" class="rc-FormPartsQuestion" role="group" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 510.667px; font-size: 14px; margin-top: 66px; margin-bottom: 48px;"><div class="rc-FormPartsQuestion__row" data-test="legend" id="bkmrk-1-point-7" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex;"><div class="rc-FormPartsQuestion__contentCell" id="bkmrk--39" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div><div class="rc-FormPartsQuestion__pointsCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 136px; display: flex; -webkit-box-direction: reverse; -webkit-box-orient: horizontal; flex-direction: row-reverse;"><div class="css-1xe0vjc" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; background-color: rgb(229, 231, 232); border-radius: 4px; padding: 4px; height: fit-content;"><span class="cds-797 css-139dys0 cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 0.875rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: bold; line-height: 1.25rem; letter-spacing: -0.1px; color: rgb(31, 31, 31);"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">1 point</span></span></div></div></div><div class="rc-FormPartsQuestion__row" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 13px;"><div class="rc-FormPartsQuestion__numberCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 30px;">  
</div><div class="rc-FormPartsQuestion__contentCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="rc-FormPartsMcq" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1mkdutb" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="rc-Option" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; transform: translate(-3px, 4px);"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><svg aria-hidden="true" aria-labelledby="RadioUnchecked63b2ff17-864b-478a-d40a-67f481589f76 RadioUnchecked63b2ff17-864b-478a-d40a-67f481589f76Desc" class="_ufjrdd" focusable="false" role="img" style="fill: rgb(102, 102, 102); height: 24px; width: 24px;" viewbox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"></svg></label></label><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML rc-Option__input-text" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; z-index: 1;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Yes</span>

<div id="bkmrk--40" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div aria-labelledby="-gLXc7LdEe2nQwogNkogjQ-legend" class="rc-FormPartsQuestion" role="group" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 510.667px; font-size: 14px; margin-top: 66px; margin-bottom: 48px;"><div class="rc-FormPartsQuestion__row" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 13px;"><div class="rc-FormPartsQuestion__contentCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="rc-FormPartsMcq" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1mkdutb" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="rc-Option" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; transform: translate(-3px, 4px);"><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML rc-Option__input-text" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; z-index: 1;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div><div class="css-1mkdutb" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin-top: 12px;"><div class="rc-Option" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; transform: translate(-3px, 4px);"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><svg aria-hidden="true" aria-labelledby="RadioUnchecked13e4dce2-0648-43f9-b2d3-15df36b94753 RadioUnchecked13e4dce2-0648-43f9-b2d3-15df36b94753Desc" class="_ufjrdd" focusable="false" role="img" style="fill: rgb(102, 102, 102); height: 24px; width: 24px;" viewbox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"></svg></label></label><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML rc-Option__input-text" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; z-index: 1;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">No</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">5</span>.

<div id="bkmrk-question-5" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div aria-labelledby="GAThELLeEe2nQwogNkogjQ-legend" class="rc-FormPartsQuestion" role="group" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 510.667px; font-size: 14px; margin-top: 66px; margin-bottom: 48px;"><div class="rc-FormPartsQuestion__row" data-test="legend" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex;"><div class="rc-FormPartsQuestion__numberCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 30px;"><span class="screenreader-only" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: absolute; width: 1px; height: 1px; margin: -1px; padding: 0px; overflow: hidden; clip: rect(0px, 0px, 0px, 0px); border: 0px;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Question 5</span></span></div><div class="rc-FormPartsQuestion__contentCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Your professional statement is free from grammar, spelling, and punctuation errors. </span>

<div id="bkmrk-1-point-8" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div aria-labelledby="GAThELLeEe2nQwogNkogjQ-legend" class="rc-FormPartsQuestion" role="group" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 510.667px; font-size: 14px; margin-top: 66px; margin-bottom: 48px;"><div class="rc-FormPartsQuestion__row" data-test="legend" id="bkmrk-1-point-9" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex;"><div class="rc-FormPartsQuestion__contentCell" id="bkmrk--41" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div><div class="rc-FormPartsQuestion__pointsCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 136px; display: flex; -webkit-box-direction: reverse; -webkit-box-orient: horizontal; flex-direction: row-reverse;"><div class="css-1xe0vjc" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; background-color: rgb(229, 231, 232); border-radius: 4px; padding: 4px; height: fit-content;"><span class="cds-797 css-139dys0 cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 0.875rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: bold; line-height: 1.25rem; letter-spacing: -0.1px; color: rgb(31, 31, 31);"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">1 point</span></span></div></div></div><div class="rc-FormPartsQuestion__row" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 13px;"><div class="rc-FormPartsQuestion__numberCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 30px;">  
</div><div class="rc-FormPartsQuestion__contentCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="rc-FormPartsMcq" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1mkdutb" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="rc-Option" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; transform: translate(-3px, 4px);"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><svg aria-hidden="true" aria-labelledby="RadioUnchecked606431e7-f169-4bc0-eed4-d1e0a4d5f045 RadioUnchecked606431e7-f169-4bc0-eed4-d1e0a4d5f045Desc" class="_ufjrdd" focusable="false" role="img" style="fill: rgb(102, 102, 102); height: 24px; width: 24px;" viewbox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"></svg></label></label><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML rc-Option__input-text" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; z-index: 1;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Yes</span>

<div id="bkmrk--42" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div aria-labelledby="GAThELLeEe2nQwogNkogjQ-legend" class="rc-FormPartsQuestion" role="group" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 510.667px; font-size: 14px; margin-top: 66px; margin-bottom: 48px;"><div class="rc-FormPartsQuestion__row" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; margin-top: 13px;"><div class="rc-FormPartsQuestion__contentCell" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 385.385px;"><div class="rc-FormPartsMcq" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1mkdutb" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="rc-Option" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; transform: translate(-3px, 4px);"><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML rc-Option__input-text" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; z-index: 1;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div><div class="css-1mkdutb" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin-top: 12px;"><div class="rc-Option" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; transform: translate(-3px, 4px);"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><label class="_1oyudm1w cui-Checkbox cui-active" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 0px; display: inline-flex; font-weight: bold; -webkit-box-align: start; white-space: nowrap; outline: none; position: relative; line-height: 1; vertical-align: middle; align-items: flex-start; cursor: pointer; width: 385.385px;"><svg aria-hidden="true" aria-labelledby="RadioUnchecked0f9dac7f-89b5-48f7-e920-3b1af9b3c5ca RadioUnchecked0f9dac7f-89b5-48f7-e920-3b1af9b3c5caDesc" class="_ufjrdd" focusable="false" role="img" style="fill: rgb(102, 102, 102); height: 24px; width: 24px;" viewbox="0 0 24 24" xmlns="http://www.w3.org/2000/svg"></svg></label></label><div class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(31, 31, 31);"><div class="rc-CML rc-Option__input-text" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; z-index: 1;"><div class="css-18w79dz" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">  
</div></div></div></div></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">No</span>

<div id="bkmrk-coursera-honor-code%C2%A0" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(51, 51, 51); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="css-fhzn6b" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 48px 0px;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-xia2fp" data-test="HonorCodeAgreement" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; padding-bottom: 16px;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><span class="cds-797 css-1wot210 cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 600; line-height: 1.5rem; letter-spacing: -0.1px; color: rgb(31, 31, 31);">Coursera Honor Code</span> [Learn more<span class="css-15yjz2h" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; vertical-align: text-top; margin-left: 8px;"><svg aria-hidden="true" class="css-0" fill="none" focusable="false" height="20" id="bkmrk--43" viewbox="0 0 20 20" width="20"></svg></span>](https://learner.coursera.help/hc/articles/209818863)</div><div class="css-waxm65" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin-top: 8px; display: inline-flex;"><div data-test="agreement-checkbox" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="cds-861 cds-formControl-root css-1fbcy5e" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; border: 0px; margin: 0px; display: inline-flex; padding: 0px; position: relative; min-width: 0px; flex-direction: column; vertical-align: top; max-width: 100%;"><div class=" css-1buq6om" data-test="agreement-standalone-checkbox" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; --input-fill: transparent; --input-fill--hover: #f3f8ff; --input-fill--active: #f7f6fe; --input-color: #636363; --input-color--hover: #00419e; --input-color--active: #382d8b; --label-text-color: #1f1f1f; --label-text-color--hover: #00419e; --label-text-color--active: #382d8b; --support-text-color: #636363;"><label class="cds-checkboxAndRadio-label" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 5px; display: flex; font-weight: bold; flex-direction: row; align-items: flex-start; gap: 12px; padding: 8px 0px; cursor: pointer; word-break: break-word;"><label class="cds-checkboxAndRadio-label" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 5px; display: flex; font-weight: bold; flex-direction: row; align-items: flex-start; gap: 12px; padding: 8px 0px; cursor: pointer; word-break: break-word;"><span class="cds-794 cds-875 cds-871 cds-865 cds-870 cds-checkboxAndRadio-input css-i34ev6 cds-880" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: var(--input-color); border: 0px; cursor: pointer; margin: 0px; display: inline-flex; outline: 0px; padding: 0px; position: relative; align-items: center; user-select: none; border-radius: 50%; vertical-align: middle; justify-content: center; text-decoration: none; background-color: transparent; appearance: none; -webkit-tap-highlight-color: transparent; flex: 0 0 auto; overflow: visible; font-size: 1.5rem; text-align: center; transition: background-color 150ms cubic-bezier(0.4, 0, 0.2, 1) 0ms; fill: var(--input-fill);"><span class="cds-883" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; width: 24px; display: flex; align-items: inherit; justify-content: inherit;"> [ ] <svg aria-hidden="true" class="css-0" fill="none" focusable="false" height="24" id="bkmrk--45" viewbox="0 0 24 24" width="24"></svg></span></span></label></label><div class="cds-checkboxAndRadio-labelText" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: flex; width: 0px; color: var(--label-text-color);"><span class="cds-797 cds-checkboxAndRadio-labelContent css-1o88ugo cds-799" id="bkmrk--46" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: inherit; flex: 1 1 0%;"></span></div></div></div></div><div data-test="agreement-text" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1j03gzc" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; font-weight: inherit; margin: 0px;"><label for="agreement-checkbox-base" id="bkmrk-i%2C%C2%A0plato-northup%2C-un" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; touch-action: manipulation; margin-bottom: 5px; display: inline-block; font-weight: bold;"><span class="cds-797 css-1j071wf cds-799" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; margin: 0px; font-size: 1rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; line-height: 1.5rem; letter-spacing: 0px; color: rgb(0, 65, 158) !important;"><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(0, 65, 158) !important;">I, **Plato Northup**, understand that submitting work that isn’t my own may result in permanent failure of this course or deactivation of my Coursera account.</span></span></label></div></div></div></div></div></div></div>

# Use tools to protect business operations

#   


<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Previously, you were introduced to programming, operating systems, and tools commonly used by cybersecurity professionals. In this reading, you’ll learn more about programming and operating systems, as well as other tools that entry-level analysts use to help protect organizations and the people they serve. </span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Tools and their purposes</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Programming** </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Programming**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is a process that can be used to create a specific set of instructions for a computer to execute tasks. Security analysts use programming languages, such as Python, to execute automation. </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Automation**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is the use of technology to reduce human and manual effort in performing common and repetitive tasks. Automation also helps reduce the risk of human error.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Another programming language used by analysts is called Structured Query Language (SQL). </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**SQL**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is used to create, interact with, and request information from a database. A </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**database** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">is an organized collection of information or data. There can be millions of data points</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">in a database. A </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**data point**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is a specific piece of information. </span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Operating systems**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">An </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**operating system**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is the interface between computer hardware and the user. Linux®, macOS®, and Windows are operating systems. They each offer different functionality and user experiences. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Previously, you were introduced to </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Linux** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">as an open-source operating system. Open source means that the code is available to the public and allows people to make contributions to improve the software. Linux is not a programming language; however, it does involve the use of a command line within the operating system. A </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**command**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is an instruction telling the computer to do something. A </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**command-line** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">interface</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">is a text-based user interface that uses commands to interact with the computer. You will learn more about Linux, including the Linux kernel and GNU, in a later course.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Web vulnerability**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**web vulnerability**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is malicious code or behavior that's used to take advantage of coding flaws in a web application. Vulnerable web applications can be exploited by threat actors, allowing unauthorized access, data theft, and malware deployment.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">To stay up-to-date on the most critical risks to web applications, review the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Open Web Application Security Project (OWASP) Top 10<svg aria-labelledby="cds-react-aria-358-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--1" role="img" viewbox="0 0 16 16" width="16"></svg>](https://owasp.org/www-project-top-ten/)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Antivirus software**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Antivirus software**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is a software program used to prevent, detect, and eliminate malware and viruses. It is also called anti-malware. Depending on the type of antivirus software, it can scan the memory of a device to find patterns that indicate the presence of malware. </span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Intrusion detection system** </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">An</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> **intrusion detection system**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> (IDS) is an application that monitors system activity and alerts on possible intrusions. The system scans and analyzes network packets, which carry small amounts of data through a network. The small amount of data makes the detection process easier for an IDS to identify potential threats to sensitive data. Other occurrences an IDS might detect can include theft and unauthorized access.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Encryption**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Encryption**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is the process of converting data from a readable format to a cryptographically encoded format. </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Cryptographic encoding**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> means converting plaintext into secure ciphertext. </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Plaintext**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is unencrypted information and </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**secure ciphertext**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is the result of encryption. A cryptographic form of code is used to communicate in secret and prevent unauthorized, unapproved access to data, programs, or devices. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Note:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Encoding and encryption serve different purposes. Encoding uses a public conversion algorithm to enable systems that use different data representations to share information. Encryption makes data unreadable and difficult to decode for an unauthorized user; its main goal is to ensure confidentiality of private data. </span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Penetration testing** </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Penetration testing**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">, also called pen testing, is the act of participating in a simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes. It is a thorough risk assessment that can evaluate and identify external and internal threats as well as weaknesses.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Key takeaways</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">In this reading, you learned more about programming and operating systems. You were also introduced to several new tools and processes. Every organization selects their own set of tools. Therefore, the more tools you know, the more valuable you are to an organization. Tools help security analysts complete their tasks more efficiently and effectively.</span>

# Glossary terms from week 4

# <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Terms and definitions from the certificate</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Terms and definitions from Course 1, Week 4**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Antivirus software:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> A software program used to prevent, detect, and eliminate malware and viruses</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Database:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">An organized collection of information or data</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Data point:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A specific piece of information</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Intrusion detection system (IDS):** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">An application that monitors system activity and alerts on possible intrusions</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Linux:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> An open-source operating system</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Log:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> A record of events that occur within an organization’s systems </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Network protocol analyzer (packet sniffer):**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> A tool designed to capture and analyze data traffic within a network</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Order of volatility:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> A sequence outlining the order of data that must be preserved from first to last</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Programming:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> A process that can be used to create a specific set of instructions for a computer to execute tasks</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Protecting and preserving evidence:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> The process of properly working with fragile and volatile digital evidence</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Security information and event management (SIEM)**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: An application that collects and analyzes log data to monitor critical activities in an organization</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**SQL (Structured Query Language):**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> A programming language used to create, interact with, and request information from a database</span>