[Completed] Professional Google Cybersecurity Specialization C2/8; Play It Safe: Manage Security Risks
started at midnight of 6/3 immediatly after finishing the Cybersecurity fundamentals cert part 1 of 8 in the professional Cybersecurity cert series
Start
Play It Safe: Manage Security Risks Introduction to Cert 2
My name is Ashley, and I'm a Customer Engineering Enablement Lead for Security Operation Sales at...
Course 2 overview
Hello, and welcome to Play It Safe: Manage Security Risks, the se...
Google Cybersecurity Certificate glossary
A Absolute file path: The full file path, which starts from the root Access controls: Securit...
Welcome to week 1
The world of security, which we also refer to as cybersecurity throughout this program, is vast. ...
Explore the CISSP security domains
Explore the CISSP security domains, Part 1
Welcome back! You might remember from course one that there are eight security domains, or catego...
Explore the CISSP security domains, Part 2
In this video, we'll cover the last four domains: identity and access management, security assess...
Security domains cybersecurity analysts need to know
As an analyst, you can explore various areas of cybersecurity that interest you. One way to exp...
Ashley: My path to cybersecurity
My name is Ashley and my role at Google is CE Enablement Lead for SecOps sales. All that means is...
Negative threats, Risks, and vournerabilities
Threats, risks, and vulnerabilities
As an entry-level security analyst, one of your many roles will be to handle an org...
Herbert: Manage threats, risks, and vulnerabilities
My name is Herbert and I am a Security Engineer at Google. I think I've always been interested ...
NIST’s Risk Management Framework
As you might remember from earlier in the program, the National Institute of Standards and Techno...
Manage common threats, risks, and vulnerabilities
Previously, you learned that security involves protecting organizations and people from threats, ...
Wrap-up
You've now completed the first section of this course! Let's review what we've discussed so far.W...
Glossary terms from week 1
Terms and definitions from Course 2, Week 1 Assess: The fifth step of the NIST RMF that means ...
more about framework and controls
Welcome to week 2
Welcome back! As a security analyst, your job isn't just keeping organization safe. Your role is ...
Frameworks
In an organization, plans are put in place to protect against a variety of threats, risks, and vu...
Controls
While frameworks are used to create plans to address security risks, threats, and vulnerabilities...
The relationship between frameworks and controls
Previously, you learned how organizations use security frameworks and controles to protect agai...
The CIA triad: Confidentiality, integrity, and availability
NIST frameworks and OWASP principles and security audits
NIST frameworks
Welcome back. Before we get started, let's quickly review the purpose of frameworks. Organization...
OWASP security principles
It's important to understand how to protect an organization's data and assets because that will b...
More about OWASP security principles
Previously, you learned that cybersecurity analysts help keep data safe and reduce risk for an or...
Wajih: Stay up-to-date on the latest cybersecurity threats
My name is Wajih and I'm a security engineer at Google working in the digital forensics departmen...
More about security audits
Previously, you were introduced to how to plan and complete an internal security audit. In this r...
Glossary terms from week 2
Terms and definitions from Course 2, Week 2 Asset: An item perceived as having value to an organ...
Security information and event management (SIEM) dashboards
Welcome to week 3
Welcome back! Previously, we discussed security frameworks, controls, and design principles, and ...
Logs and SIEM tools
As a security analyst, one of your responsibilities might include analyzing log data to mitigate ...
SIEM dashboards
We've explored how SIEM tools are used to collect and analyze log data. However, this is just one...
The future of SIEM tools
Previously, you were introduced to security information and event management (SIEM) tools, along ...
Parisa: The parallels of accessibility and security
My name is Parisa and I'm a vice president of engineering and lead the Chrome Team. So as Genera...
Explore security information and event management (SIEM) tools
Explore common SIEM tools
Hello again! Previously, we discussed how SIEM tools help security analysts monitor systems and d...
More about cybersecurity tools
Previously, you learned about several tools that are used by cybersecurity team members to monito...
Talya: Myths about the cybersecurity field
I'm Talia, and I'm an engineer within privacy, safety and security at Google. So there are a lot ...
Use SIEM tools to protect organizations
Previously, you were introduced to security information and event management (SIEM) tools and a f...
Wrap-up
Let's quickly review what we covered in this section of the course. We started by discussing the ...
Glossary terms from week 3
Terms and definitions from Course 2, Week 3 Chronicle: A cloud-native tool designed to retain, a...
Phases of incident response playbooks
Welcome to Week 4
Hello and welcome back. You've reached the final section of this course! Previously, we discussed...
Phases of an incident response playbook
Previously, we discussed how SIEM tools are used to help protect an organization's critical asset...
More about playbooks
Previously, you learned that playbooks are tools used by cybersecurity professionals to identify ...
Zack: Incident response and the value of playbooks
My name is Zack. I'm a Software Engineer on the security team in Google Workspace. I have non-tra...
Explore incident response
Use a playbook to respond to threats, risks, or vulnerabilities
Welcome back! In this video, we're going to revisit SIEM tools and how they're used alongside pla...
Erin: The importance of diversity of perspective on a security team
Hi everyone. My name is Erin and I am a privacy engineer at Google. I work on speculative and eme...
Playbooks, SIEM tools, and SOAR tools
Playbooks and SIEM tools Previously, you learned that security teams encounter threats, risks, v...
Wrap-up
Let's review what we covered in this section. We began by discussing the purpose of playbooks.The...
Glossary terms from week 4
Terms and definitions from Course 2, Week 4 Antivirus software: A software program used to preve...
Course wrap-up
Congratulations on completing this course! Let's recap what we've covered so far. First, we revie...
Glossary Cybersecurity Terms and definitions from Course 2
AAntivirus software: A software program used to prevent, detect, and eliminatemalware and viru...