Security hardning
temp
things to review On-path attack Distributed denial of service attack (DDoS) Denial of servic...
Introduction to security hardening
I want to take a moment to congratulate you on your progress so far. First, you learned a...
OS hardening practices
Hi there. In this video, we'll discuss operating system, or OS, hardening and why it's ...
Brute force attacks and OS hardening
In this reading, you’ll learn about brute force attacks. You’ll consider how vulnerabilities can ...
Network hardening practices
Earlier, you learned that OS hardening focuses on device safety and uses patch updates, sec...
Network security applications
This section of the course covers the topic of network hardening and monitoring. Each device, too...
Kelsey: Cloud security explained
I'm Kelsey, I'm a distinguished engineer at Google Cloud. I work on compute platforms and sec...
Security hardening Wrap-up & Glossary terms from week 4
Great work on learning about security hardening! Let's take a few minutes to wrap up what...
Cloud Hardening
Network security in the cloud In recent years, many organizations are using network servi...