Recently Updated Pages
1.0.1-1.0.2 Why Should I Take This Module and what will i learn?
1.0.1 Why Should I Take This Module? ...
overview
i started ripping this course on August 30th of 2023 so some things may be a bit ...
Welcome to the Ethical Hacker Course
i started ripping this course on August 30th of 2023 so some things may be a bit different ...
Course wrap-up
Congratulations on making it through the end of this course! I can hardly believe...
Terms and definitions from Course 5
Cybersecurity Glossary A Access controls: Security controls that manage access, authorization, ...
Wrap-up; terms and definitions from course 5, week 1
Well done! You made it to the end of this section! Being a security practitioner takes co...
Wrap-up; terms and definitions from course 5, week 4
Managing threats is a major part of what security professionals do. In this part of the cou...
Traits of an effective threat model
Threat modeling is the process of identifying assets, their vulnerabilities, and how each is expo...
PASTA: The Process for Attack Simulation and Threat Analysis
Let's finish exploring threat modelling by taking a look at real-world scenarios. This ti...
Chantelle: The value of diversity in cybersecurity
My name is Chantelle. I'm a Security Engineer here at Google, and I am part of the security...
A proactive approach to security
Preparing for attacks is an important job that the entire security team is responsible for....
Prevent injection attacks; SQL injection categories
Previously, you learned that Structured Query Language (SQL) is a programming language used to cr...
Exploitable gaps in databases
Let's keep exploring injection and attacks by investigating another common type of web ba...
Cross-site scripting (XSS)
Previously, we explored a few types of malware. Whether it's installed on an individual c...
The rise of cryptojacking
Malware has been around nearly as long as computers. In its earliest forms, it was used...
An introduction to malware
Previously, you learned that malware is software designed to harm devices or networks. Since its ...
Malicious software
People and computers are very different from one another. There's one way that we're alik...
Types of phishing
Phishing is one of the most common types of social engineering, which are manipulation techniques...
Phishing for information
Cybercriminals prefer attacks that do the most amount of damage with the least amount of ef...
Social engineering tactics
Social engineering attacks are a popular choice among threat actors. That’s because it’s often ea...