Recently Updated Pages
Learn more about the TCP/IP model
In this reading, you will build on what you have learned about the Transmission Control Protocol/...
1.1.4 Threat Actors
Before you can understand how an ethical hacker or penetration tester can mim...
1.1.3 Lab - Researching PenTesting Careers
Protego Security Solutions I think i...
1.1.1 Overview
1.1.1 Overview ...
1.0.1-1.0.2 Why Should I Take This Module and what will i learn?
1.0.1 Why Should I Take This Module? ...
overview
i started ripping this course on August 30th of 2023 so some things may be a bit ...
Welcome to the Ethical Hacker Course
i started ripping this course on August 30th of 2023 so some things may be a bit different ...
Course wrap-up
Congratulations on making it through the end of this course! I can hardly believe...
Terms and definitions from Course 5
Cybersecurity Glossary A Access controls: Security controls that manage access, authorization, ...
Wrap-up; terms and definitions from course 5, week 1
Well done! You made it to the end of this section! Being a security practitioner takes co...
Wrap-up; terms and definitions from course 5, week 4
Managing threats is a major part of what security professionals do. In this part of the cou...
Traits of an effective threat model
Threat modeling is the process of identifying assets, their vulnerabilities, and how each is expo...
PASTA: The Process for Attack Simulation and Threat Analysis
Let's finish exploring threat modelling by taking a look at real-world scenarios. This ti...
Chantelle: The value of diversity in cybersecurity
My name is Chantelle. I'm a Security Engineer here at Google, and I am part of the security...
A proactive approach to security
Preparing for attacks is an important job that the entire security team is responsible for....
Prevent injection attacks; SQL injection categories
Previously, you learned that Structured Query Language (SQL) is a programming language used to cr...
Exploitable gaps in databases
Let's keep exploring injection and attacks by investigating another common type of web ba...
Cross-site scripting (XSS)
Previously, we explored a few types of malware. Whether it's installed on an individual c...
The rise of cryptojacking
Malware has been around nearly as long as computers. In its earliest forms, it was used...
An introduction to malware
Previously, you learned that malware is software designed to harm devices or networks. Since its ...