Skip to main content

Recently Updated Pages

Welcome to week 4; threats and social engeneering

[Completed] Professional Google Cyberse...

Here we are! The final section of the course. What are amazing job you've done so far! Pu...

Updated 1 year ago by naruzkurai

The criminal art of persuasion

[Completed] Professional Google Cyberse...

When you hear the word "cybercriminal", what comes to mind? You may imagine a hacker hunc...

Updated 1 year ago by naruzkurai

Wrap-up; Terms and definitions from Course 5, Week 3

[Completed] Professional Google Cyberse...

Here we are at the end of this section! Can you believe it? I had so much fun exploring t...

Updated 1 year ago by naruzkurai

Fortify against brute force cyber attacks

[Completed] Professional Google Cyberse...

Usernames and passwords are one of the most common and important security controls in use today. ...

Updated 1 year ago by naruzkurai

Pathways through defenses

[Completed] Professional Google Cyberse...

To defend against attacks, organizations need to have more than just the understanding of t...

Updated 1 year ago by naruzkurai

Niru: Adopt an attacker mindset

[Completed] Professional Google Cyberse...

Hi, I'm Niru, and I lead the red team at Google. The red team at Google simulates attackers tha...

Updated 1 year ago by naruzkurai

Types of threat actors

[Completed] Professional Google Cyberse...

Anticipating attacks is an important skill you’ll need to be an effective security professional. ...

Updated 1 year ago by naruzkurai

Approach cybersecurity with an attacker mindset

[Completed] Professional Google Cyberse...

Cybersecurity is a continuously changing field. It's a fast-paced environment where new threats a...

Updated 1 year ago by naruzkurai

Protect all entry points

[Completed] Professional Google Cyberse...

There's a wide range of vulnerabilities and systems that need to be found. Assessing thos...

Updated 1 year ago by naruzkurai

Penetration testing

[Completed] Professional Google Cyberse...

An effective security plan relies on regular testing to find an organization's weaknesses. Previo...

Updated 1 year ago by naruzkurai

Omad: My learning journey into cybersecurity

[Completed] Professional Google Cyberse...

My name is Omad, I'm a corporate operations engineer at Google. All I do is solve problems. G...

Updated 1 year ago by naruzkurai

The importance of updates

[Completed] Professional Google Cyberse...

At some point in time, you may have wondered, “Why do my devices constantly need updating?” For c...

Updated 1 year ago by naruzkurai

Approaches to vulnerability scanning

[Completed] Professional Google Cyberse...

Previously, you learned about a vulnerability assessment, which is the internal review process of...

Updated 1 year ago by naruzkurai

Vulnerability assessments

[Completed] Professional Google Cyberse...

Our exploration of the vulnerability management process so far has been focused on a couple...

Updated 1 year ago by naruzkurai

Open source intelligence

[Completed] Professional Google Cyberse...

Cyber attacks can sometimes be prevented with the right information, which starts with knowing wh...

Updated 1 year ago by naruzkurai

The OWASP Top 10

[Completed] Professional Google Cyberse...

To prepare for future risks, security professionals need to stay informed. Previously, you learne...

Updated 1 year ago by naruzkurai

Defense in depth strategy

[Completed] Professional Google Cyberse...

A layered defense is difficult to penetrate. When one barrier fails, another takes its pl...

Updated 1 year ago by naruzkurai

Common vulnerabilities and exposures

[Completed] Professional Google Cyberse...

We've discussed before that security is a team effort. Did you know the group extends wel...

Updated 1 year ago by naruzkurai

Vulnerability management

[Completed] Professional Google Cyberse...

For every asset that needs protecting, there are dozens of vulnerabilities.  Finding tho...

Updated 1 year ago by naruzkurai

Wrap-up; Terms and definitions from Course 5, Week 2

[Completed] Professional Google Cyberse...

Our focus in this section was on a major theme of security: protecting assets. A large pa...

Updated 1 year ago by naruzkurai