Recently Updated Pages
Chantelle: The value of diversity in cybersecurity
My name is Chantelle. I'm a Security Engineer here at Google, and I am part of the security...
A proactive approach to security
Preparing for attacks is an important job that the entire security team is responsible for....
Prevent injection attacks; SQL injection categories
Previously, you learned that Structured Query Language (SQL) is a programming language used to cr...
Exploitable gaps in databases
Let's keep exploring injection and attacks by investigating another common type of web ba...
Cross-site scripting (XSS)
Previously, we explored a few types of malware. Whether it's installed on an individual c...
The rise of cryptojacking
Malware has been around nearly as long as computers. In its earliest forms, it was used...
An introduction to malware
Previously, you learned that malware is software designed to harm devices or networks. Since its ...
Malicious software
People and computers are very different from one another. There's one way that we're alik...
Types of phishing
Phishing is one of the most common types of social engineering, which are manipulation techniques...
Phishing for information
Cybercriminals prefer attacks that do the most amount of damage with the least amount of ef...
Social engineering tactics
Social engineering attacks are a popular choice among threat actors. That’s because it’s often ea...
Welcome to week 4; threats and social engeneering
Here we are! The final section of the course. What are amazing job you've done so far! Pu...
The criminal art of persuasion
When you hear the word "cybercriminal", what comes to mind? You may imagine a hacker hunc...
Wrap-up; Terms and definitions from Course 5, Week 3
Here we are at the end of this section! Can you believe it? I had so much fun exploring t...
Fortify against brute force cyber attacks
Usernames and passwords are one of the most common and important security controls in use today. ...
Pathways through defenses
To defend against attacks, organizations need to have more than just the understanding of t...
Niru: Adopt an attacker mindset
Hi, I'm Niru, and I lead the red team at Google. The red team at Google simulates attackers tha...
Types of threat actors
Anticipating attacks is an important skill you’ll need to be an effective security professional. ...
Approach cybersecurity with an attacker mindset
Cybersecurity is a continuously changing field. It's a fast-paced environment where new threats a...
Protect all entry points
There's a wide range of vulnerabilities and systems that need to be found. Assessing thos...