Skip to main content

Recently Updated Pages

Chantelle: The value of diversity in cybersecurity

[Completed] Professional Google Cyberse...

My name is Chantelle. I'm a Security Engineer here at Google, and I am part of the security...

Updated 2 years ago by naruzkurai

A proactive approach to security

[Completed] Professional Google Cyberse...

Preparing for attacks is an important job that the entire security team is responsible for....

Updated 2 years ago by naruzkurai

Prevent injection attacks; SQL injection categories

[Completed] Professional Google Cyberse...

Previously, you learned that Structured Query Language (SQL) is a programming language used to cr...

Updated 2 years ago by naruzkurai

Exploitable gaps in databases

[Completed] Professional Google Cyberse...

Let's keep exploring injection and attacks by investigating another common type of web ba...

Updated 2 years ago by naruzkurai

Cross-site scripting (XSS)

[Completed] Professional Google Cyberse...

Previously, we explored a few types of malware. Whether it's installed on an individual c...

Updated 2 years ago by naruzkurai

The rise of cryptojacking

[Completed] Professional Google Cyberse...

Malware has been around nearly as long as computers. In its earliest forms, it was used...

Updated 2 years ago by naruzkurai

An introduction to malware

[Completed] Professional Google Cyberse...

Previously, you learned that malware is software designed to harm devices or networks. Since its ...

Updated 2 years ago by naruzkurai

Malicious software

[Completed] Professional Google Cyberse...

People and computers are very different from one another. There's one way that we're alik...

Updated 2 years ago by naruzkurai

Types of phishing

[Completed] Professional Google Cyberse...

Phishing is one of the most common types of social engineering, which are manipulation techniques...

Updated 2 years ago by naruzkurai

Phishing for information

[Completed] Professional Google Cyberse...

Cybercriminals prefer attacks that do the most amount of damage with the least amount of ef...

Updated 2 years ago by naruzkurai

Social engineering tactics

[Completed] Professional Google Cyberse...

Social engineering attacks are a popular choice among threat actors. That’s because it’s often ea...

Updated 2 years ago by naruzkurai

Welcome to week 4; threats and social engeneering

[Completed] Professional Google Cyberse...

Here we are! The final section of the course. What are amazing job you've done so far! Pu...

Updated 2 years ago by naruzkurai

The criminal art of persuasion

[Completed] Professional Google Cyberse...

When you hear the word "cybercriminal", what comes to mind? You may imagine a hacker hunc...

Updated 2 years ago by naruzkurai

Wrap-up; Terms and definitions from Course 5, Week 3

[Completed] Professional Google Cyberse...

Here we are at the end of this section! Can you believe it? I had so much fun exploring t...

Updated 2 years ago by naruzkurai

Fortify against brute force cyber attacks

[Completed] Professional Google Cyberse...

Usernames and passwords are one of the most common and important security controls in use today. ...

Updated 2 years ago by naruzkurai

Pathways through defenses

[Completed] Professional Google Cyberse...

To defend against attacks, organizations need to have more than just the understanding of t...

Updated 2 years ago by naruzkurai

Niru: Adopt an attacker mindset

[Completed] Professional Google Cyberse...

Hi, I'm Niru, and I lead the red team at Google. The red team at Google simulates attackers tha...

Updated 2 years ago by naruzkurai

Types of threat actors

[Completed] Professional Google Cyberse...

Anticipating attacks is an important skill you’ll need to be an effective security professional. ...

Updated 2 years ago by naruzkurai

Approach cybersecurity with an attacker mindset

[Completed] Professional Google Cyberse...

Cybersecurity is a continuously changing field. It's a fast-paced environment where new threats a...

Updated 2 years ago by naruzkurai

Protect all entry points

[Completed] Professional Google Cyberse...

There's a wide range of vulnerabilities and systems that need to be found. Assessing thos...

Updated 2 years ago by naruzkurai