Recently Updated Pages
Welcome to week 4; threats and social engeneering
Here we are! The final section of the course. What are amazing job you've done so far! Pu...
The criminal art of persuasion
When you hear the word "cybercriminal", what comes to mind? You may imagine a hacker hunc...
Wrap-up; Terms and definitions from Course 5, Week 3
Here we are at the end of this section! Can you believe it? I had so much fun exploring t...
Fortify against brute force cyber attacks
Usernames and passwords are one of the most common and important security controls in use today. ...
Pathways through defenses
To defend against attacks, organizations need to have more than just the understanding of t...
Niru: Adopt an attacker mindset
Hi, I'm Niru, and I lead the red team at Google. The red team at Google simulates attackers tha...
Types of threat actors
Anticipating attacks is an important skill you’ll need to be an effective security professional. ...
Approach cybersecurity with an attacker mindset
Cybersecurity is a continuously changing field. It's a fast-paced environment where new threats a...
Protect all entry points
There's a wide range of vulnerabilities and systems that need to be found. Assessing thos...
Penetration testing
An effective security plan relies on regular testing to find an organization's weaknesses. Previo...
Omad: My learning journey into cybersecurity
My name is Omad, I'm a corporate operations engineer at Google. All I do is solve problems. G...
The importance of updates
At some point in time, you may have wondered, “Why do my devices constantly need updating?” For c...
Approaches to vulnerability scanning
Previously, you learned about a vulnerability assessment, which is the internal review process of...
Vulnerability assessments
Our exploration of the vulnerability management process so far has been focused on a couple...
Open source intelligence
Cyber attacks can sometimes be prevented with the right information, which starts with knowing wh...
The OWASP Top 10
To prepare for future risks, security professionals need to stay informed. Previously, you learne...
Defense in depth strategy
A layered defense is difficult to penetrate. When one barrier fails, another takes its pl...
Common vulnerabilities and exposures
We've discussed before that security is a team effort. Did you know the group extends wel...
Vulnerability management
For every asset that needs protecting, there are dozens of vulnerabilities. Finding tho...
Wrap-up; Terms and definitions from Course 5, Week 2
Our focus in this section was on a major theme of security: protecting assets. A large pa...