Recently Updated Pages
Penetration testing
An effective security plan relies on regular testing to find an organization's weaknesses. Previo...
Omad: My learning journey into cybersecurity
My name is Omad, I'm a corporate operations engineer at Google. All I do is solve problems. G...
The importance of updates
At some point in time, you may have wondered, “Why do my devices constantly need updating?” For c...
Approaches to vulnerability scanning
Previously, you learned about a vulnerability assessment, which is the internal review process of...
Vulnerability assessments
Our exploration of the vulnerability management process so far has been focused on a couple...
Open source intelligence
Cyber attacks can sometimes be prevented with the right information, which starts with knowing wh...
The OWASP Top 10
To prepare for future risks, security professionals need to stay informed. Previously, you learne...
Defense in depth strategy
A layered defense is difficult to penetrate. When one barrier fails, another takes its pl...
Common vulnerabilities and exposures
We've discussed before that security is a team effort. Did you know the group extends wel...
Vulnerability management
For every asset that needs protecting, there are dozens of vulnerabilities. Finding tho...
Wrap-up; Terms and definitions from Course 5, Week 2
Our focus in this section was on a major theme of security: protecting assets. A large pa...
Welcome to week 3
Wow! We've covered a lot together! It's hard to believe we've reached the midpoint of thi...
Identity and access management
Security is more than simply combining processes and technologies to protect assets. Instead, sec...
Tim: Finding purpose in protecting assets
My name is Tim and I work on the Detection and Response team at Google. You can think of us as ...
Why we audit user activity
Have you ever wondered if your employer is keeping a record of when you log into company sy...
The mechanisms of authorization
Access is as much about authorization as it is about authentication. One of the most impo...
The rise of SSO and MFA
Most companies help keep their data safely locked up behind authentication systems. Usernames and...
Access controls and authentication systems
Protecting data is a fundamental feature of security controls. When it comes to keeping i...
The evolution of hash functions
Hash functions are important controls that are part of every company's security strategy. Hashing...
Non-repudiation and hashing
We've spent some time together exploring a couple forms of encryption. The two types we'v...