Skip to main content

Recently Updated Pages

Penetration testing

[Completed] Professional Google Cyberse...

An effective security plan relies on regular testing to find an organization's weaknesses. Previo...

Updated 2 years ago by naruzkurai

Omad: My learning journey into cybersecurity

[Completed] Professional Google Cyberse...

My name is Omad, I'm a corporate operations engineer at Google. All I do is solve problems. G...

Updated 2 years ago by naruzkurai

The importance of updates

[Completed] Professional Google Cyberse...

At some point in time, you may have wondered, “Why do my devices constantly need updating?” For c...

Updated 2 years ago by naruzkurai

Approaches to vulnerability scanning

[Completed] Professional Google Cyberse...

Previously, you learned about a vulnerability assessment, which is the internal review process of...

Updated 2 years ago by naruzkurai

Vulnerability assessments

[Completed] Professional Google Cyberse...

Our exploration of the vulnerability management process so far has been focused on a couple...

Updated 2 years ago by naruzkurai

Open source intelligence

[Completed] Professional Google Cyberse...

Cyber attacks can sometimes be prevented with the right information, which starts with knowing wh...

Updated 2 years ago by naruzkurai

The OWASP Top 10

[Completed] Professional Google Cyberse...

To prepare for future risks, security professionals need to stay informed. Previously, you learne...

Updated 2 years ago by naruzkurai

Defense in depth strategy

[Completed] Professional Google Cyberse...

A layered defense is difficult to penetrate. When one barrier fails, another takes its pl...

Updated 2 years ago by naruzkurai

Common vulnerabilities and exposures

[Completed] Professional Google Cyberse...

We've discussed before that security is a team effort. Did you know the group extends wel...

Updated 2 years ago by naruzkurai

Vulnerability management

[Completed] Professional Google Cyberse...

For every asset that needs protecting, there are dozens of vulnerabilities.  Finding tho...

Updated 2 years ago by naruzkurai

Wrap-up; Terms and definitions from Course 5, Week 2

[Completed] Professional Google Cyberse...

Our focus in this section was on a major theme of security: protecting assets. A large pa...

Updated 2 years ago by naruzkurai

Welcome to week 3

[Completed] Professional Google Cyberse...

Wow! We've covered a lot together! It's hard to believe we've reached the midpoint of thi...

Updated 2 years ago by naruzkurai

Identity and access management

[Completed] Professional Google Cyberse...

Security is more than simply combining processes and technologies to protect assets. Instead, sec...

Updated 2 years ago by naruzkurai

Tim: Finding purpose in protecting assets

[Completed] Professional Google Cyberse...

My name is Tim and I work on the Detection and Response team at Google. You can think of us as ...

Updated 2 years ago by naruzkurai

Why we audit user activity

[Completed] Professional Google Cyberse...

Have you ever wondered if your employer is keeping a record of when you log into company sy...

Updated 2 years ago by naruzkurai

The mechanisms of authorization

[Completed] Professional Google Cyberse...

Access is as much about authorization as it is about authentication. One of the most impo...

Updated 2 years ago by naruzkurai

The rise of SSO and MFA

[Completed] Professional Google Cyberse...

Most companies help keep their data safely locked up behind authentication systems. Usernames and...

Updated 2 years ago by naruzkurai

Access controls and authentication systems

[Completed] Professional Google Cyberse...

Protecting data is a fundamental feature of security controls. When it comes to keeping i...

Updated 2 years ago by naruzkurai

The evolution of hash functions

[Completed] Professional Google Cyberse...

Hash functions are important controls that are part of every company's security strategy. Hashing...

Updated 2 years ago by naruzkurai

Non-repudiation and hashing

[Completed] Professional Google Cyberse...

We've spent some time together exploring a couple forms of encryption. The two types we'v...

Updated 2 years ago by naruzkurai