Skip to main content

Recently Updated Pages

Welcome to week 3

[Completed] Professional Google Cyberse...

Wow! We've covered a lot together! It's hard to believe we've reached the midpoint of thi...

Updated 1 year ago by naruzkurai

Identity and access management

[Completed] Professional Google Cyberse...

Security is more than simply combining processes and technologies to protect assets. Instead, sec...

Updated 1 year ago by naruzkurai

Tim: Finding purpose in protecting assets

[Completed] Professional Google Cyberse...

My name is Tim and I work on the Detection and Response team at Google. You can think of us as ...

Updated 1 year ago by naruzkurai

Why we audit user activity

[Completed] Professional Google Cyberse...

Have you ever wondered if your employer is keeping a record of when you log into company sy...

Updated 1 year ago by naruzkurai

The mechanisms of authorization

[Completed] Professional Google Cyberse...

Access is as much about authorization as it is about authentication. One of the most impo...

Updated 1 year ago by naruzkurai

The rise of SSO and MFA

[Completed] Professional Google Cyberse...

Most companies help keep their data safely locked up behind authentication systems. Usernames and...

Updated 1 year ago by naruzkurai

Access controls and authentication systems

[Completed] Professional Google Cyberse...

Protecting data is a fundamental feature of security controls. When it comes to keeping i...

Updated 1 year ago by naruzkurai

The evolution of hash functions

[Completed] Professional Google Cyberse...

Hash functions are important controls that are part of every company's security strategy. Hashing...

Updated 1 year ago by naruzkurai

Non-repudiation and hashing

[Completed] Professional Google Cyberse...

We've spent some time together exploring a couple forms of encryption. The two types we'v...

Updated 1 year ago by naruzkurai

Symmetric and asymmetric encryption

[Completed] Professional Google Cyberse...

Previously, you learned these terms:  Encryption: the process of converting data f...

Updated 1 year ago by naruzkurai

Symmetric and asymmetric encryption

[Completed] Professional Google Cyberse...

Previously, you learned these terms:  Encryption: the process of converting data from a read...

Updated 1 year ago by naruzkurai

Public key infrastructure PKI

[Completed] Professional Google Cyberse...

Computers use a lot of encryption algorithms to send and store information online. They'r...

Updated 1 year ago by naruzkurai

Fundamentals of cryptography

[Completed] Professional Google Cyberse...

The internet is an open, public system with a lot of data flowing through it. Even though...

Updated 1 year ago by naruzkurai

Heather: The importance of protecting PII

[Completed] Professional Google Cyberse...

Hello, my name is Heather and I'm the Vice President of Security Engineering at Goo...

Updated 1 year ago by naruzkurai

Information privacy: Regulations and compliance

[Completed] Professional Google Cyberse...

Security and privacy have a close relationship. As you may recall, people have the right to contr...

Updated 1 year ago by naruzkurai

最小権限の原則

[Completed] Professional Google Cyberse...

translated with "MixerBox translate" using chatgpt4 as i suck at reading japanese still im not su...

Updated 1 year ago by naruzkurai

Principle of least privilege

[Completed] Professional Google Cyberse...

Security controls are essential to keeping sensitive data private and safe. One of the most commo...

Updated 1 year ago by naruzkurai

Security controls

[Completed] Professional Google Cyberse...

These days, information is in so many places at once. As a result, organizations are unde...

Updated 1 year ago by naruzkurai

Welcome to week 2

[Completed] Professional Google Cyberse...

I was fascinated by a world-wide malware event that happened in 2017. I started watching ...

Updated 1 year ago by naruzkurai

The data lifecycle

[Completed] Professional Google Cyberse...

Organizations of all sizes handle a large amount of data that must be kept private. You learned t...

Updated 1 year ago by naruzkurai