Skip to main content

Recently Updated Pages

The mechanisms of authorization

[Completed] Professional Google Cyberse...

Access is as much about authorization as it is about authentication. One of the most impo...

Updated 2 years ago by naruzkurai

Why we audit user activity

[Completed] Professional Google Cyberse...

Have you ever wondered if your employer is keeping a record of when you log into company sy...

Updated 2 years ago by naruzkurai

Tim: Finding purpose in protecting assets

[Completed] Professional Google Cyberse...

My name is Tim and I work on the Detection and Response team at Google. You can think of us as ...

Updated 2 years ago by naruzkurai

Identity and access management

[Completed] Professional Google Cyberse...

Security is more than simply combining processes and technologies to protect assets. Instead, sec...

Updated 2 years ago by naruzkurai

Welcome to week 3

[Completed] Professional Google Cyberse...

Wow! We've covered a lot together! It's hard to believe we've reached the midpoint of thi...

Updated 2 years ago by naruzkurai

Wrap-up; Terms and definitions from Course 5, Week 2

[Completed] Professional Google Cyberse...

Our focus in this section was on a major theme of security: protecting assets. A large pa...

Updated 2 years ago by naruzkurai

Information privacy: Regulations and compliance

[Completed] Professional Google Cyberse...

Security and privacy have a close relationship. As you may recall, people have the right to contr...

Updated 2 years ago by naruzkurai

Heather: The importance of protecting PII

[Completed] Professional Google Cyberse...

Hello, my name is Heather and I'm the Vice President of Security Engineering at Goo...

Updated 2 years ago by naruzkurai

Fundamentals of cryptography

[Completed] Professional Google Cyberse...

The internet is an open, public system with a lot of data flowing through it. Even though...

Updated 2 years ago by naruzkurai

Public key infrastructure PKI

[Completed] Professional Google Cyberse...

Computers use a lot of encryption algorithms to send and store information online. They'r...

Updated 2 years ago by naruzkurai

Symmetric and asymmetric encryption

[Completed] Professional Google Cyberse...

Previously, you learned these terms:  Encryption: the process of converting data from a read...

Updated 2 years ago by naruzkurai

Symmetric and asymmetric encryption

[Completed] Professional Google Cyberse...

Previously, you learned these terms:  Encryption: the process of converting data f...

Updated 2 years ago by naruzkurai

Non-repudiation and hashing

[Completed] Professional Google Cyberse...

We've spent some time together exploring a couple forms of encryption. The two types we'v...

Updated 2 years ago by naruzkurai

Security guidelines in action

[Completed] Professional Google Cyberse...

Organizations often face an overwhelming amount of risk. Developing a security plan from the begi...

Updated 2 years ago by naruzkurai

The emergence of cloud security

[Completed] Professional Google Cyberse...

One of the most significant technology developments this century has been the emergence of cloud ...

Updated 2 years ago by naruzkurai

Elements of a security plan

[Completed] Professional Google Cyberse...

Security is all about people, processes, and technology. It's a team effort, and I mean t...

Updated 2 years ago by naruzkurai

The NIST Cybersecurity Framework

[Completed] Professional Google Cyberse...

Having a plan is just one part of securing assets. Once the plan is in action, the other ...

Updated 2 years ago by naruzkurai

The data lifecycle

[Completed] Professional Google Cyberse...

Organizations of all sizes handle a large amount of data that must be kept private. You learned t...

Updated 2 years ago by naruzkurai

Welcome to week 2

[Completed] Professional Google Cyberse...

I was fascinated by a world-wide malware event that happened in 2017. I started watching ...

Updated 2 years ago by naruzkurai

Security controls

[Completed] Professional Google Cyberse...

These days, information is in so many places at once. As a result, organizations are unde...

Updated 2 years ago by naruzkurai