Recently Updated Pages
Principle of least privilege
Security controls are essential to keeping sensitive data private and safe. One of the most commo...
Security controls
These days, information is in so many places at once. As a result, organizations are unde...
Welcome to week 2
I was fascinated by a world-wide malware event that happened in 2017. I started watching ...
The data lifecycle
Organizations of all sizes handle a large amount of data that must be kept private. You learned t...
The NIST Cybersecurity Framework
Having a plan is just one part of securing assets. Once the plan is in action, the other ...
Elements of a security plan
Security is all about people, processes, and technology. It's a team effort, and I mean t...
The emergence of cloud security
One of the most significant technology developments this century has been the emergence of cloud ...
Security guidelines in action
Organizations often face an overwhelming amount of risk. Developing a security plan from the begi...
Common classification requirements
Asset management is the process of tracking assets and the risks that affect them. The idea behin...
Security starts with asset classification
It can be really stressful when you have trouble finding something important. You're late...
Tri: Life in asset security
I'm Tri, a security engineer at Google. My department is Detection and Response. Let's see,...
Understand risks, threats, and vulnerabilities
When security events occur, you’ll need to work in close coordination with others to address the ...
Da'Queshia: My path to cybersecurity
Hi. My name is Da'Queshia. I'm a security engineer. That basically means I work securing Go...
Course 5 overview
Hello, and welcome to Assets, Threats, and Vulnerabilities, the fifth course in the Google Cybers...
Introduction to Course 5
What do you picture when you think about the security field? This might make you think of...
Terms and definitions from Course 1
A Adversarial artificial intelligence (AI): A technique that manipulates artificial intelligen...
1. Two Sum
Given an array of integers nums and an integer target, return indices of the two numbers such tha...
obsidian tutorial
https://www.youtube.com/watch?v=DbsAQSIKQXk&ab_channel=NoBoilerplate
RealTimeColors.com
https://www.youtube.com/watch?v=HAlIWRcldoc make a website color pallet
Things You Can Do to Make Security Worse in Your Network - Ignite Style by Jack Rhysider
i used chat gpt voxscript to get this coz its great, but its 7+ years old and he stutters allot a...