Recently Updated Pages
Inside the operating system
Previously, you learned about what operating systems are. Now, let's discuss how they wor...
Compare operating systems
You previously explored why operating systems are an important part of how a computer works. In ...
Kim: My journey into computing
Hi, I'm Kim. I'm a technical program manager at Google. I'm currently working in the securi...
Welcome to week 1; Introduction to operating systems
How many times a week do you use a computer? For some of us, the answer might be "a lot"!...
Helpful resources and tips
As a learner, you can choose to complete one or multiple courses in this program. However, to obt...
Introduction to Course 4
Hi! Welcome to this course on computing basics for security. My name is Kim, and I work a...
Course wrap-up; Glossary Cybersecurity Course 3
Wow, we have covered a lot in this course! Let's review everything we've discussed. You...
Cloud Hardening
Network security in the cloud In recent years, many organizations are using network servi...
tech enthusiest reminder
A hub is a network device that broadcasts information to every device on the network.
Network hardening practices
Earlier, you learned that OS hardening focuses on device safety and uses patch updates, sec...
OS hardening practices
Hi there. In this video, we'll discuss operating system, or OS, hardening and why it's ...
Security hardening Wrap-up & Glossary terms from week 4
Great work on learning about security hardening! Let's take a few minutes to wrap up what...
Kelsey: Cloud security explained
I'm Kelsey, I'm a distinguished engineer at Google Cloud. I work on compute platforms and sec...
Network security applications
This section of the course covers the topic of network hardening and monitoring. Each device, too...
how to read a tcpdump
idk if this is correct but from my research this is what I've figured out An example TCP dump lo...
Brute force attacks and OS hardening
In this reading, you’ll learn about brute force attacks. You’ll consider how vulnerabilities can ...
Introduction to security hardening
I want to take a moment to congratulate you on your progress so far. First, you learned a...
Glossary terms from week 3 & wrap-up
Nice job finishing this section! Let's review what you've learned so far. We discussed ...
temp
things to review On-path attack Distributed denial of service attack (DDoS) Denial of servic...
Overview of interception tactics
In the previous course items, you learned how packet sniffing and IP spoofing are used in network...