Skip to main content

Recently Updated Pages

Security hardening Wrap-up & Glossary terms from week 4

[Completed] Professional Google Cyberse... Security hardning

Great work on learning about security hardening! Let's take a few minutes to wrap up what...

Updated 1 year ago by naruzkurai

Kelsey: Cloud security explained

[Completed] Professional Google Cyberse... Security hardning

I'm Kelsey, I'm a distinguished engineer at Google Cloud. I work on compute platforms and sec...

Updated 1 year ago by naruzkurai

Network security applications

[Completed] Professional Google Cyberse... Security hardning

This section of the course covers the topic of network hardening and monitoring. Each device, too...

Updated 1 year ago by naruzkurai

how to read a tcpdump

[Completed] Professional Google Cyberse...

idk if this is correct but from my research this is what I've figured out An example TCP dump lo...

Updated 1 year ago by naruzkurai

Brute force attacks and OS hardening

[Completed] Professional Google Cyberse... Security hardning

In this reading, you’ll learn about brute force attacks. You’ll consider how vulnerabilities can ...

Updated 1 year ago by naruzkurai

Introduction to security hardening

[Completed] Professional Google Cyberse... Security hardning

I want to take a moment to congratulate you on your progress so far. First, you learned a...

Updated 1 year ago by naruzkurai

Glossary terms from week 3 & wrap-up

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

Nice job finishing this section! Let's review what you've learned so far. We discussed ...

Updated 1 year ago by naruzkurai

temp

[Completed] Professional Google Cyberse... Security hardning

things to review On-path attack Distributed denial of service attack (DDoS) Denial of servic...

Updated 1 year ago by naruzkurai

Overview of interception tactics

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

In the previous course items, you learned how packet sniffing and IP spoofing are used in network...

Updated 1 year ago by naruzkurai

IP Spoofing

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

Next, let's learn about another kind of network attack called IP spoofing. IP spoofing ...

Updated 1 year ago by naruzkurai

Malicious packet sniffing

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

In this video, we'll discuss packet sniffing, with a focus on how threat actors may use...

Updated 1 year ago by naruzkurai

Real-life DDoS attack

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

Previously, you were introduced to Denial of Service (DoS) attacks. You also learned that volumet...

Updated 1 year ago by naruzkurai

Read tcpdump logs

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

A network protocol analyzer, sometimes called a packet sniffer or a packet analyzer, is a tool de...

Updated 1 year ago by naruzkurai

Denial of Service (DoS) attacks

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

Welcome back. In this video, we're going to discuss denial of service attacks. A denial...

Updated 1 year ago by naruzkurai

Matt: A professional on dealing with attacks

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

My name's Matt, I'm a chaos specialist at Google. They let us choose our own job titles to be...

Updated 1 year ago by naruzkurai

The case for securing networks

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

Let's start by answering the question, why do we need secure networks? As you've learned,...

Updated 1 year ago by naruzkurai

Course 3 resources and citations

[Completed] Professional Google Cyberse... Firewalls and network security measures

Week 1: Network architecture Resources Helpful resources to get started   Coursera Code...

Updated 1 year ago by naruzkurai

Glossary terms from week 2

[Completed] Professional Google Cyberse... Firewalls and network security measures

Glossary terms from week 2 Terms and definitions from Course 3, Week 2 Address Resolution Proto...

Updated 1 year ago by naruzkurai

Virtual networks and privacy

[Completed] Professional Google Cyberse... Firewalls and network security measures

This section of the course covered a lot of information about network operations. You reviewed th...

Updated 1 year ago by naruzkurai

Proxy servers

[Completed] Professional Google Cyberse... Firewalls and network security measures

Previously, we discussed how firewalls, VPNs, and security zones help to secure networks....

Updated 1 year ago by naruzkurai