Skip to main content

Recently Updated Pages

Inside the operating system

[Completed] Professional Google Cyberse... All things Operating System

Previously, you learned about what operating systems are. Now, let's discuss how they wor...

Updated 2 years ago by naruzkurai

Compare operating systems

[Completed] Professional Google Cyberse... All things Operating System

You previously explored why operating systems are an important part of how a computer works.  In ...

Updated 2 years ago by naruzkurai

Kim: My journey into computing

[Completed] Professional Google Cyberse... All things Operating System

Hi, I'm Kim. I'm a technical program manager at Google.  I'm currently working in the securi...

Updated 2 years ago by naruzkurai

Welcome to week 1; Introduction to operating systems

[Completed] Professional Google Cyberse... All things Operating System

How many times a week do you use a computer? For some of us, the answer might be "a lot"!...

Updated 2 years ago by naruzkurai

Helpful resources and tips

[Completed] Professional Google Cyberse... All things Operating System

As a learner, you can choose to complete one or multiple courses in this program. However, to obt...

Updated 2 years ago by naruzkurai

Introduction to Course 4

[Completed] Professional Google Cyberse... All things Operating System

Hi! Welcome to this course on computing basics for security. My name is Kim, and I work a...

Updated 2 years ago by naruzkurai

Course wrap-up; Glossary Cybersecurity Course 3

[Completed] Professional Google Cyberse...

Wow, we have covered a lot in this course! Let's review everything we've discussed. You...

Updated 2 years ago by naruzkurai

Cloud Hardening

[Completed] Professional Google Cyberse... Security hardning

Network security in the cloud  In recent years, many organizations are using network servi...

Updated 2 years ago by naruzkurai

tech enthusiest reminder

[Completed] Professional Google Cyberse... getting started & introduction to networks

A hub is a network device that broadcasts information to every device on the network.

Updated 2 years ago by naruzkurai

Network hardening practices

[Completed] Professional Google Cyberse... Security hardning

Earlier, you learned that OS hardening focuses on device safety and uses patch updates, sec...

Updated 2 years ago by naruzkurai

OS hardening practices

[Completed] Professional Google Cyberse... Security hardning

Hi there. In this video, we'll discuss operating system, or OS, hardening and why it's ...

Updated 2 years ago by naruzkurai

Security hardening Wrap-up & Glossary terms from week 4

[Completed] Professional Google Cyberse... Security hardning

Great work on learning about security hardening! Let's take a few minutes to wrap up what...

Updated 2 years ago by naruzkurai

Kelsey: Cloud security explained

[Completed] Professional Google Cyberse... Security hardning

I'm Kelsey, I'm a distinguished engineer at Google Cloud. I work on compute platforms and sec...

Updated 2 years ago by naruzkurai

Network security applications

[Completed] Professional Google Cyberse... Security hardning

This section of the course covers the topic of network hardening and monitoring. Each device, too...

Updated 2 years ago by naruzkurai

how to read a tcpdump

[Completed] Professional Google Cyberse...

idk if this is correct but from my research this is what I've figured out An example TCP dump lo...

Updated 2 years ago by naruzkurai

Brute force attacks and OS hardening

[Completed] Professional Google Cyberse... Security hardning

In this reading, you’ll learn about brute force attacks. You’ll consider how vulnerabilities can ...

Updated 2 years ago by naruzkurai

Introduction to security hardening

[Completed] Professional Google Cyberse... Security hardning

I want to take a moment to congratulate you on your progress so far. First, you learned a...

Updated 2 years ago by naruzkurai

Glossary terms from week 3 & wrap-up

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

Nice job finishing this section! Let's review what you've learned so far. We discussed ...

Updated 2 years ago by naruzkurai

temp

[Completed] Professional Google Cyberse... Security hardning

things to review On-path attack Distributed denial of service attack (DDoS) Denial of servic...

Updated 2 years ago by naruzkurai

Overview of interception tactics

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

In the previous course items, you learned how packet sniffing and IP spoofing are used in network...

Updated 2 years ago by naruzkurai