Skip to main content

Recently Updated Pages

Glossary terms from week 3 & wrap-up

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

Nice job finishing this section! Let's review what you've learned so far. We discussed ...

Updated 2 years ago by naruzkurai

temp

[Completed] Professional Google Cyberse... Security hardning

things to review On-path attack Distributed denial of service attack (DDoS) Denial of servic...

Updated 2 years ago by naruzkurai

Overview of interception tactics

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

In the previous course items, you learned how packet sniffing and IP spoofing are used in network...

Updated 2 years ago by naruzkurai

IP Spoofing

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

Next, let's learn about another kind of network attack called IP spoofing. IP spoofing ...

Updated 2 years ago by naruzkurai

Malicious packet sniffing

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

In this video, we'll discuss packet sniffing, with a focus on how threat actors may use...

Updated 2 years ago by naruzkurai

Real-life DDoS attack

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

Previously, you were introduced to Denial of Service (DoS) attacks. You also learned that volumet...

Updated 2 years ago by naruzkurai

Read tcpdump logs

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

A network protocol analyzer, sometimes called a packet sniffer or a packet analyzer, is a tool de...

Updated 2 years ago by naruzkurai

Denial of Service (DoS) attacks

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

Welcome back. In this video, we're going to discuss denial of service attacks. A denial...

Updated 2 years ago by naruzkurai

Matt: A professional on dealing with attacks

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

My name's Matt, I'm a chaos specialist at Google. They let us choose our own job titles to be...

Updated 2 years ago by naruzkurai

The case for securing networks

[Completed] Professional Google Cyberse... Introduction to intrusion tactics

Let's start by answering the question, why do we need secure networks? As you've learned,...

Updated 2 years ago by naruzkurai

Course 3 resources and citations

[Completed] Professional Google Cyberse... Firewalls and network security measures

Week 1: Network architecture Resources Helpful resources to get started   Coursera Code...

Updated 2 years ago by naruzkurai

Glossary terms from week 2

[Completed] Professional Google Cyberse... Firewalls and network security measures

Glossary terms from week 2 Terms and definitions from Course 3, Week 2 Address Resolution Proto...

Updated 2 years ago by naruzkurai

Virtual networks and privacy

[Completed] Professional Google Cyberse... Firewalls and network security measures

This section of the course covered a lot of information about network operations. You reviewed th...

Updated 2 years ago by naruzkurai

Proxy servers

[Completed] Professional Google Cyberse... Firewalls and network security measures

Previously, we discussed how firewalls, VPNs, and security zones help to secure networks....

Updated 2 years ago by naruzkurai

Subnetting and CIDR

[Completed] Professional Google Cyberse... Firewalls and network security measures

Earlier in this course, you learned about network segmentation, a security technique that divides...

Updated 2 years ago by naruzkurai

Security zones

[Completed] Professional Google Cyberse... Firewalls and network security measures

In this section, we'll discuss a type of network security feature called a security zone....

Updated 2 years ago by naruzkurai

Virtual private networks (VPNs)

[Completed] Professional Google Cyberse... Firewalls and network security measures

In this video, we're going to discuss how virtual private networks, or VPNs, add securi...

Updated 2 years ago by naruzkurai

Firewalls and network security measures

[Completed] Professional Google Cyberse... Firewalls and network security measures

In this video, you'll learn about different types of firewalls. These include hardware,...

Updated 2 years ago by naruzkurai

Wireless protocols, The evolution of wireless security protocols

[Completed] Professional Google Cyberse... Introduction to network protocols

So far, you've learned abouta variety of network protocols,including communication protocols like...

Updated 2 years ago by naruzkurai

Antara: Working in network security

[Completed] Professional Google Cyberse... Introduction to network protocols

My name is Antara,I work on the Enterprise Infrastructure Protection Team at Google.And our main ...

Updated 2 years ago by naruzkurai