Skip to main content

Recently Updated Pages

Logs and SIEM tools

[Completed] Professional Google Cyberse... Security information and event manageme...

As a security analyst, one of your responsibilities might include analyzing log data to mitigate ...

Updated 1 year ago by naruzkurai

Welcome to week 3

[Completed] Professional Google Cyberse... Security information and event manageme...

Welcome back! Previously, we discussed security frameworks, controls, and design principles, and ...

Updated 1 year ago by naruzkurai

Glossary terms from week 2

[Completed] Professional Google Cyberse...

Terms and definitions from Course 2, Week 2 Asset: An item perceived as having value to an organ...

Updated 1 year ago by naruzkurai

every word and there meaning

Kuroik Dictionary Starting with the letter A

Aivu: LoveAykshin: DesertBandan: RubberBanyo: EatBe: Someone elseBej: Someone else, time travel s...

Updated 1 year ago by naruzkurai

page 1

Kuroik Dictionary Preface

ok so this is just going to be a literal dictionary, its going to be sorted alphabeticallyand her...

Updated 1 year ago by naruzkurai

More about security audits

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

Previously, you were introduced to how to plan and complete an internal security audit. In this r...

Updated 1 year ago by naruzkurai

Wajih: Stay up-to-date on the latest cybersecurity threats

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

My name is Wajih and I'm a security engineer at Google working in the digital forensics departmen...

Updated 1 year ago by naruzkurai

More about OWASP security principles

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

Previously, you learned that cybersecurity analysts help keep data safe and reduce risk for an or...

Updated 1 year ago by naruzkurai

OWASP security principles

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

It's important to understand how to protect an organization's data and assets because that will b...

Updated 1 year ago by naruzkurai

NIST frameworks

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

Welcome back. Before we get started, let's quickly review the purpose of frameworks. Organization...

Updated 1 year ago by naruzkurai

Use the CIA triad to protect organizations

[Completed] Professional Google Cyberse... The CIA triad: Confidentiality, integri...

Use the CIA triad to protect organizations Previously, you were introduced to the confidentialit...

Updated 1 year ago by naruzkurai

Explore the CIA triad

[Completed] Professional Google Cyberse... The CIA triad: Confidentiality, integri...

Great to see you again! While working as an entry-level security analyst, your main responsibilit...

Updated 1 year ago by naruzkurai

The relationship between frameworks and controls

[Completed] Professional Google Cyberse... more about framework and controls

Previously, you learned how organizations use security frameworks and controles to protect agai...

Updated 1 year ago by naruzkurai

Controls

[Completed] Professional Google Cyberse... more about framework and controls

While frameworks are used to create plans to address security risks, threats, and vulnerabilities...

Updated 1 year ago by naruzkurai

Frameworks

[Completed] Professional Google Cyberse... more about framework and controls

In an organization, plans are put in place to protect against a variety of threats, risks, and vu...

Updated 1 year ago by naruzkurai

Welcome to week 2

[Completed] Professional Google Cyberse... more about framework and controls

Welcome back! As a security analyst, your job isn't just keeping organization safe. Your role is ...

Updated 1 year ago by naruzkurai

Glossary terms from week 1

[Completed] Professional Google Cyberse...

Terms and definitions from Course 2, Week 1 Assess: The fifth step of the NIST RMF that means ...

Updated 1 year ago by naruzkurai

Wrap-up

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

You've now completed the first section of this course! Let's review what we've discussed so far.W...

Updated 1 year ago by naruzkurai

Manage common threats, risks, and vulnerabilities

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

Previously, you learned that security involves protecting organizations and people from threats, ...

Updated 1 year ago by naruzkurai

NIST’s Risk Management Framework

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

As you might remember from earlier in the program, the National Institute of Standards and Techno...

Updated 1 year ago by naruzkurai