Recently Updated Pages
Logs and SIEM tools
As a security analyst, one of your responsibilities might include analyzing log data to mitigate ...
Welcome to week 3
Welcome back! Previously, we discussed security frameworks, controls, and design principles, and ...
Glossary terms from week 2
Terms and definitions from Course 2, Week 2 Asset: An item perceived as having value to an organ...
every word and there meaning
Aivu: LoveAykshin: DesertBandan: RubberBanyo: EatBe: Someone elseBej: Someone else, time travel s...
page 1
ok so this is just going to be a literal dictionary, its going to be sorted alphabeticallyand her...
More about security audits
Previously, you were introduced to how to plan and complete an internal security audit. In this r...
Wajih: Stay up-to-date on the latest cybersecurity threats
My name is Wajih and I'm a security engineer at Google working in the digital forensics departmen...
More about OWASP security principles
Previously, you learned that cybersecurity analysts help keep data safe and reduce risk for an or...
OWASP security principles
It's important to understand how to protect an organization's data and assets because that will b...
NIST frameworks
Welcome back. Before we get started, let's quickly review the purpose of frameworks. Organization...
Use the CIA triad to protect organizations
Use the CIA triad to protect organizations Previously, you were introduced to the confidentialit...
Explore the CIA triad
Great to see you again! While working as an entry-level security analyst, your main responsibilit...
The relationship between frameworks and controls
Previously, you learned how organizations use security frameworks and controles to protect agai...
Controls
While frameworks are used to create plans to address security risks, threats, and vulnerabilities...
Frameworks
In an organization, plans are put in place to protect against a variety of threats, risks, and vu...
Welcome to week 2
Welcome back! As a security analyst, your job isn't just keeping organization safe. Your role is ...
Glossary terms from week 1
Terms and definitions from Course 2, Week 1 Assess: The fifth step of the NIST RMF that means ...
Wrap-up
You've now completed the first section of this course! Let's review what we've discussed so far.W...
Manage common threats, risks, and vulnerabilities
Previously, you learned that security involves protecting organizations and people from threats, ...
NIST’s Risk Management Framework
As you might remember from earlier in the program, the National Institute of Standards and Techno...