Recently Updated Pages
Wajih: Stay up-to-date on the latest cybersecurity threats
My name is Wajih and I'm a security engineer at Google working in the digital forensics departmen...
More about OWASP security principles
Previously, you learned that cybersecurity analysts help keep data safe and reduce risk for an or...
OWASP security principles
It's important to understand how to protect an organization's data and assets because that will b...
NIST frameworks
Welcome back. Before we get started, let's quickly review the purpose of frameworks. Organization...
Use the CIA triad to protect organizations
Use the CIA triad to protect organizations Previously, you were introduced to the confidentialit...
Explore the CIA triad
Great to see you again! While working as an entry-level security analyst, your main responsibilit...
The relationship between frameworks and controls
Previously, you learned how organizations use security frameworks and controles to protect agai...
Controls
While frameworks are used to create plans to address security risks, threats, and vulnerabilities...
Frameworks
In an organization, plans are put in place to protect against a variety of threats, risks, and vu...
Welcome to week 2
Welcome back! As a security analyst, your job isn't just keeping organization safe. Your role is ...
Glossary terms from week 1
Terms and definitions from Course 2, Week 1 Assess: The fifth step of the NIST RMF that means ...
Wrap-up
You've now completed the first section of this course! Let's review what we've discussed so far.W...
Manage common threats, risks, and vulnerabilities
Previously, you learned that security involves protecting organizations and people from threats, ...
NIST’s Risk Management Framework
As you might remember from earlier in the program, the National Institute of Standards and Techno...
Herbert: Manage threats, risks, and vulnerabilities
My name is Herbert and I am a Security Engineer at Google. I think I've always been interested ...
Threats, risks, and vulnerabilities
As an entry-level security analyst, one of your many roles will be to handle an org...
Ashley: My path to cybersecurity
My name is Ashley and my role at Google is CE Enablement Lead for SecOps sales. All that means is...
Explore the CISSP security domains, Part 2
In this video, we'll cover the last four domains: identity and access management, security assess...
Explore the CISSP security domains, Part 1
Welcome back! You might remember from course one that there are eight security domains, or catego...
Welcome to week 1
The world of security, which we also refer to as cybersecurity throughout this program, is vast. ...