Recently Updated Pages
Herbert: Manage threats, risks, and vulnerabilities
My name is Herbert and I am a Security Engineer at Google. I think I've always been interested ...
Threats, risks, and vulnerabilities
As an entry-level security analyst, one of your many roles will be to handle an org...
Ashley: My path to cybersecurity
My name is Ashley and my role at Google is CE Enablement Lead for SecOps sales. All that means is...
Explore the CISSP security domains, Part 2
In this video, we'll cover the last four domains: identity and access management, security assess...
Explore the CISSP security domains, Part 1
Welcome back! You might remember from course one that there are eight security domains, or catego...
Welcome to week 1
The world of security, which we also refer to as cybersecurity throughout this program, is vast. ...
Google Cybersecurity Certificate glossary
A Absolute file path: The full file path, which starts from the root Access controls: Securit...
Course 2 overview
Hello, and welcome to Play It Safe: Manage Security Risks, the se...
Play It Safe: Manage Security Risks Introduction to Cert 2
My name is Ashley, and I'm a Customer Engineering Enablement Lead for Security Operation Sales at...
Glossary terms from week 4
Terms and definitions from the certificate Terms and definitions from Course 1, Week 4 Antiviru...
Use tools to protect business operations
Previously, you were introduced to programming, operating systems, and tools commonly used by c...
Introduction to Linux, SQL, and Python
As we discussed previously, organizations use a variety of tools, such as SIEMs, playbooks, and p...
Tools for protecting business operations
Previously, you were introduced to several technical skills that security analysts need to develo...
Common cybersecurity tools
As mentioned earlier, security is like preparing for a storm. If you identify a leak, the color o...
Welcome to week 4
Welcome to the final section of this course! Here, we'll be introducing tools and programming lan...
Glossary terms from week 3
Terms and definitions from Course 1, Week 3 Asset: An item perceived as having value to an organ...
Holly: The importance of ethics as a cybersecurity professional
Hi, I'm Holly and I'm a Cloud Security Architect with Google Cloud. At the beginning of my adult ...
Wrap-up
You are now better prepared to understand and help make decisions regarding assessing and managin...
Ethical concepts that guide cybersecurity decisions
Previously, you were introduced to the concept of security ethics. Security ethics are guidelin...
Ethics in Cybersecurity
In security, new technologies present new challenges. For every new security incident or risk, th...