Skip to main content

Recently Updated Pages

Wajih: Stay up-to-date on the latest cybersecurity threats

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

My name is Wajih and I'm a security engineer at Google working in the digital forensics departmen...

Updated 2 years ago by naruzkurai

More about OWASP security principles

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

Previously, you learned that cybersecurity analysts help keep data safe and reduce risk for an or...

Updated 2 years ago by naruzkurai

OWASP security principles

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

It's important to understand how to protect an organization's data and assets because that will b...

Updated 2 years ago by naruzkurai

NIST frameworks

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

Welcome back. Before we get started, let's quickly review the purpose of frameworks. Organization...

Updated 2 years ago by naruzkurai

Use the CIA triad to protect organizations

[Completed] Professional Google Cyberse... The CIA triad: Confidentiality, integri...

Use the CIA triad to protect organizations Previously, you were introduced to the confidentialit...

Updated 2 years ago by naruzkurai

Explore the CIA triad

[Completed] Professional Google Cyberse... The CIA triad: Confidentiality, integri...

Great to see you again! While working as an entry-level security analyst, your main responsibilit...

Updated 2 years ago by naruzkurai

The relationship between frameworks and controls

[Completed] Professional Google Cyberse... more about framework and controls

Previously, you learned how organizations use security frameworks and controles to protect agai...

Updated 2 years ago by naruzkurai

Controls

[Completed] Professional Google Cyberse... more about framework and controls

While frameworks are used to create plans to address security risks, threats, and vulnerabilities...

Updated 2 years ago by naruzkurai

Frameworks

[Completed] Professional Google Cyberse... more about framework and controls

In an organization, plans are put in place to protect against a variety of threats, risks, and vu...

Updated 2 years ago by naruzkurai

Welcome to week 2

[Completed] Professional Google Cyberse... more about framework and controls

Welcome back! As a security analyst, your job isn't just keeping organization safe. Your role is ...

Updated 2 years ago by naruzkurai

Glossary terms from week 1

[Completed] Professional Google Cyberse...

Terms and definitions from Course 2, Week 1 Assess: The fifth step of the NIST RMF that means ...

Updated 2 years ago by naruzkurai

Wrap-up

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

You've now completed the first section of this course! Let's review what we've discussed so far.W...

Updated 2 years ago by naruzkurai

Manage common threats, risks, and vulnerabilities

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

Previously, you learned that security involves protecting organizations and people from threats, ...

Updated 2 years ago by naruzkurai

NIST’s Risk Management Framework

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

As you might remember from earlier in the program, the National Institute of Standards and Techno...

Updated 2 years ago by naruzkurai

Herbert: Manage threats, risks, and vulnerabilities

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

My name is Herbert and I am a Security Engineer at Google.  I think I've always been interested ...

Updated 2 years ago by naruzkurai

Threats, risks, and vulnerabilities

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

As an entry-level security analyst, one of your many roles will be to handle  an org...

Updated 2 years ago by naruzkurai

Ashley: My path to cybersecurity

[Completed] Professional Google Cyberse... Explore the CISSP security domains

My name is Ashley and my role at Google is CE Enablement Lead for SecOps sales. All that means is...

Updated 2 years ago by naruzkurai

Explore the CISSP security domains, Part 2

[Completed] Professional Google Cyberse... Explore the CISSP security domains

In this video, we'll cover the last four domains: identity and access management, security assess...

Updated 2 years ago by naruzkurai

Explore the CISSP security domains, Part 1

[Completed] Professional Google Cyberse... Explore the CISSP security domains

Welcome back! You might remember from course one that there are eight security domains, or catego...

Updated 2 years ago by naruzkurai

Welcome to week 1

[Completed] Professional Google Cyberse... Start

The world of security, which we also refer to as cybersecurity throughout this program, is vast. ...

Updated 2 years ago by naruzkurai