Skip to main content

Recently Updated Pages

NIST frameworks

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

Welcome back. Before we get started, let's quickly review the purpose of frameworks. Organization...

Updated 2 years ago by naruzkurai

Use the CIA triad to protect organizations

[Completed] Professional Google Cyberse... The CIA triad: Confidentiality, integri...

Use the CIA triad to protect organizations Previously, you were introduced to the confidentialit...

Updated 2 years ago by naruzkurai

Explore the CIA triad

[Completed] Professional Google Cyberse... The CIA triad: Confidentiality, integri...

Great to see you again! While working as an entry-level security analyst, your main responsibilit...

Updated 2 years ago by naruzkurai

The relationship between frameworks and controls

[Completed] Professional Google Cyberse... more about framework and controls

Previously, you learned how organizations use security frameworks and controles to protect agai...

Updated 2 years ago by naruzkurai

Controls

[Completed] Professional Google Cyberse... more about framework and controls

While frameworks are used to create plans to address security risks, threats, and vulnerabilities...

Updated 2 years ago by naruzkurai

Frameworks

[Completed] Professional Google Cyberse... more about framework and controls

In an organization, plans are put in place to protect against a variety of threats, risks, and vu...

Updated 2 years ago by naruzkurai

Welcome to week 2

[Completed] Professional Google Cyberse... more about framework and controls

Welcome back! As a security analyst, your job isn't just keeping organization safe. Your role is ...

Updated 2 years ago by naruzkurai

Glossary terms from week 1

[Completed] Professional Google Cyberse...

Terms and definitions from Course 2, Week 1 Assess: The fifth step of the NIST RMF that means ...

Updated 2 years ago by naruzkurai

Wrap-up

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

You've now completed the first section of this course! Let's review what we've discussed so far.W...

Updated 2 years ago by naruzkurai

Manage common threats, risks, and vulnerabilities

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

Previously, you learned that security involves protecting organizations and people from threats, ...

Updated 2 years ago by naruzkurai

NIST’s Risk Management Framework

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

As you might remember from earlier in the program, the National Institute of Standards and Techno...

Updated 2 years ago by naruzkurai

Herbert: Manage threats, risks, and vulnerabilities

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

My name is Herbert and I am a Security Engineer at Google.  I think I've always been interested ...

Updated 2 years ago by naruzkurai

Threats, risks, and vulnerabilities

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

As an entry-level security analyst, one of your many roles will be to handle  an org...

Updated 2 years ago by naruzkurai

Ashley: My path to cybersecurity

[Completed] Professional Google Cyberse... Explore the CISSP security domains

My name is Ashley and my role at Google is CE Enablement Lead for SecOps sales. All that means is...

Updated 2 years ago by naruzkurai

Explore the CISSP security domains, Part 2

[Completed] Professional Google Cyberse... Explore the CISSP security domains

In this video, we'll cover the last four domains: identity and access management, security assess...

Updated 2 years ago by naruzkurai

Explore the CISSP security domains, Part 1

[Completed] Professional Google Cyberse... Explore the CISSP security domains

Welcome back! You might remember from course one that there are eight security domains, or catego...

Updated 2 years ago by naruzkurai

Welcome to week 1

[Completed] Professional Google Cyberse... Start

The world of security, which we also refer to as cybersecurity throughout this program, is vast. ...

Updated 2 years ago by naruzkurai

Google Cybersecurity Certificate glossary

[Completed] Professional Google Cyberse... Start

A Absolute file path: The full file path, which starts from the root Access controls: Securit...

Updated 2 years ago by naruzkurai

Course 2 overview

[Completed] Professional Google Cyberse... Start

Hello, and welcome to Play It Safe: Manage Security Risks, the se...

Updated 2 years ago by naruzkurai

Play It Safe: Manage Security Risks Introduction to Cert 2

[Completed] Professional Google Cyberse... Start

My name is Ashley, and I'm a Customer Engineering Enablement Lead for Security Operation Sales at...

Updated 2 years ago by naruzkurai