Skip to main content

Recently Updated Pages

Herbert: Manage threats, risks, and vulnerabilities

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

My name is Herbert and I am a Security Engineer at Google.  I think I've always been interested ...

Updated 1 year ago by naruzkurai

Threats, risks, and vulnerabilities

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

As an entry-level security analyst, one of your many roles will be to handle  an org...

Updated 1 year ago by naruzkurai

Ashley: My path to cybersecurity

[Completed] Professional Google Cyberse... Explore the CISSP security domains

My name is Ashley and my role at Google is CE Enablement Lead for SecOps sales. All that means is...

Updated 1 year ago by naruzkurai

Explore the CISSP security domains, Part 2

[Completed] Professional Google Cyberse... Explore the CISSP security domains

In this video, we'll cover the last four domains: identity and access management, security assess...

Updated 1 year ago by naruzkurai

Explore the CISSP security domains, Part 1

[Completed] Professional Google Cyberse... Explore the CISSP security domains

Welcome back! You might remember from course one that there are eight security domains, or catego...

Updated 1 year ago by naruzkurai

Welcome to week 1

[Completed] Professional Google Cyberse... Start

The world of security, which we also refer to as cybersecurity throughout this program, is vast. ...

Updated 1 year ago by naruzkurai

Google Cybersecurity Certificate glossary

[Completed] Professional Google Cyberse... Start

A Absolute file path: The full file path, which starts from the root Access controls: Securit...

Updated 1 year ago by naruzkurai

Course 2 overview

[Completed] Professional Google Cyberse... Start

Hello, and welcome to Play It Safe: Manage Security Risks, the se...

Updated 1 year ago by naruzkurai

Play It Safe: Manage Security Risks Introduction to Cert 2

[Completed] Professional Google Cyberse... Start

My name is Ashley, and I'm a Customer Engineering Enablement Lead for Security Operation Sales at...

Updated 1 year ago by naruzkurai

Glossary terms from week 4

[Completed] Professional Google Cyberse... Core cybersecurity knowlege and skills

Terms and definitions from the certificate Terms and definitions from Course 1, Week 4 Antiviru...

Updated 1 year ago by naruzkurai

Use tools to protect business operations

[Completed] Professional Google Cyberse... Core cybersecurity knowlege and skills

Previously, you were introduced to programming, operating systems, and tools commonly used by c...

Updated 1 year ago by naruzkurai

Introduction to Linux, SQL, and Python

[Completed] Professional Google Cyberse... Core cybersecurity knowlege and skills

As we discussed previously, organizations use a variety of tools, such as SIEMs, playbooks, and p...

Updated 1 year ago by naruzkurai

Tools for protecting business operations

[Completed] Professional Google Cyberse... Important Cybersecurity tools

Previously, you were introduced to several technical skills that security analysts need to develo...

Updated 1 year ago by naruzkurai

Common cybersecurity tools

[Completed] Professional Google Cyberse... Important Cybersecurity tools

As mentioned earlier, security is like preparing for a storm. If you identify a leak, the color o...

Updated 1 year ago by naruzkurai

Welcome to week 4

[Completed] Professional Google Cyberse... Important Cybersecurity tools

Welcome to the final section of this course! Here, we'll be introducing tools and programming lan...

Updated 1 year ago by naruzkurai

Glossary terms from week 3

[Completed] Professional Google Cyberse... Glossery for modules Foundations of Cyb...

Terms and definitions from Course 1, Week 3 Asset: An item perceived as having value to an organ...

Updated 1 year ago by naruzkurai

Holly: The importance of ethics as a cybersecurity professional

[Completed] Professional Google Cyberse... Ethics in Cybersecurity

Hi, I'm Holly and I'm a Cloud Security Architect with Google Cloud. At the beginning of my adult ...

Updated 1 year ago by naruzkurai

Wrap-up

[Completed] Professional Google Cyberse... Ethics in Cybersecurity

You are now better prepared to understand and help make decisions regarding assessing and managin...

Updated 1 year ago by naruzkurai

Ethical concepts that guide cybersecurity decisions

[Completed] Professional Google Cyberse... Ethics in Cybersecurity

Previously, you were introduced to the concept of security ethics. Security ethics are guidelin...

Updated 1 year ago by naruzkurai

Ethics in Cybersecurity

[Completed] Professional Google Cyberse... Ethics in Cybersecurity

In security, new technologies present new challenges. For every new security incident or risk, th...

Updated 1 year ago by naruzkurai