Recently Updated Pages
NIST frameworks
Welcome back. Before we get started, let's quickly review the purpose of frameworks. Organization...
Use the CIA triad to protect organizations
Use the CIA triad to protect organizations Previously, you were introduced to the confidentialit...
Explore the CIA triad
Great to see you again! While working as an entry-level security analyst, your main responsibilit...
The relationship between frameworks and controls
Previously, you learned how organizations use security frameworks and controles to protect agai...
Controls
While frameworks are used to create plans to address security risks, threats, and vulnerabilities...
Frameworks
In an organization, plans are put in place to protect against a variety of threats, risks, and vu...
Welcome to week 2
Welcome back! As a security analyst, your job isn't just keeping organization safe. Your role is ...
Glossary terms from week 1
Terms and definitions from Course 2, Week 1 Assess: The fifth step of the NIST RMF that means ...
Wrap-up
You've now completed the first section of this course! Let's review what we've discussed so far.W...
Manage common threats, risks, and vulnerabilities
Previously, you learned that security involves protecting organizations and people from threats, ...
NIST’s Risk Management Framework
As you might remember from earlier in the program, the National Institute of Standards and Techno...
Herbert: Manage threats, risks, and vulnerabilities
My name is Herbert and I am a Security Engineer at Google. I think I've always been interested ...
Threats, risks, and vulnerabilities
As an entry-level security analyst, one of your many roles will be to handle an org...
Ashley: My path to cybersecurity
My name is Ashley and my role at Google is CE Enablement Lead for SecOps sales. All that means is...
Explore the CISSP security domains, Part 2
In this video, we'll cover the last four domains: identity and access management, security assess...
Explore the CISSP security domains, Part 1
Welcome back! You might remember from course one that there are eight security domains, or catego...
Welcome to week 1
The world of security, which we also refer to as cybersecurity throughout this program, is vast. ...
Google Cybersecurity Certificate glossary
A Absolute file path: The full file path, which starts from the root Access controls: Securit...
Course 2 overview
Hello, and welcome to Play It Safe: Manage Security Risks, the se...
Play It Safe: Manage Security Risks Introduction to Cert 2
My name is Ashley, and I'm a Customer Engineering Enablement Lead for Security Operation Sales at...