Skip to main content

Recently Updated Pages

Glossary terms from week 2

[Completed] Professional Google Cyberse... Glossery for modules Foundations of Cyb...

Terms and definitions from Course 1, Week 2 Adversarial artificial intelligence (AI): A techniqu...

Updated 1 year ago by naruzkurai

Glossary terms from week 1

[Completed] Professional Google Cyberse... Glossery for modules Foundations of Cyb...

Terms and definitions from Course 1, Week 1 Cybersecurity (or security): The practice of ensur...

Updated 1 year ago by naruzkurai

Google Cybersecurity Certificate glossary

[Completed] Professional Google Cyberse... Glossery for modules Foundations of Cyb...

A Absolute file path: The full file path, which starts from the root Access controls: Securit...

Updated 1 year ago by naruzkurai

Heather: Protect sensitive data and information

[Completed] Professional Google Cyberse... Frameworks and controles

Hello, my name is Heather and I'm the Vice President of Security Engineering at Google. PII has b...

Updated 1 year ago by naruzkurai

Controls, frameworks, and compliance

[Completed] Professional Google Cyberse... Frameworks and controles

Previously, you were introduced to security frameworks and how they provide a structured approa...

Updated 1 year ago by naruzkurai

Introduction to security frameworks and controls

[Completed] Professional Google Cyberse... Frameworks and controles

Imagine you're working as a security analyst and receive multiple alerts about suspicious activit...

Updated 1 year ago by naruzkurai

Secure design

[Completed] Professional Google Cyberse... Frameworks and controles

Hi, welcome back! Previously, we discussed frameworks and controls in general. In this video, you...

Updated 1 year ago by naruzkurai

Wrap-up

[Completed] Professional Google Cyberse... The eight CISSP security domains

This concludes our brief introduction to some of the most influential security attacks throughout...

Updated 1 year ago by naruzkurai

Understand attackers

[Completed] Professional Google Cyberse... The eight CISSP security domains

Previously, you were introduced to the concept of threat actors. As a reminder, a threat actor is...

Updated 1 year ago by naruzkurai

Determine the type of attack

[Completed] Professional Google Cyberse... The eight CISSP security domains

Previously, you learned about the eight Certified Information Systems Security Professional (CISS...

Updated 1 year ago by naruzkurai

Introduction to the eight CISSP security domains, Part 2

[Completed] Professional Google Cyberse... The eight CISSP security domains

Welcome back. In the last video, we introduced you to the first four security domains. In this vi...

Updated 1 year ago by naruzkurai

Introduction to the eight CISSP security domains, Part 1

[Completed] Professional Google Cyberse... The eight CISSP security domains

As the tactics of threat actors evolve, so do the roles of security professionals. Having a solid...

Updated 1 year ago by naruzkurai

Introduction to security frameworks and controls

[Completed] Professional Google Cyberse... The History if cybersecurity

Imagine you're working as a security analyst and receive multiple alerts about suspicious activit...

Updated 1 year ago by naruzkurai

New Page

Mr. Deli's work Fight

Restless nights grow Feeling my unclenched jaw snap close upon my tongue severing me from the ...

Updated 1 year ago by delli

Sean: Keep your cool during a data breach

[Completed] Professional Google Cyberse... The History if cybersecurity

Hi, my name is Sean. I'm a Technical Program Manager in Google workspace. I am a 30 year security...

Updated 1 year ago by naruzkurai

Common attacks and their effectiveness

[Completed] Professional Google Cyberse... The History if cybersecurity

Previously, you learned about past and present attacks that helped shape the cybersecurity indu...

Updated 1 year ago by naruzkurai

Attacks in the digital age

[Completed] Professional Google Cyberse... The History if cybersecurity

With the expansion of reliable high-speed internet, the number of computers connected to the inte...

Updated 1 year ago by naruzkurai

Past cybersecurity attacks

[Completed] Professional Google Cyberse... The History if cybersecurity

The security industry is constantly evolving, but many present-day attacks are not entirely new. ...

Updated 1 year ago by naruzkurai

welcome to week 2

[Completed] Professional Google Cyberse... The History if cybersecurity

Welcome back! When it comes to security, there is so much to learn, and I'm thrilled to be part o...

Updated 1 year ago by naruzkurai

Wrap-up

[Completed] Professional Google Cyberse... Core Skills for cyber security Professi...

Congratulations on completing the first section of this course! Let's quickly review what we've c...

Updated 1 year ago by naruzkurai