Recently Updated Pages
Glossary terms from week 4
Terms and definitions from the certificate Terms and definitions from Course 1, Week 4 Antiviru...
Use tools to protect business operations
Previously, you were introduced to programming, operating systems, and tools commonly used by c...
Introduction to Linux, SQL, and Python
As we discussed previously, organizations use a variety of tools, such as SIEMs, playbooks, and p...
Tools for protecting business operations
Previously, you were introduced to several technical skills that security analysts need to develo...
Common cybersecurity tools
As mentioned earlier, security is like preparing for a storm. If you identify a leak, the color o...
Welcome to week 4
Welcome to the final section of this course! Here, we'll be introducing tools and programming lan...
Glossary terms from week 3
Terms and definitions from Course 1, Week 3 Asset: An item perceived as having value to an organ...
Holly: The importance of ethics as a cybersecurity professional
Hi, I'm Holly and I'm a Cloud Security Architect with Google Cloud. At the beginning of my adult ...
Wrap-up
You are now better prepared to understand and help make decisions regarding assessing and managin...
Ethical concepts that guide cybersecurity decisions
Previously, you were introduced to the concept of security ethics. Security ethics are guidelin...
Ethics in Cybersecurity
In security, new technologies present new challenges. For every new security incident or risk, th...
Glossary terms from week 2
Terms and definitions from Course 1, Week 2 Adversarial artificial intelligence (AI): A techniqu...
Glossary terms from week 1
Terms and definitions from Course 1, Week 1 Cybersecurity (or security): The practice of ensur...
Google Cybersecurity Certificate glossary
A Absolute file path: The full file path, which starts from the root Access controls: Securit...
Heather: Protect sensitive data and information
Hello, my name is Heather and I'm the Vice President of Security Engineering at Google. PII has b...
Controls, frameworks, and compliance
Previously, you were introduced to security frameworks and how they provide a structured approa...
Introduction to security frameworks and controls
Imagine you're working as a security analyst and receive multiple alerts about suspicious activit...
Secure design
Hi, welcome back! Previously, we discussed frameworks and controls in general. In this video, you...
Wrap-up
This concludes our brief introduction to some of the most influential security attacks throughout...
Understand attackers
Previously, you were introduced to the concept of threat actors. As a reminder, a threat actor is...