Skip to main content

Recently Updated Pages

Glossary terms from week 4

[Completed] Professional Google Cyberse... Core cybersecurity knowlege and skills

Terms and definitions from the certificate Terms and definitions from Course 1, Week 4 Antiviru...

Updated 2 years ago by naruzkurai

Use tools to protect business operations

[Completed] Professional Google Cyberse... Core cybersecurity knowlege and skills

Previously, you were introduced to programming, operating systems, and tools commonly used by c...

Updated 2 years ago by naruzkurai

Introduction to Linux, SQL, and Python

[Completed] Professional Google Cyberse... Core cybersecurity knowlege and skills

As we discussed previously, organizations use a variety of tools, such as SIEMs, playbooks, and p...

Updated 2 years ago by naruzkurai

Tools for protecting business operations

[Completed] Professional Google Cyberse... Important Cybersecurity tools

Previously, you were introduced to several technical skills that security analysts need to develo...

Updated 2 years ago by naruzkurai

Common cybersecurity tools

[Completed] Professional Google Cyberse... Important Cybersecurity tools

As mentioned earlier, security is like preparing for a storm. If you identify a leak, the color o...

Updated 2 years ago by naruzkurai

Welcome to week 4

[Completed] Professional Google Cyberse... Important Cybersecurity tools

Welcome to the final section of this course! Here, we'll be introducing tools and programming lan...

Updated 2 years ago by naruzkurai

Glossary terms from week 3

[Completed] Professional Google Cyberse... Glossery for modules Foundations of Cyb...

Terms and definitions from Course 1, Week 3 Asset: An item perceived as having value to an organ...

Updated 2 years ago by naruzkurai

Holly: The importance of ethics as a cybersecurity professional

[Completed] Professional Google Cyberse... Ethics in Cybersecurity

Hi, I'm Holly and I'm a Cloud Security Architect with Google Cloud. At the beginning of my adult ...

Updated 2 years ago by naruzkurai

Wrap-up

[Completed] Professional Google Cyberse... Ethics in Cybersecurity

You are now better prepared to understand and help make decisions regarding assessing and managin...

Updated 2 years ago by naruzkurai

Ethical concepts that guide cybersecurity decisions

[Completed] Professional Google Cyberse... Ethics in Cybersecurity

Previously, you were introduced to the concept of security ethics. Security ethics are guidelin...

Updated 2 years ago by naruzkurai

Ethics in Cybersecurity

[Completed] Professional Google Cyberse... Ethics in Cybersecurity

In security, new technologies present new challenges. For every new security incident or risk, th...

Updated 2 years ago by naruzkurai

Glossary terms from week 2

[Completed] Professional Google Cyberse... Glossery for modules Foundations of Cyb...

Terms and definitions from Course 1, Week 2 Adversarial artificial intelligence (AI): A techniqu...

Updated 2 years ago by naruzkurai

Glossary terms from week 1

[Completed] Professional Google Cyberse... Glossery for modules Foundations of Cyb...

Terms and definitions from Course 1, Week 1 Cybersecurity (or security): The practice of ensur...

Updated 2 years ago by naruzkurai

Google Cybersecurity Certificate glossary

[Completed] Professional Google Cyberse... Glossery for modules Foundations of Cyb...

A Absolute file path: The full file path, which starts from the root Access controls: Securit...

Updated 2 years ago by naruzkurai

Heather: Protect sensitive data and information

[Completed] Professional Google Cyberse... Frameworks and controles

Hello, my name is Heather and I'm the Vice President of Security Engineering at Google. PII has b...

Updated 2 years ago by naruzkurai

Controls, frameworks, and compliance

[Completed] Professional Google Cyberse... Frameworks and controles

Previously, you were introduced to security frameworks and how they provide a structured approa...

Updated 2 years ago by naruzkurai

Introduction to security frameworks and controls

[Completed] Professional Google Cyberse... Frameworks and controles

Imagine you're working as a security analyst and receive multiple alerts about suspicious activit...

Updated 2 years ago by naruzkurai

Secure design

[Completed] Professional Google Cyberse... Frameworks and controles

Hi, welcome back! Previously, we discussed frameworks and controls in general. In this video, you...

Updated 2 years ago by naruzkurai

Wrap-up

[Completed] Professional Google Cyberse... The eight CISSP security domains

This concludes our brief introduction to some of the most influential security attacks throughout...

Updated 2 years ago by naruzkurai

Understand attackers

[Completed] Professional Google Cyberse... The eight CISSP security domains

Previously, you were introduced to the concept of threat actors. As a reminder, a threat actor is...

Updated 2 years ago by naruzkurai