Recently Updated Pages
Explore the CISSP security domains, Part 1
Welcome back! You might remember from course one that there are eight security domains, or catego...
Welcome to week 1
The world of security, which we also refer to as cybersecurity throughout this program, is vast. ...
Google Cybersecurity Certificate glossary
A Absolute file path: The full file path, which starts from the root Access controls: Securit...
Course 2 overview
Hello, and welcome to Play It Safe: Manage Security Risks, the se...
Play It Safe: Manage Security Risks Introduction to Cert 2
My name is Ashley, and I'm a Customer Engineering Enablement Lead for Security Operation Sales at...
Google Cybersecurity Certificate glossary
A Absolute file path: The full file path, which starts from the root Access controls: Securit...
Glossary terms from week 1
Terms and definitions from Course 1, Week 1 Cybersecurity (or security): The practice of ensur...
Glossary terms from week 2
Terms and definitions from Course 1, Week 2 Adversarial artificial intelligence (AI): A techniqu...
Ethics in Cybersecurity
In security, new technologies present new challenges. For every new security incident or risk, th...
Ethical concepts that guide cybersecurity decisions
Previously, you were introduced to the concept of security ethics. Security ethics are guidelin...
Wrap-up
You are now better prepared to understand and help make decisions regarding assessing and managin...
Holly: The importance of ethics as a cybersecurity professional
Hi, I'm Holly and I'm a Cloud Security Architect with Google Cloud. At the beginning of my adult ...
Glossary terms from week 3
Terms and definitions from Course 1, Week 3 Asset: An item perceived as having value to an organ...
Welcome to week 4
Welcome to the final section of this course! Here, we'll be introducing tools and programming lan...
Common cybersecurity tools
As mentioned earlier, security is like preparing for a storm. If you identify a leak, the color o...
Tools for protecting business operations
Previously, you were introduced to several technical skills that security analysts need to develo...
Introduction to Linux, SQL, and Python
As we discussed previously, organizations use a variety of tools, such as SIEMs, playbooks, and p...
Use tools to protect business operations
Previously, you were introduced to programming, operating systems, and tools commonly used by c...
Glossary terms from week 4
Terms and definitions from the certificate Terms and definitions from Course 1, Week 4 Antiviru...
Heather: Protect sensitive data and information
Hello, my name is Heather and I'm the Vice President of Security Engineering at Google. PII has b...