Skip to main content

Recently Updated Pages

Holly: The importance of ethics as a cybersecurity professional

[Completed] Professional Google Cyberse... Ethics in Cybersecurity

Hi, I'm Holly and I'm a Cloud Security Architect with Google Cloud. At the beginning of my adult ...

Updated 1 year ago by naruzkurai

Wrap-up

[Completed] Professional Google Cyberse... Ethics in Cybersecurity

You are now better prepared to understand and help make decisions regarding assessing and managin...

Updated 1 year ago by naruzkurai

Ethical concepts that guide cybersecurity decisions

[Completed] Professional Google Cyberse... Ethics in Cybersecurity

Previously, you were introduced to the concept of security ethics. Security ethics are guidelin...

Updated 1 year ago by naruzkurai

Ethics in Cybersecurity

[Completed] Professional Google Cyberse... Ethics in Cybersecurity

In security, new technologies present new challenges. For every new security incident or risk, th...

Updated 1 year ago by naruzkurai

Glossary terms from week 2

[Completed] Professional Google Cyberse... Glossery for modules Foundations of Cyb...

Terms and definitions from Course 1, Week 2 Adversarial artificial intelligence (AI): A techniqu...

Updated 1 year ago by naruzkurai

Glossary terms from week 1

[Completed] Professional Google Cyberse... Glossery for modules Foundations of Cyb...

Terms and definitions from Course 1, Week 1 Cybersecurity (or security): The practice of ensur...

Updated 1 year ago by naruzkurai

Google Cybersecurity Certificate glossary

[Completed] Professional Google Cyberse... Glossery for modules Foundations of Cyb...

A Absolute file path: The full file path, which starts from the root Access controls: Securit...

Updated 1 year ago by naruzkurai

Heather: Protect sensitive data and information

[Completed] Professional Google Cyberse... Frameworks and controles

Hello, my name is Heather and I'm the Vice President of Security Engineering at Google. PII has b...

Updated 1 year ago by naruzkurai

Controls, frameworks, and compliance

[Completed] Professional Google Cyberse... Frameworks and controles

Previously, you were introduced to security frameworks and how they provide a structured approa...

Updated 1 year ago by naruzkurai

Introduction to security frameworks and controls

[Completed] Professional Google Cyberse... Frameworks and controles

Imagine you're working as a security analyst and receive multiple alerts about suspicious activit...

Updated 1 year ago by naruzkurai

Secure design

[Completed] Professional Google Cyberse... Frameworks and controles

Hi, welcome back! Previously, we discussed frameworks and controls in general. In this video, you...

Updated 1 year ago by naruzkurai

Wrap-up

[Completed] Professional Google Cyberse... The eight CISSP security domains

This concludes our brief introduction to some of the most influential security attacks throughout...

Updated 1 year ago by naruzkurai

Understand attackers

[Completed] Professional Google Cyberse... The eight CISSP security domains

Previously, you were introduced to the concept of threat actors. As a reminder, a threat actor is...

Updated 1 year ago by naruzkurai

Determine the type of attack

[Completed] Professional Google Cyberse... The eight CISSP security domains

Previously, you learned about the eight Certified Information Systems Security Professional (CISS...

Updated 1 year ago by naruzkurai

Introduction to the eight CISSP security domains, Part 2

[Completed] Professional Google Cyberse... The eight CISSP security domains

Welcome back. In the last video, we introduced you to the first four security domains. In this vi...

Updated 1 year ago by naruzkurai

Introduction to the eight CISSP security domains, Part 1

[Completed] Professional Google Cyberse... The eight CISSP security domains

As the tactics of threat actors evolve, so do the roles of security professionals. Having a solid...

Updated 1 year ago by naruzkurai

Introduction to security frameworks and controls

[Completed] Professional Google Cyberse... The History if cybersecurity

Imagine you're working as a security analyst and receive multiple alerts about suspicious activit...

Updated 1 year ago by naruzkurai

New Page

Mr. Deli's work Fight

Restless nights grow Feeling my unclenched jaw snap close upon my tongue severing me from the ...

Updated 1 year ago by delli

Sean: Keep your cool during a data breach

[Completed] Professional Google Cyberse... The History if cybersecurity

Hi, my name is Sean. I'm a Technical Program Manager in Google workspace. I am a 30 year security...

Updated 1 year ago by naruzkurai

Common attacks and their effectiveness

[Completed] Professional Google Cyberse... The History if cybersecurity

Previously, you learned about past and present attacks that helped shape the cybersecurity indu...

Updated 1 year ago by naruzkurai