Recently Updated Pages
Glossary terms from week 2
Terms and definitions from Course 1, Week 2 Adversarial artificial intelligence (AI): A techniqu...
Glossary terms from week 1
Terms and definitions from Course 1, Week 1 Cybersecurity (or security): The practice of ensur...
Google Cybersecurity Certificate glossary
A Absolute file path: The full file path, which starts from the root Access controls: Securit...
Heather: Protect sensitive data and information
Hello, my name is Heather and I'm the Vice President of Security Engineering at Google. PII has b...
Controls, frameworks, and compliance
Previously, you were introduced to security frameworks and how they provide a structured approa...
Introduction to security frameworks and controls
Imagine you're working as a security analyst and receive multiple alerts about suspicious activit...
Secure design
Hi, welcome back! Previously, we discussed frameworks and controls in general. In this video, you...
Wrap-up
This concludes our brief introduction to some of the most influential security attacks throughout...
Understand attackers
Previously, you were introduced to the concept of threat actors. As a reminder, a threat actor is...
Determine the type of attack
Previously, you learned about the eight Certified Information Systems Security Professional (CISS...
Introduction to the eight CISSP security domains, Part 2
Welcome back. In the last video, we introduced you to the first four security domains. In this vi...
Introduction to the eight CISSP security domains, Part 1
As the tactics of threat actors evolve, so do the roles of security professionals. Having a solid...
Introduction to security frameworks and controls
Imagine you're working as a security analyst and receive multiple alerts about suspicious activit...
New Page
Restless nights grow Feeling my unclenched jaw snap close upon my tongue severing me from the ...
Sean: Keep your cool during a data breach
Hi, my name is Sean. I'm a Technical Program Manager in Google workspace. I am a 30 year security...
Common attacks and their effectiveness
Previously, you learned about past and present attacks that helped shape the cybersecurity indu...
Attacks in the digital age
With the expansion of reliable high-speed internet, the number of computers connected to the inte...
Past cybersecurity attacks
The security industry is constantly evolving, but many present-day attacks are not entirely new. ...
welcome to week 2
Welcome back! When it comes to security, there is so much to learn, and I'm thrilled to be part o...
Wrap-up
Congratulations on completing the first section of this course! Let's quickly review what we've c...