Recently Updated Pages
Introduction to the eight CISSP security domains, Part 2
Welcome back. In the last video, we introduced you to the first four security domains. In this vi...
Determine the type of attack
Previously, you learned about the eight Certified Information Systems Security Professional (CISS...
Understand attackers
Previously, you were introduced to the concept of threat actors. As a reminder, a threat actor is...
Wrap-up
This concludes our brief introduction to some of the most influential security attacks throughout...
Secure design
Hi, welcome back! Previously, we discussed frameworks and controls in general. In this video, you...
Introduction to security frameworks and controls
Imagine you're working as a security analyst and receive multiple alerts about suspicious activit...
Introduction to security frameworks and controls
Imagine you're working as a security analyst and receive multiple alerts about suspicious activit...
New Page
Restless nights grow Feeling my unclenched jaw snap close upon my tongue severing me from the ...
Sean: Keep your cool during a data breach
Hi, my name is Sean. I'm a Technical Program Manager in Google workspace. I am a 30 year security...
Common attacks and their effectiveness
Previously, you learned about past and present attacks that helped shape the cybersecurity indu...
Core skills for cybersecurity professionals
In this video, we'll discuss both transferable and technical skills that are particularly useful ...
Veronica: My path to working in cybersecurity
Hi, I'm Veronica and I'm a security engineer at Google. My journey into cybersecurity has changed...
Transferable and technical cybersecurity skills
Previously, you learned that cybersecurity analysts need to develop certain core skills to be suc...
The importance of cybersecurity
As we've discussed, security professionals protect many physical and digital assets. These skills...
Wrap-up
Congratulations on completing the first section of this course! Let's quickly review what we've c...
welcome to week 2
Welcome back! When it comes to security, there is so much to learn, and I'm thrilled to be part o...
Past cybersecurity attacks
The security industry is constantly evolving, but many present-day attacks are not entirely new. ...
Attacks in the digital age
With the expansion of reliable high-speed internet, the number of computers connected to the inte...
Common cybersecurity terminology
As you’ve learned, cybersecurity (also known as security) is the practice of ensuring confident...
Nikki: A day in the life of a security engineer
My name is Nikki and I'm a security engineer at Google. I am part of the insider threat detection...