Recently Updated Pages
Secure design
Hi, welcome back! Previously, we discussed frameworks and controls in general. In this video, you...
Wrap-up
This concludes our brief introduction to some of the most influential security attacks throughout...
Understand attackers
Previously, you were introduced to the concept of threat actors. As a reminder, a threat actor is...
Determine the type of attack
Previously, you learned about the eight Certified Information Systems Security Professional (CISS...
Introduction to the eight CISSP security domains, Part 2
Welcome back. In the last video, we introduced you to the first four security domains. In this vi...
Introduction to the eight CISSP security domains, Part 1
As the tactics of threat actors evolve, so do the roles of security professionals. Having a solid...
Introduction to security frameworks and controls
Imagine you're working as a security analyst and receive multiple alerts about suspicious activit...
New Page
Restless nights grow Feeling my unclenched jaw snap close upon my tongue severing me from the ...
Sean: Keep your cool during a data breach
Hi, my name is Sean. I'm a Technical Program Manager in Google workspace. I am a 30 year security...
Common attacks and their effectiveness
Previously, you learned about past and present attacks that helped shape the cybersecurity indu...
Attacks in the digital age
With the expansion of reliable high-speed internet, the number of computers connected to the inte...
Past cybersecurity attacks
The security industry is constantly evolving, but many present-day attacks are not entirely new. ...
welcome to week 2
Welcome back! When it comes to security, there is so much to learn, and I'm thrilled to be part o...
Wrap-up
Congratulations on completing the first section of this course! Let's quickly review what we've c...
The importance of cybersecurity
As we've discussed, security professionals protect many physical and digital assets. These skills...
Transferable and technical cybersecurity skills
Previously, you learned that cybersecurity analysts need to develop certain core skills to be suc...
Veronica: My path to working in cybersecurity
Hi, I'm Veronica and I'm a security engineer at Google. My journey into cybersecurity has changed...
Core skills for cybersecurity professionals
In this video, we'll discuss both transferable and technical skills that are particularly useful ...
Common cybersecurity terminology
As you’ve learned, cybersecurity (also known as security) is the practice of ensuring confident...
Nikki: A day in the life of a security engineer
My name is Nikki and I'm a security engineer at Google. I am part of the insider threat detection...