Recently Updated Pages
Determine the type of attack
Previously, you learned about the eight Certified Information Systems Security Professional (CISS...
Introduction to the eight CISSP security domains, Part 2
Welcome back. In the last video, we introduced you to the first four security domains. In this vi...
Introduction to the eight CISSP security domains, Part 1
As the tactics of threat actors evolve, so do the roles of security professionals. Having a solid...
Introduction to security frameworks and controls
Imagine you're working as a security analyst and receive multiple alerts about suspicious activit...
New Page
Restless nights grow Feeling my unclenched jaw snap close upon my tongue severing me from the ...
Sean: Keep your cool during a data breach
Hi, my name is Sean. I'm a Technical Program Manager in Google workspace. I am a 30 year security...
Common attacks and their effectiveness
Previously, you learned about past and present attacks that helped shape the cybersecurity indu...
Attacks in the digital age
With the expansion of reliable high-speed internet, the number of computers connected to the inte...
Past cybersecurity attacks
The security industry is constantly evolving, but many present-day attacks are not entirely new. ...
welcome to week 2
Welcome back! When it comes to security, there is so much to learn, and I'm thrilled to be part o...
Wrap-up
Congratulations on completing the first section of this course! Let's quickly review what we've c...
The importance of cybersecurity
As we've discussed, security professionals protect many physical and digital assets. These skills...
Transferable and technical cybersecurity skills
Previously, you learned that cybersecurity analysts need to develop certain core skills to be suc...
Veronica: My path to working in cybersecurity
Hi, I'm Veronica and I'm a security engineer at Google. My journey into cybersecurity has changed...
Core skills for cybersecurity professionals
In this video, we'll discuss both transferable and technical skills that are particularly useful ...
Common cybersecurity terminology
As you’ve learned, cybersecurity (also known as security) is the practice of ensuring confident...
Nikki: A day in the life of a security engineer
My name is Nikki and I'm a security engineer at Google. I am part of the insider threat detection...
Responsibilities of an entry-level cybersecurity analyst
Technology is rapidly changing and so are the tactics and techniques that attackers use. As digit...
Toni: My path to cybersecurity
Hi, I'm Toni, I'm a Security Engineering Manager. Our teams protect Google and its users from ser...
Introduction to cybersecurity
Imagine that you're preparing for a storm. You've received notification that a storm is c...