Skip to main content

Recently Updated Pages

Determine the type of attack

[Completed] Professional Google Cyberse... The eight CISSP security domains

Previously, you learned about the eight Certified Information Systems Security Professional (CISS...

Updated 2 years ago by naruzkurai

Introduction to the eight CISSP security domains, Part 2

[Completed] Professional Google Cyberse... The eight CISSP security domains

Welcome back. In the last video, we introduced you to the first four security domains. In this vi...

Updated 2 years ago by naruzkurai

Introduction to the eight CISSP security domains, Part 1

[Completed] Professional Google Cyberse... The eight CISSP security domains

As the tactics of threat actors evolve, so do the roles of security professionals. Having a solid...

Updated 2 years ago by naruzkurai

Introduction to security frameworks and controls

[Completed] Professional Google Cyberse... The History if cybersecurity

Imagine you're working as a security analyst and receive multiple alerts about suspicious activit...

Updated 2 years ago by naruzkurai

New Page

Mr. Deli's work Fight

Restless nights grow Feeling my unclenched jaw snap close upon my tongue severing me from the ...

Updated 2 years ago by delli

Sean: Keep your cool during a data breach

[Completed] Professional Google Cyberse... The History if cybersecurity

Hi, my name is Sean. I'm a Technical Program Manager in Google workspace. I am a 30 year security...

Updated 2 years ago by naruzkurai

Common attacks and their effectiveness

[Completed] Professional Google Cyberse... The History if cybersecurity

Previously, you learned about past and present attacks that helped shape the cybersecurity indu...

Updated 2 years ago by naruzkurai

Attacks in the digital age

[Completed] Professional Google Cyberse... The History if cybersecurity

With the expansion of reliable high-speed internet, the number of computers connected to the inte...

Updated 2 years ago by naruzkurai

Past cybersecurity attacks

[Completed] Professional Google Cyberse... The History if cybersecurity

The security industry is constantly evolving, but many present-day attacks are not entirely new. ...

Updated 2 years ago by naruzkurai

welcome to week 2

[Completed] Professional Google Cyberse... The History if cybersecurity

Welcome back! When it comes to security, there is so much to learn, and I'm thrilled to be part o...

Updated 2 years ago by naruzkurai

Wrap-up

[Completed] Professional Google Cyberse... Core Skills for cyber security Professi...

Congratulations on completing the first section of this course! Let's quickly review what we've c...

Updated 2 years ago by naruzkurai

The importance of cybersecurity

[Completed] Professional Google Cyberse... Core Skills for cyber security Professi...

As we've discussed, security professionals protect many physical and digital assets. These skills...

Updated 2 years ago by naruzkurai

Transferable and technical cybersecurity skills

[Completed] Professional Google Cyberse... Core Skills for cyber security Professi...

Previously, you learned that cybersecurity analysts need to develop certain core skills to be suc...

Updated 2 years ago by naruzkurai

Veronica: My path to working in cybersecurity

[Completed] Professional Google Cyberse... Core Skills for cyber security Professi...

Hi, I'm Veronica and I'm a security engineer at Google. My journey into cybersecurity has changed...

Updated 2 years ago by naruzkurai

Core skills for cybersecurity professionals

[Completed] Professional Google Cyberse... Core Skills for cyber security Professi...

In this video, we'll discuss both transferable and technical skills that are particularly useful ...

Updated 2 years ago by naruzkurai

Common cybersecurity terminology

[Completed] Professional Google Cyberse... Introduction to Cybersecurity

As you’ve learned, cybersecurity (also known as security) is the practice of ensuring confident...

Updated 2 years ago by naruzkurai

Nikki: A day in the life of a security engineer

[Completed] Professional Google Cyberse... Introduction to Cybersecurity

My name is Nikki and I'm a security engineer at Google. I am part of the insider threat detection...

Updated 2 years ago by naruzkurai

Responsibilities of an entry-level cybersecurity analyst

[Completed] Professional Google Cyberse... Introduction to Cybersecurity

Technology is rapidly changing and so are the tactics and techniques that attackers use. As digit...

Updated 2 years ago by naruzkurai

Toni: My path to cybersecurity

[Completed] Professional Google Cyberse... Introduction to Cybersecurity

Hi, I'm Toni, I'm a Security Engineering Manager. Our teams protect Google and its users from ser...

Updated 2 years ago by naruzkurai

Introduction to cybersecurity

[Completed] Professional Google Cyberse... Introduction to Cybersecurity

Imagine that you're preparing for a storm.  You've received notification that a storm is c...

Updated 2 years ago by naruzkurai