Skip to main content

Recently Updated Pages

Explore: Stakeholder roles and responsibilities

[Completed] Professional Google Cyberse...

Risk manager The risk manager helps to identify risks and manage the response to cybersecuri...

Updated 9 months ago by naruzkurai

Wrap-up;Terms and definitions from Course 8, Module 3

[Completed] Professional Google Cyberse...

You've had an opportunity to learn about the important role stakeholders play and different ways ...

Updated 9 months ago by naruzkurai

Juliana’s story: Effective communication

[Completed] Professional Google Cyberse...

Throughout this course, you’ve been following the story of Juliana Soto. Juliana was recently hir...

Updated 9 months ago by naruzkurai

How to create a visual dashboard

[Completed] Professional Google Cyberse...

In this video, we're going to have a bit of fun! We'll create a visual security story. ...

Updated 9 months ago by naruzkurai

Create visual dashboards for impactful cybersecurity communications

[Completed] Professional Google Cyberse...

You previously learned about security stakeholders, the people responsible for protecting the dat...

Updated 9 months ago by naruzkurai

Visual storytelling in cybersecurity

[Completed] Professional Google Cyberse...

The ability to communicate threats, risks, vulnerabilities, or incidents and possible solutions i...

Updated 9 months ago by naruzkurai

Communicate effectively with stakeholders

[Completed] Professional Google Cyberse...

You previously learned about security stakeholders and their significance in an organization. In ...

Updated 9 months ago by naruzkurai

Building blocks of cybersecurity communications

[Completed] Professional Google Cyberse...

Previously, we discussed communicating information that is important to stakeholders.It's essenti...

Updated 9 months ago by naruzkurai

Clear and concise communication

[Completed] Professional Google Cyberse...

Welcome back!Previously, we discussed stakeholders and the important security roles they play wit...

Updated 9 months ago by naruzkurai

The purpose and impact of stakeholders

[Completed] Professional Google Cyberse...

You previously learned about incident escalation and the various security incident classification...

Updated 9 months ago by naruzkurai

Stakeholders in cybersecurity

[Completed] Professional Google Cyberse...

Let's discuss the hierarchy within an organization.It goes from you, the analyst, to management, ...

Updated 9 months ago by naruzkurai

Welcome to module 3

[Completed] Professional Google Cyberse...

We've covered so much in previous courses, from the foundations of security to a basic understand...

Updated 9 months ago by naruzkurai

Juliana's story: Attention to detail

[Completed] Professional Google Cyberse...

This is the second reading in the scenario about Juliana Soto, a cybersecurity analyst who was re...

Updated 9 months ago by naruzkurai

Escalation timing

[Completed] Professional Google Cyberse...

You previously learned about the potential impact even the smallest incident can have on an organ...

Updated 9 months ago by naruzkurai

When and how to escalate a security incident

[Completed] Professional Google Cyberse...

We've shared quite a bit about the importance of your role when it comes to escalating incidents....

Updated 9 months ago by naruzkurai

From simple activity to major data breach

[Completed] Professional Google Cyberse...

So far, we've discussed different incident types and the importance of escalating those incidents...

Updated 9 months ago by naruzkurai

Recognize roles and responsibilities during escalation

[Completed] Professional Google Cyberse...

You previously learned about various incident classification types and how those incidents can im...

Updated 9 months ago by naruzkurai

Prepare to escalate through security recognition

[Completed] Professional Google Cyberse...

Previously, we defined what it means to escalate an incident.We also discussed the skills needed ...

Updated 9 months ago by naruzkurai

Escalate with a purpose

[Completed] Professional Google Cyberse...

You previously learned about security incident escalation and the skills needed to help you escal...

Updated 9 months ago by naruzkurai

The importance of escalation

[Completed] Professional Google Cyberse...

Security analysts are hired to protect company assets and data, including knowing when and how to...

Updated 9 months ago by naruzkurai