Skip to main content

Recently Updated Pages

Welcome to module 4 (38% complete)

[Completed] Professional Google Cyberse...

Welcome back!I'm Emily, and I've been working in security education at Google for nearly nine yea...

Updated 1 year ago by naruzkurai

uhhh websites to visit

Anything related to windows

# Define the URLs for the security news websites $csoUrl = "https://www.csoonline.com" $krebsUr...

Updated 1 year ago by naruzkurai

Strategies for engaging with the cybersecurity community

[Completed] Professional Google Cyberse...

You have learned a lot about the security field, from the origins of security and its importance ...

Updated 1 year ago by naruzkurai

Helpful cybersecurity resources

[Completed] Professional Google Cyberse...

As we approach the end of our program, it's important to start thinking about ways to engage with...

Updated 1 year ago by naruzkurai

Explore: Stakeholder roles and responsibilities

[Completed] Professional Google Cyberse...

Risk manager The risk manager helps to identify risks and manage the response to cybersecuri...

Updated 1 year ago by naruzkurai

Wrap-up;Terms and definitions from Course 8, Module 3

[Completed] Professional Google Cyberse...

You've had an opportunity to learn about the important role stakeholders play and different ways ...

Updated 1 year ago by naruzkurai

Juliana’s story: Effective communication

[Completed] Professional Google Cyberse...

Throughout this course, you’ve been following the story of Juliana Soto. Juliana was recently hir...

Updated 1 year ago by naruzkurai

How to create a visual dashboard

[Completed] Professional Google Cyberse...

In this video, we're going to have a bit of fun! We'll create a visual security story. ...

Updated 1 year ago by naruzkurai

Create visual dashboards for impactful cybersecurity communications

[Completed] Professional Google Cyberse...

You previously learned about security stakeholders, the people responsible for protecting the dat...

Updated 1 year ago by naruzkurai

Visual storytelling in cybersecurity

[Completed] Professional Google Cyberse...

The ability to communicate threats, risks, vulnerabilities, or incidents and possible solutions i...

Updated 1 year ago by naruzkurai

Communicate effectively with stakeholders

[Completed] Professional Google Cyberse...

You previously learned about security stakeholders and their significance in an organization. In ...

Updated 1 year ago by naruzkurai

Building blocks of cybersecurity communications

[Completed] Professional Google Cyberse...

Previously, we discussed communicating information that is important to stakeholders.It's essenti...

Updated 1 year ago by naruzkurai

Clear and concise communication

[Completed] Professional Google Cyberse...

Welcome back!Previously, we discussed stakeholders and the important security roles they play wit...

Updated 1 year ago by naruzkurai

The purpose and impact of stakeholders

[Completed] Professional Google Cyberse...

You previously learned about incident escalation and the various security incident classification...

Updated 1 year ago by naruzkurai

Stakeholders in cybersecurity

[Completed] Professional Google Cyberse...

Let's discuss the hierarchy within an organization.It goes from you, the analyst, to management, ...

Updated 1 year ago by naruzkurai

Welcome to module 3

[Completed] Professional Google Cyberse...

We've covered so much in previous courses, from the foundations of security to a basic understand...

Updated 1 year ago by naruzkurai

Juliana's story: Attention to detail

[Completed] Professional Google Cyberse...

This is the second reading in the scenario about Juliana Soto, a cybersecurity analyst who was re...

Updated 1 year ago by naruzkurai

Escalation timing

[Completed] Professional Google Cyberse...

You previously learned about the potential impact even the smallest incident can have on an organ...

Updated 1 year ago by naruzkurai

When and how to escalate a security incident

[Completed] Professional Google Cyberse...

We've shared quite a bit about the importance of your role when it comes to escalating incidents....

Updated 1 year ago by naruzkurai

From simple activity to major data breach

[Completed] Professional Google Cyberse...

So far, we've discussed different incident types and the importance of escalating those incidents...

Updated 1 year ago by naruzkurai