Recently Updated Pages
Connect with other cybersecurity professionals
You’ve learned the importance of staying engaged with the cybersecurity community after completin...
Engage with the cybersecurity community in a meaningful way
Earlier we discussed the importance of staying up-to-date on security trends and news.In this vid...
Victoria: Continue your learning journey
I'm Victoria, I'm a security engineer at Google.When I first applied for a cybersecurity job, I f...
Welcome to module 4 (38% complete)
Welcome back!I'm Emily, and I've been working in security education at Google for nearly nine yea...
uhhh websites to visit
# Define the URLs for the security news websites $csoUrl = "https://www.csoonline.com" $krebsUr...
Strategies for engaging with the cybersecurity community
You have learned a lot about the security field, from the origins of security and its importance ...
Helpful cybersecurity resources
As we approach the end of our program, it's important to start thinking about ways to engage with...
Explore: Stakeholder roles and responsibilities
Risk manager The risk manager helps to identify risks and manage the response to cybersecuri...
Wrap-up;Terms and definitions from Course 8, Module 3
You've had an opportunity to learn about the important role stakeholders play and different ways ...
Juliana’s story: Effective communication
Throughout this course, you’ve been following the story of Juliana Soto. Juliana was recently hir...
How to create a visual dashboard
In this video, we're going to have a bit of fun! We'll create a visual security story. ...
Create visual dashboards for impactful cybersecurity communications
You previously learned about security stakeholders, the people responsible for protecting the dat...
Visual storytelling in cybersecurity
The ability to communicate threats, risks, vulnerabilities, or incidents and possible solutions i...
Communicate effectively with stakeholders
You previously learned about security stakeholders and their significance in an organization. In ...
Building blocks of cybersecurity communications
Previously, we discussed communicating information that is important to stakeholders.It's essenti...
Clear and concise communication
Welcome back!Previously, we discussed stakeholders and the important security roles they play wit...
The purpose and impact of stakeholders
You previously learned about incident escalation and the various security incident classification...
Stakeholders in cybersecurity
Let's discuss the hierarchy within an organization.It goes from you, the analyst, to management, ...
Welcome to module 3
We've covered so much in previous courses, from the foundations of security to a basic understand...
Juliana's story: Attention to detail
This is the second reading in the scenario about Juliana Soto, a cybersecurity analyst who was re...