Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

812 total results found

Core skills for cybersecurity professionals

[Completed] Professional Google Cyberse... Core Skills for cyber security Professi...

In this video, we'll discuss both transferable and technical skills that are particularly useful for a security analyst.Transferable skills are skills from other areas that can apply to different careers.Technical skills may apply to several professions as wel...

Veronica: My path to working in cybersecurity

[Completed] Professional Google Cyberse... Core Skills for cyber security Professi...

Hi, I'm Veronica and I'm a security engineer at Google. My journey into cybersecurity has changed my life for the better in so many ways. The most important part is fulfilling work. I get to do something that I absolutely love and that I'm super interested in,...

Transferable and technical cybersecurity skills

[Completed] Professional Google Cyberse... Core Skills for cyber security Professi...

Previously, you learned that cybersecurity analysts need to develop certain core skills to be successful at work. Transferable skills are skills from other areas of study or practice that can apply to different careers. Technical skills may apply to several pr...

The importance of cybersecurity

[Completed] Professional Google Cyberse... Core Skills for cyber security Professi...

As we've discussed, security professionals protect many physical and digital assets. These skills are desired by organizations and government entities because risk needs to be managed. Let's continue to discuss why security matters.Play video starting at ::17 ...

Wrap-up

[Completed] Professional Google Cyberse... Core Skills for cyber security Professi...

Congratulations on completing the first section of this course! Let's quickly review what we've covered so far, before moving on.We defined security and introduced the benefits of implementing security in an organization. Then, we discussed different job respo...

Glossary terms from week 1

[Completed] Professional Google Cyberse... Glossery for modules Foundations of Cyb...

Terms and definitions from Course 1, Week 1 Cybersecurity (or security): The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation...

welcome to week 2

[Completed] Professional Google Cyberse... The History if cybersecurity

Welcome back! When it comes to security, there is so much to learn, and I'm thrilled to be part of your career journey.This is such an exciting time to be learning about security! When I learned about international hacks that impacted both private companies an...

Past cybersecurity attacks

[Completed] Professional Google Cyberse... The History if cybersecurity

The security industry is constantly evolving, but many present-day attacks are not entirely new. Attackers often alter or enhance previous methods. Understanding past attacks can provide direction for how to handle or investigate incidents in your job as a sec...

Common attacks and their effectiveness

[Completed] Professional Google Cyberse... The History if cybersecurity

Previously, you learned about past and present attacks that helped shape the cybersecurity industry. These included the LoveLetter attack, also called the ILOVEYOU virus, and the Morris worm. One outcome was the establishment of response teams, which are now...

Attacks in the digital age

[Completed] Professional Google Cyberse... The History if cybersecurity

With the expansion of reliable high-speed internet, the number of computers connected to the internet increased dramatically. Because malware could spread through the internet, threat actors no longer needed to use physical disks to spread viruses.To better un...

Sean: Keep your cool during a data breach

[Completed] Professional Google Cyberse... The History if cybersecurity

Hi, my name is Sean. I'm a Technical Program Manager in Google workspace. I am a 30 year security veteran within the security space across six different industries. During your first data breach, the most important thing that you can do is keep your cool. Ever...

Introduction to the eight CISSP security domains, Part 1

[Completed] Professional Google Cyberse... The eight CISSP security domains

As the tactics of threat actors evolve, so do the roles of security professionals. Having a solid understanding of core security concepts will support your growth in this field. One way to better understand these core concepts is by organizing them into catego...

Introduction to the eight CISSP security domains, Part 2

[Completed] Professional Google Cyberse... The eight CISSP security domains

Welcome back. In the last video, we introduced you to the first four security domains. In this video, we'll introduce you to the next four security domains: identity and access management, security assessment and testing, security operations, and software deve...

Determine the type of attack

[Completed] Professional Google Cyberse... The eight CISSP security domains

Previously, you learned about the eight Certified Information Systems Security Professional (CISSP) security domains. The domains can help you better understand how a security analyst's job duties can be organized into categories. Additionally, the domains can...

Understand attackers

[Completed] Professional Google Cyberse... The eight CISSP security domains

Previously, you were introduced to the concept of threat actors. As a reminder, a threat actor is any person or group who presents a security risk. In this reading, you’ll learn about different types of threat actors. You will also learn about their motivation...

Wrap-up

[Completed] Professional Google Cyberse... The eight CISSP security domains

This concludes our brief introduction to some of the most influential security attacks throughout history and CISSP's eight security domains. Let's review what we've discussed.First, we covered viruses, including the Brain virus and the Morris worm, and discus...

Glossary terms from week 2

[Completed] Professional Google Cyberse... Glossery for modules Foundations of Cyb...

Terms and definitions from Course 1, Week 2 Adversarial artificial intelligence (AI): A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently  Business Email Compromise (BEC): A type ...

Introduction to security frameworks and controls

[Completed] Professional Google Cyberse... The History if cybersecurity

Imagine you're working as a security analyst and receive multiple alerts about suspicious activity on the network. You realize that you'll need to implement additional security measures to keep these alerts from becoming serious incidents. But where do you sta...

Secure design

[Completed] Professional Google Cyberse... Frameworks and controles

Hi, welcome back! Previously, we discussed frameworks and controls in general. In this video, you'll learn about specific frameworks and controls that organizations can voluntarily use to minimize risks to their data and to protect users. Let's get started!The...

Introduction to security frameworks and controls

[Completed] Professional Google Cyberse... Frameworks and controles

Imagine you're working as a security analyst and receive multiple alerts about suspicious activity on the network. You realize that you'll need to implement additional security measures to keep these alerts from becoming serious incidents. But where do you sta...