Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

949 total results found

Glossary terms from week 2

[Completed] Professional Google Cyberse... Glossery for modules Foundations of Cyb...

Terms and definitions from Course 1, Week 2 Adversarial artificial intelligence (AI): A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently  Business Email Compromise (BEC): A type ...

Introduction to security frameworks and controls

[Completed] Professional Google Cyberse... The History if cybersecurity

Imagine you're working as a security analyst and receive multiple alerts about suspicious activity on the network. You realize that you'll need to implement additional security measures to keep these alerts from becoming serious incidents. But where do you sta...

Secure design

[Completed] Professional Google Cyberse... Frameworks and controles

Hi, welcome back! Previously, we discussed frameworks and controls in general. In this video, you'll learn about specific frameworks and controls that organizations can voluntarily use to minimize risks to their data and to protect users. Let's get started!The...

Introduction to security frameworks and controls

[Completed] Professional Google Cyberse... Frameworks and controles

Imagine you're working as a security analyst and receive multiple alerts about suspicious activity on the network. You realize that you'll need to implement additional security measures to keep these alerts from becoming serious incidents. But where do you sta...

Controls, frameworks, and compliance

[Completed] Professional Google Cyberse... Frameworks and controles

Previously, you were introduced to security frameworks and how they provide a structured approach to implementing a security lifecycle. As a reminder, a security lifecycle is a constantly evolving set of policies and standards. In this reading, you will lear...

Heather: Protect sensitive data and information

[Completed] Professional Google Cyberse... Frameworks and controles

Hello, my name is Heather and I'm the Vice President of Security Engineering at Google. PII has been an important topic on the internet since the beginning of the internet. And we have been talking about increasingly sophisticated ways to protect that data ove...

Ethics in Cybersecurity

[Completed] Professional Google Cyberse... Ethics in Cybersecurity

In security, new technologies present new challenges. For every new security incident or risk, the right or wrong decision isn't always clear.For example, imagine that you're working as an entry-level security analyst and you have received a high risk alert. Y...

Ethical concepts that guide cybersecurity decisions

[Completed] Professional Google Cyberse... Ethics in Cybersecurity

Previously, you were introduced to the concept of security ethics. Security ethics are guidelines for making appropriate decisions as a security professional. Being ethical requires that security professionals remain unbiased and maintain the security and co...

Wrap-up

[Completed] Professional Google Cyberse... Ethics in Cybersecurity

You are now better prepared to understand and help make decisions regarding assessing and managing risks. Let's review what we've covered.We discussed security frameworks and controls and how they're used to develop processes and procedures that protect organi...

Holly: The importance of ethics as a cybersecurity professional

[Completed] Professional Google Cyberse... Ethics in Cybersecurity

Hi, I'm Holly and I'm a Cloud Security Architect with Google Cloud. At the beginning of my adult career, I sold hosiery while I was going to school. That led me into an opportunity to work in banking, which then led me into an opportunity to work in telecommun...

Glossary terms from week 3

[Completed] Professional Google Cyberse... Glossery for modules Foundations of Cyb...

Terms and definitions from Course 1, Week 3 Asset: An item perceived as having value to an organization  Availability: The idea that data is accessible to those who are authorized to access it Compliance: The process of adhering to internal standards and ex...

Welcome to week 4

[Completed] Professional Google Cyberse... Important Cybersecurity tools

Welcome to the final section of this course! Here, we'll be introducing tools and programming languages that are commonly used in the security field. They are essential for monitoring security in an organization because they enhance efficiency by automating ta...

Common cybersecurity tools

[Completed] Professional Google Cyberse... Important Cybersecurity tools

As mentioned earlier, security is like preparing for a storm. If you identify a leak, the color or shape of the bucket you use to catch the water doesn't matter. What is important is mitigating the risks and threats to your home, by using the tools available t...

Tools for protecting business operations

[Completed] Professional Google Cyberse... Important Cybersecurity tools

Previously, you were introduced to several technical skills that security analysts need to develop. You were also introduced to some tools entry-level security analysts may have in their toolkit. In this reading, you’ll learn more about how technical skills an...

Introduction to Linux, SQL, and Python

[Completed] Professional Google Cyberse... Core cybersecurity knowlege and skills

As we discussed previously, organizations use a variety of tools, such as SIEMs, playbooks, and packet sniffers to better manage, monitor, and analyze security threats. But those aren't the only tools in an analyst's toolkit. Analysts also use programming lang...

Use tools to protect business operations

[Completed] Professional Google Cyberse... Core cybersecurity knowlege and skills

Previously, you were introduced to programming, operating systems, and tools commonly used by cybersecurity professionals. In this reading, you’ll learn more about programming and operating systems, as well as other tools that entry-level analysts use to hel...

Glossary terms from week 4

[Completed] Professional Google Cyberse... Core cybersecurity knowlege and skills

Terms and definitions from the certificate Terms and definitions from Course 1, Week 4 Antivirus software: A software program used to prevent, detect, and eliminate malware and viruses Database: An organized collection of information or data Data point: A ...

Terms and definitions from Course 1

[Completed] Professional Google Cyberse... Glossery for modules Foundations of Cyb...

A Adversarial artificial intelligence (AI): A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently Antivirus software: A software program used to prevent, detect, and eliminate mal...

Play It Safe: Manage Security Risks Introduction to Cert 2

[Completed] Professional Google Cyberse... Start

My name is Ashley, and I'm a Customer Engineering Enablement Lead for Security Operation Sales at Google. I'm excited to be your instructor for this course.Let's start by quickly reviewing what we've covered so far. Earlier, we defined security and explored so...

Course 2 overview

[Completed] Professional Google Cyberse... Start

Hello, and welcome to Play It Safe: Manage Security Risks, the second course in the Google Cybersecurity Certificate. You’re on an exciting journey! By the end of this course, you will develop a greater understanding of the eig...