Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

847 total results found

Google Cybersecurity Certificate overview

[Completed] Professional Google Cyberse... Get Started with go certificate program

Why are skills in cybersecurity in such high demand? The world is undergoing a digital transformation. Every day, global access to the internet is expanding, introducing more devices, more applications, and an even larger amount of data to the World Wide Web. ...

Course 1 overview

[Completed] Professional Google Cyberse... Get Started with go certificate program

Cybersecurity Certificate. You’ve begun an exciting journey! In this course, you will learn the primary job responsibilities and core skills of those who work in the field of cybersecurity. You will explore the eight Certified Information Systems Se...

Welcome to week 1

[Completed] Professional Google Cyberse... Get Started with go certificate program

Hi again! Now that you have  some idea of what to expect from the program as a whole,  let's discuss more about  what you'll learn in this course. Play video starting at ::11 and follow transcript0:11 This course will introduce...

Helpful resources and tips

[Completed] Professional Google Cyberse... Get Started with go certificate program

(They made me type my name and some reason to commit, par the usual, I am your god, and i suffer for you, i am your lord and saviour NaruZKurai)As a learner, you can choose to complete one or multiple courses in this program. However, to obtain the Google Cybe...

Google Cybersecurity Certificate glossary

[Completed] Professional Google Cyberse... Glossery for modules Foundations of Cyb...

A Absolute file path: The full file path, which starts from the root Access controls: Security controls that manage access, authorization, and accountability of information Active packet sniffing: A type of attack where data packets are manipulated in tra...

Introduction to cybersecurity

[Completed] Professional Google Cyberse... Introduction to Cybersecurity

Imagine that you're preparing for a storm.  You've received notification that a storm is coming.  You prepare by gathering  the tools and materials you'll need to stay safe.  You make sure your windows and doors are secure.  You assemble a first aid...

Toni: My path to cybersecurity

[Completed] Professional Google Cyberse... Introduction to Cybersecurity

Hi, I'm Toni, I'm a Security Engineering Manager. Our teams protect Google and its users from serious threats. Usually government-backed attackers, coordinated influence operations and serious cybercrime threat actors. I grew up as an army brat. My dad was in ...

Responsibilities of an entry-level cybersecurity analyst

[Completed] Professional Google Cyberse... Introduction to Cybersecurity

Technology is rapidly changing and so are the tactics and techniques that attackers use. As digital infrastructure evolves, security professionals are expected to continually grow their skills in order to protect and secure sensitive information. In this video...

Nikki: A day in the life of a security engineer

[Completed] Professional Google Cyberse... Introduction to Cybersecurity

My name is Nikki and I'm a security engineer at Google. I am part of the insider threat detection team at Google, so my role is more focused on catching insider threats or insider suspicious activity within the company. My first experience with cybersecurity w...

Common cybersecurity terminology

[Completed] Professional Google Cyberse... Introduction to Cybersecurity

As you’ve learned, cybersecurity (also known as security) is the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation. In this rea...

Core skills for cybersecurity professionals

[Completed] Professional Google Cyberse... Core Skills for cyber security Professi...

In this video, we'll discuss both transferable and technical skills that are particularly useful for a security analyst.Transferable skills are skills from other areas that can apply to different careers.Technical skills may apply to several professions as wel...

Veronica: My path to working in cybersecurity

[Completed] Professional Google Cyberse... Core Skills for cyber security Professi...

Hi, I'm Veronica and I'm a security engineer at Google. My journey into cybersecurity has changed my life for the better in so many ways. The most important part is fulfilling work. I get to do something that I absolutely love and that I'm super interested in,...

Transferable and technical cybersecurity skills

[Completed] Professional Google Cyberse... Core Skills for cyber security Professi...

Previously, you learned that cybersecurity analysts need to develop certain core skills to be successful at work. Transferable skills are skills from other areas of study or practice that can apply to different careers. Technical skills may apply to several pr...

The importance of cybersecurity

[Completed] Professional Google Cyberse... Core Skills for cyber security Professi...

As we've discussed, security professionals protect many physical and digital assets. These skills are desired by organizations and government entities because risk needs to be managed. Let's continue to discuss why security matters.Play video starting at ::17 ...

Wrap-up

[Completed] Professional Google Cyberse... Core Skills for cyber security Professi...

Congratulations on completing the first section of this course! Let's quickly review what we've covered so far, before moving on.We defined security and introduced the benefits of implementing security in an organization. Then, we discussed different job respo...

Glossary terms from week 1

[Completed] Professional Google Cyberse... Glossery for modules Foundations of Cyb...

Terms and definitions from Course 1, Week 1 Cybersecurity (or security): The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation...

welcome to week 2

[Completed] Professional Google Cyberse... The History if cybersecurity

Welcome back! When it comes to security, there is so much to learn, and I'm thrilled to be part of your career journey.This is such an exciting time to be learning about security! When I learned about international hacks that impacted both private companies an...

Past cybersecurity attacks

[Completed] Professional Google Cyberse... The History if cybersecurity

The security industry is constantly evolving, but many present-day attacks are not entirely new. Attackers often alter or enhance previous methods. Understanding past attacks can provide direction for how to handle or investigate incidents in your job as a sec...