Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

948 total results found

Google Cybersecurity Certificate glossary

[Completed] Professional Google Cyberse... Start

A Absolute file path: The full file path, which starts from the root Access controls: Security controls that manage access, authorization, and accountability of information Active packet sniffing: A type of attack where data packets are manipulated in tra...

Welcome to week 1

[Completed] Professional Google Cyberse... Start

The world of security, which we also refer to as cybersecurity throughout this program, is vast. So making sure that you have the knowledge, skills, and tools to successfully navigate this world is why we're here.In the following videos, you'll learn about the...

Explore the CISSP security domains, Part 1

[Completed] Professional Google Cyberse... Explore the CISSP security domains

Welcome back! You might remember from course one that there are eight security domains, or categories, identified by CISSP. Security teams use them to organize daily tasks and identify gaps in security that could cause negative consequences for an organization...

Explore the CISSP security domains, Part 2

[Completed] Professional Google Cyberse... Explore the CISSP security domains

In this video, we'll cover the last four domains: identity and access management, security assessment and testing, security operations, and software development security.The fifth domain is identity and access management, or IAM. And it's focused on access and...

Security domains cybersecurity analysts need to know

[Completed] Professional Google Cyberse... Explore the CISSP security domains

As an analyst, you can explore various areas of cybersecurity that interest you. One way to explore those areas is by understanding different security domains and how they’re used to organize the work of security professionals. In this reading you will learn...

Ashley: My path to cybersecurity

[Completed] Professional Google Cyberse... Explore the CISSP security domains

My name is Ashley and my role at Google is CE Enablement Lead for SecOps sales. All that means is I help set up training for customer engineers that support our products. Grew up with a computer, loved the Internet. I have one of the earliest AOL screen names ...

Glossary terms from week 1

[Completed] Professional Google Cyberse...

Terms and definitions from Course 2, Week 1 Assess: The fifth step of the NIST RMF that means to determine if established controls are implemented correctly Authorize: The sixth step of the NIST RMF that refers to being accountable for the security and pri...

Threats, risks, and vulnerabilities

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

As an entry-level security analyst, one of your many roles will be to handle  an organization's digital and physical assets.  As a reminder,  an asset is an item perceived as having value to an organization.  During their lifespan, organization...

Herbert: Manage threats, risks, and vulnerabilities

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

My name is Herbert and I am a Security Engineer at Google.  I think I've always been interested in security,  in high school our school gave us these huge Dell laptops.  There wasn't a whole lot of security within those computers.  So, many of my friends w...

NIST’s Risk Management Framework

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

As you might remember from earlier in the program, the National Institute of Standards and Technology, NIST, provides many frameworks that are used by security professionals to manage risks, threats, and vulnerabilities.In this video, we're going to focus on N...

Manage common threats, risks, and vulnerabilities

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

Previously, you learned that security involves protecting organizations and people from threats, risks, and vulnerabilities. Understanding the current threat landscapes gives organizations the ability to create policies and processes designed to help prevent a...

Wrap-up

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

You've now completed the first section of this course! Let's review what we've discussed so far.We started out by exploring the focus of CISSP's eight security domains. Then, we discussed threats, risks, and vulnerabilities, and how they can impact organizatio...

Welcome to week 2

[Completed] Professional Google Cyberse... more about framework and controls

Welcome back! As a security analyst, your job isn't just keeping organization safe. Your role is much more important. You're also helping to keep people safe. Breaches that affect customers', vendors', and employees' data can cause significant damage to people...

Frameworks

[Completed] Professional Google Cyberse... more about framework and controls

In an organization, plans are put in place to protect against a variety of threats, risks, and vulnerabilities. However, the requirements used to protect organizations and people often overlap. Because of this, organizations use security frameworks as a starti...

Controls

[Completed] Professional Google Cyberse... more about framework and controls

While frameworks are used to create plans to address security risks, threats, and vulnerabilities, controls are used to reduce specific risks. If proper controls are not in place, an organization could face significant financial impacts and damage to their rep...

The relationship between frameworks and controls

[Completed] Professional Google Cyberse... more about framework and controls

Previously, you learned how organizations use security frameworks and controles to protect againced threads, risks, and vulnerabilities. This inclueds discussions about the National Institute of Standards and Technology's (NIST's) Risk Management Framework (...

Explore the CIA triad

[Completed] Professional Google Cyberse... The CIA triad: Confidentiality, integri...

Great to see you again! While working as an entry-level security analyst, your main responsibility is to help protect your organization's sensitive assets and data from threat actors. The CIA triad is a core security model that will help you do that.In this vi...

Use the CIA triad to protect organizations

[Completed] Professional Google Cyberse... The CIA triad: Confidentiality, integri...

Use the CIA triad to protect organizations Previously, you were introduced to the confidentiality, integrity, and availability (CIA) triad and how it helps organizations consider and mitigate risk. In this reading, you will learn how cybersecurity analysts us...

NIST frameworks

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

Welcome back. Before we get started, let's quickly review the purpose of frameworks. Organizations use frameworks as a starting point to develop plans that mitigate risks, threats, and vulnerabilities to sensitive data and assets. Fortunately, there are organi...

OWASP security principles

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

It's important to understand how to protect an organization's data and assets because that will be part of your role as a security analyst. Fortunately, there are principles and guidelines that can be used, along with NIST frameworks and the CIA triad, to help...