Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

812 total results found

Security domains cybersecurity analysts need to know

[Completed] Professional Google Cyberse... Explore the CISSP security domains

As an analyst, you can explore various areas of cybersecurity that interest you. One way to explore those areas is by understanding different security domains and how they’re used to organize the work of security professionals. In this reading you will learn...

Ashley: My path to cybersecurity

[Completed] Professional Google Cyberse... Explore the CISSP security domains

My name is Ashley and my role at Google is CE Enablement Lead for SecOps sales. All that means is I help set up training for customer engineers that support our products. Grew up with a computer, loved the Internet. I have one of the earliest AOL screen names ...

Glossary terms from week 1

[Completed] Professional Google Cyberse...

Terms and definitions from Course 2, Week 1 Assess: The fifth step of the NIST RMF that means to determine if established controls are implemented correctly Authorize: The sixth step of the NIST RMF that refers to being accountable for the security and pri...

Threats, risks, and vulnerabilities

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

As an entry-level security analyst, one of your many roles will be to handle  an organization's digital and physical assets.  As a reminder,  an asset is an item perceived as having value to an organization.  During their lifespan, organization...

Herbert: Manage threats, risks, and vulnerabilities

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

My name is Herbert and I am a Security Engineer at Google.  I think I've always been interested in security,  in high school our school gave us these huge Dell laptops.  There wasn't a whole lot of security within those computers.  So, many of my friends w...

NIST’s Risk Management Framework

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

As you might remember from earlier in the program, the National Institute of Standards and Technology, NIST, provides many frameworks that are used by security professionals to manage risks, threats, and vulnerabilities.In this video, we're going to focus on N...

Manage common threats, risks, and vulnerabilities

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

Previously, you learned that security involves protecting organizations and people from threats, risks, and vulnerabilities. Understanding the current threat landscapes gives organizations the ability to create policies and processes designed to help prevent a...

Wrap-up

[Completed] Professional Google Cyberse... Negative threats, Risks, and vournerabi...

You've now completed the first section of this course! Let's review what we've discussed so far.We started out by exploring the focus of CISSP's eight security domains. Then, we discussed threats, risks, and vulnerabilities, and how they can impact organizatio...

Welcome to week 2

[Completed] Professional Google Cyberse... more about framework and controls

Welcome back! As a security analyst, your job isn't just keeping organization safe. Your role is much more important. You're also helping to keep people safe. Breaches that affect customers', vendors', and employees' data can cause significant damage to people...

Frameworks

[Completed] Professional Google Cyberse... more about framework and controls

In an organization, plans are put in place to protect against a variety of threats, risks, and vulnerabilities. However, the requirements used to protect organizations and people often overlap. Because of this, organizations use security frameworks as a starti...

Controls

[Completed] Professional Google Cyberse... more about framework and controls

While frameworks are used to create plans to address security risks, threats, and vulnerabilities, controls are used to reduce specific risks. If proper controls are not in place, an organization could face significant financial impacts and damage to their rep...

The relationship between frameworks and controls

[Completed] Professional Google Cyberse... more about framework and controls

Previously, you learned how organizations use security frameworks and controles to protect againced threads, risks, and vulnerabilities. This inclueds discussions about the National Institute of Standards and Technology's (NIST's) Risk Management Framework (...

Explore the CIA triad

[Completed] Professional Google Cyberse... The CIA triad: Confidentiality, integri...

Great to see you again! While working as an entry-level security analyst, your main responsibility is to help protect your organization's sensitive assets and data from threat actors. The CIA triad is a core security model that will help you do that.In this vi...

Use the CIA triad to protect organizations

[Completed] Professional Google Cyberse... The CIA triad: Confidentiality, integri...

Use the CIA triad to protect organizations Previously, you were introduced to the confidentiality, integrity, and availability (CIA) triad and how it helps organizations consider and mitigate risk. In this reading, you will learn how cybersecurity analysts us...

NIST frameworks

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

Welcome back. Before we get started, let's quickly review the purpose of frameworks. Organizations use frameworks as a starting point to develop plans that mitigate risks, threats, and vulnerabilities to sensitive data and assets. Fortunately, there are organi...

OWASP security principles

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

It's important to understand how to protect an organization's data and assets because that will be part of your role as a security analyst. Fortunately, there are principles and guidelines that can be used, along with NIST frameworks and the CIA triad, to help...

More about OWASP security principles

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

Previously, you learned that cybersecurity analysts help keep data safe and reduce risk for an organization by using a variety of security frameworks, controls, and security principles. In this reading, you will learn about more Open Web Application Security P...

Wajih: Stay up-to-date on the latest cybersecurity threats

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

My name is Wajih and I'm a security engineer at Google working in the digital forensics department. Do you need a background in cybersecurity? No you don't. My past experiences is working at a water park as a snow cone machine guy. I worked at a movie theater ...

More about security audits

[Completed] Professional Google Cyberse... NIST frameworks and OWASP principles an...

Previously, you were introduced to how to plan and complete an internal security audit. In this reading, you will learn more about security audits, including the goals and objectives of audits. Security audits A security audit is a review of an organization...

Counting in kuroik

Kuroik its just random thoughts

In the Kuroik language, counting is done in a hexadecimal system, which means it uses base 16 instead of base 10 like in the decimal system. Here's how you count from 0 to 17: Remember to add 'arn at the end of the number to indicate that it is a number and n...