Advanced Search
Search Results
845 total results found
New Page
NIST frameworks
Welcome back. Before we get started, let's quickly review the purpose of frameworks. Organizations use frameworks as a starting point to develop plans that mitigate risks, threats, and vulnerabilities to sensitive data and assets. Fortunately, there are organi...
OWASP security principles
It's important to understand how to protect an organization's data and assets because that will be part of your role as a security analyst. Fortunately, there are principles and guidelines that can be used, along with NIST frameworks and the CIA triad, to help...
More about OWASP security principles
Previously, you learned that cybersecurity analysts help keep data safe and reduce risk for an organization by using a variety of security frameworks, controls, and security principles. In this reading, you will learn about more Open Web Application Security P...
Wajih: Stay up-to-date on the latest cybersecurity threats
My name is Wajih and I'm a security engineer at Google working in the digital forensics department. Do you need a background in cybersecurity? No you don't. My past experiences is working at a water park as a snow cone machine guy. I worked at a movie theater ...
More about security audits
Previously, you were introduced to how to plan and complete an internal security audit. In this reading, you will learn more about security audits, including the goals and objectives of audits. Security audits A security audit is a review of an organization...
Counting in kuroik
In the Kuroik language, counting is done in a hexadecimal system, which means it uses base 16 instead of base 10 like in the decimal system. Here's how you count from 0 to 17: Remember to add 'arn at the end of the number to indicate that it is a number and n...
Plot of this story
Start of the story one day a pair of twins were born in the kingdom of kuroik two identical twins leyt and ?????(darkness) and (light) one day while there mother slept A human infected with light invaded the castle while the human tried to raid the treasu...
tenses (finsh plz)
Basic Tenses: These are the simplest tenses in Kuroik. They indicate the general time frame of an action or state. Past = 'ir Present = 'er Future = 'ur Precision Tenses: These tenses provide more specific information about the timing of an act...
page 1
ok so this is just going to be a literal dictionary, its going to be sorted alphabeticallyand heres a link to the google sheet that will ideally have everything in it click here to open the link in a new tab or copy and paste this urn into your browser if u ...
every word and there meaning
Aivu: LoveAykshin: DesertBandan: RubberBanyo: EatBe: Someone elseBej: Someone else, time travel singularBejs: Someone else, time travel pluralBes: Someone else, pluralCho: Specific form of "this"D'fora: Pet, specifically a magical familiarD'frora'na: Wild anim...
Glossary terms from week 2
Terms and definitions from Course 2, Week 2 Asset: An item perceived as having value to an organization Attack vectors: The pathways attackers use to penetrate security defenses Authentication: The process of verifying who someone is Authorization: The con...
Welcome to week 3
Welcome back! Previously, we discussed security frameworks, controls, and design principles, and how security professionals apply these to security audits.In this section, we'll continue to explore security tools and how they can help you keep organizations an...
Logs and SIEM tools
As a security analyst, one of your responsibilities might include analyzing log data to mitigate and manage threats, risks, and vulnerabilities. As a reminder, a log is a record of events that occur within an organization's systems and networks. Security analy...
SIEM dashboards
We've explored how SIEM tools are used to collect and analyze log data. However, this is just one of the many ways SIEM tools are used in cybersecurity.SIEM tools can also be used to create dashboards. You might have encountered dashboards in an app on your ph...
The future of SIEM tools
Previously, you were introduced to security information and event management (SIEM) tools, along with a few examples of SIEM tools. In this reading, you will learn more about how SIEM tools are used to protect organizational operations. You will also gain insi...
Parisa: The parallels of accessibility and security
My name is Parisa and I'm a vice president of engineering and lead the Chrome Team. So as General manager of the Chrome Team, I lead a team of engineers and product managers and designers around the world who actually build Chrome and keep all of our users sa...
Explore common SIEM tools
Hello again! Previously, we discussed how SIEM tools help security analysts monitor systems and detect security threats.In this video, we'll cover some industry leading SIEM tools that you'll likely encounter as a security analyst. First, let's discuss the dif...
More about cybersecurity tools
Previously, you learned about several tools that are used by cybersecurity team members to monitor for and identify potential security threats, risks, and vulnerabilities. In this reading, you’ll learn more about common open-source and proprietary cybersecurit...
Talya: Myths about the cybersecurity field
I'm Talia, and I'm an engineer within privacy, safety and security at Google. So there are a lot of myths in the cybersecurity space. One big one is, you must know how to code, or you must know how to hack, or you must be a math wiz. I don't know how to code, ...