Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

845 total results found

Mod the Cube

[zzz dead] unity devlog: jr programmer ...

Summary : In this exercise, you'll be challenged to modify a provided script to change the behavior of an object it's applied to. Type:Tutorial Level:Beginner Xp: 60 Estimated time to complete: 30 MinsMaterials: ModTheCubeChallengeAssets....

Lesson 3.1 - Jump Force (FIX

[zzz dead] unity devlog: jr programmer ...

SummaryOverview: The goal of this lesson is to set up the basic gameplay for this prototype. We will start by creating a new project and importing the starter files. Next we will choose a beautiful background and a character for the player to control, and allo...

Introduction to Course 3 + course 3 overview

[Completed] Professional Google Cyberse... getting started & introduction to networks

Introduction You've learned about security domains in previous courses.Now we'll explore one of those domains further: networks.It's important to secure networks because network-based attacks are growing in bothfrequency and complexity. Hi there! My name is ...

Glossary Cybersecurity

[Completed] Professional Google Cyberse... getting started & introduction to networks

Terms and definitions from the certificateAAbsolute file path: The full file path, which starts from the rootAccess controls: Security controls that manage access, authorization, andaccountability of informationActive packet sniffing: A type of attack where da...

Welcome to week 1

[Completed] Professional Google Cyberse... getting started & introduction to networks

Before securing a network, you need to understand the basic design of a network and how it functions.In this section of the course, you will learn about the structure of a network, standard networking tools, cloud networks, and the basic framework for organizi...

Chris: My path to cybersecurity

[Completed] Professional Google Cyberse... getting started & introduction to networks

My name is Chris and I'm the Chief Information Security Officer at Google Fiber. We provide high speed Internet to customers across the United States. As the chief information security officer, I'm responsible for making sure that the network stays safe, our c...

What are networks?

[Completed] Professional Google Cyberse... getting started & introduction to networks

Welcome! Before you can understand the importance of securing a network, you need to know what a network is.A network is a group of connected devices. At home, the devices connected to your network might be your laptop, cell phones, and smart devices, like you...

Tina: Working in network security

[Completed] Professional Google Cyberse... getting started & introduction to networks

My name is Tina and I'm a software engineer at Google. As a software engineer, I work on an internal tool that serves the security engineers and network engineers at Google. Network security is important because we want to make sure that our network systems ar...

Emmanuel: Useful skills for network security

[Completed] Professional Google Cyberse... getting started & introduction to networks

My name is Emmanuel and I am an offensive security engineer at Google. For offensive security, my job is to simulate adversaries and threats that are targeting various companies and I look at defending how we can protect Google's infrastructure. I make it hard...

tech enthusiest reminder

[Completed] Professional Google Cyberse... getting started & introduction to networks

A hub is a network device that broadcasts information to every device on the network.

Network tools

[Completed] Professional Google Cyberse... getting started & introduction to networks

In this video, you'll learn about the common devices that make up a network. Let's get started.A hub is a network device that broadcasts information to every device on the network. Think of a hub like a radio tower that broadcasts a signal to any radio tuned t...

Network components, devices, and diagrams

[Completed] Professional Google Cyberse... getting started & introduction to networks

In this section of the course, you will learn about network architecture.  Once you have a foundational understanding of network architecture, sometimes referred to as network design, you will learn about security vulnerabilities inherent in all networks and ...

Cloud networks

[Completed] Professional Google Cyberse... getting started & introduction to networks

Companies have traditionally owned their network devices, and kept them in their own office buildings. But now, a lot of companies are using third-party providers to manage their networks. Why? Well, this model helps companies save money while giving them acce...

Cloud networks

[Completed] Professional Google Cyberse... getting started & introduction to networks

Companies have traditionally owned their network devices, and kept them in their own office buildings. But now, a lot of companies are using third-party providers to manage their networks.Why? Well, this model helps companies save money while giving them acces...

New Page

[Completed] Professional Google Cyberse... getting started & introduction to networks

Introduction to network communication

[Completed] Professional Google Cyberse... Network Communication

Networks help organizations communicate and connect. But communication makes network attacks more likely because it gives a malicious actor an opportunity to take advantage of vulnerable devices and unprotected networks.Communication over a network happens whe...

The TCP/IP model

[Completed] Professional Google Cyberse... Network Communication

Hello again. In this video, you'll learn more about communication protocols and devices used to communicate with each other across the internet. This is called the TCP/IP model.TCP/IP stands for Transmission Control Protocol and Internet Protocol. TCP/IP is th...

The four layers of the TCP/IP model

[Completed] Professional Google Cyberse... Network Communication

Now that we've discussed the structure of a network and how communications takes place, it's important for you to know how the security professionals identify problems that might arise.The TCP/IP model is a framework that is used to visualize how data is organ...

Learn more about the TCP/IP model

[Completed] Professional Google Cyberse... Network Communication

In this reading, you will build on what you have learned about the Transmission Control Protocol/Internet Protocol (TCP/IP) model, consider the differences between the Open Systems Interconnection (OSI) model and TCP/IP model, and learn how they’re related. Th...

The OSI model

[Completed] Professional Google Cyberse... Network Communication

So far in this section of the course, you learned about the components of a network, network devices, and how network communication occurs across a network. All communication on a network is organized using network protocols. Previously, you learned about the...