Advanced Search
Search Results
992 total results found
Common cybersecurity tools
As mentioned earlier, security is like preparing for a storm. If you identify a leak, the color or shape of the bucket you use to catch the water doesn't matter. What is important is mitigating the risks and threats to your home, by using the tools available t...
Tools for protecting business operations
Previously, you were introduced to several technical skills that security analysts need to develop. You were also introduced to some tools entry-level security analysts may have in their toolkit. In this reading, you’ll learn more about how technical skills an...
Introduction to Linux, SQL, and Python
As we discussed previously, organizations use a variety of tools, such as SIEMs, playbooks, and packet sniffers to better manage, monitor, and analyze security threats. But those aren't the only tools in an analyst's toolkit. Analysts also use programming lang...
Use tools to protect business operations
Previously, you were introduced to programming, operating systems, and tools commonly used by cybersecurity professionals. In this reading, you’ll learn more about programming and operating systems, as well as other tools that entry-level analysts use to hel...
Create a cybersecurity portfolio
Throughout this certificate program, you will have multiple opportunities to develop a professional cybersecurity portfolio to showcase your security skills and knowledge. In this reading, you’ll learn what a portfolio is and why it’s important to develop a pr...
Make portfolio
To pass this course item, you must complete the activity and receive at least 80%, or 4 out of 5 points, on the questions that follow. Once you have completed the activity and questions, review the feedback provided. You can learn more about graded and practic...
Glossary terms from week 4
Terms and definitions from the certificate Terms and definitions from Course 1, Week 4 Antivirus software: A software program used to prevent, detect, and eliminate malware and viruses Database: An organized collection of information or data Data point: A ...
Terms and definitions from Course 1
A Adversarial artificial intelligence (AI): A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently Antivirus software: A software program used to prevent, detect, and eliminate mal...
Play It Safe: Manage Security Risks Introduction to Cert 2
My name is Ashley, and I'm a Customer Engineering Enablement Lead for Security Operation Sales at Google. I'm excited to be your instructor for this course.Let's start by quickly reviewing what we've covered so far. Earlier, we defined security and explored so...
Course 2 overview
Hello, and welcome to Play It Safe: Manage Security Risks, the second course in the Google Cybersecurity Certificate. You’re on an exciting journey! By the end of this course, you will develop a greater understanding of the eig...
Google Cybersecurity Certificate glossary
A Absolute file path: The full file path, which starts from the root Access controls: Security controls that manage access, authorization, and accountability of information Active packet sniffing: A type of attack where data packets are manipulated in tra...
Welcome to week 1
The world of security, which we also refer to as cybersecurity throughout this program, is vast. So making sure that you have the knowledge, skills, and tools to successfully navigate this world is why we're here.In the following videos, you'll learn about the...
New Page
Explore the CISSP security domains, Part 1
Welcome back! You might remember from course one that there are eight security domains, or categories, identified by CISSP. Security teams use them to organize daily tasks and identify gaps in security that could cause negative consequences for an organization...
Explore the CISSP security domains, Part 2
In this video, we'll cover the last four domains: identity and access management, security assessment and testing, security operations, and software development security.The fifth domain is identity and access management, or IAM. And it's focused on access and...
Security domains cybersecurity analysts need to know
As an analyst, you can explore various areas of cybersecurity that interest you. One way to explore those areas is by understanding different security domains and how they’re used to organize the work of security professionals. In this reading you will learn...
Ashley: My path to cybersecurity
My name is Ashley and my role at Google is CE Enablement Lead for SecOps sales. All that means is I help set up training for customer engineers that support our products. Grew up with a computer, loved the Internet. I have one of the earliest AOL screen names ...
Glossary terms from week 1
Terms and definitions from Course 2, Week 1 Assess: The fifth step of the NIST RMF that means to determine if established controls are implemented correctly Authorize: The sixth step of the NIST RMF that refers to being accountable for the security and pri...