Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

948 total results found

Common classification requirements

[Completed] Professional Google Cyberse...

Asset management is the process of tracking assets and the risks that affect them. The idea behind this process is simple: you can only protect what you know you have.  Previously, you learned that identifying, tracking, and classifying assets are all importa...

Security guidelines in action

[Completed] Professional Google Cyberse...

Organizations often face an overwhelming amount of risk. Developing a security plan from the beginning that addresses all risk can be challenging. This makes security frameworks a useful option. Previously, you learned about the NIST Cybersecurity Framework (...

The emergence of cloud security

[Completed] Professional Google Cyberse...

One of the most significant technology developments this century has been the emergence of cloud computing. The United Kingdom's National Cyber Security Centre defines cloud computing as, “An on-demand, massively scalable service, hosted on shared infrastructu...

Elements of a security plan

[Completed] Professional Google Cyberse...

Security is all about people, processes, and technology. It's a team effort, and I mean that literally. Protecting assets extends well beyond one person or a group of people in an IT department. The truth of the matter is that security is a culture...

The NIST Cybersecurity Framework

[Completed] Professional Google Cyberse...

Having a plan is just one part of securing assets. Once the plan is in action, the other part is making sure everyone's following along. In security, we call this compliance. Compliance is the process of adhering to internal stand...

Wrap-up; terms and definitions from course 5, week 1

[Completed] Professional Google Cyberse...

Well done! You made it to the end of this section! Being a security practitioner takes commitment and a desire to learn. A big part of the job involves keeping current with best practices and emerging trends. Thinking back on my own journey into th...

The data lifecycle

[Completed] Professional Google Cyberse...

Organizations of all sizes handle a large amount of data that must be kept private. You learned that data can be vulnerable whether it is at rest, in use, or in transit. Regardless of the state it is in, information should be kept private by limiting access an...

Things You Can Do to Make Security Worse in Your Network - Ignite Style by Jack Rhysider

yt transcripts tech ecucation edition

i used chat gpt voxscript to get this coz its great, but its 7+ years old and he stutters allot and didn't have allot of skill in making videos yet Introduction Things you can do to make security worse in your network. Why would you want to do this? Well, ...

Welcome to week 2

[Completed] Professional Google Cyberse...

I was fascinated by a world-wide malware event that happened in 2017. I started watching videos and preparing to take certification tests, just like you. I felt overwhelmed at first, but my curiosity and passion has driven me to continue learning in ...

Security controls

[Completed] Professional Google Cyberse...

These days, information is in so many places at once. As a result, organizations are under a lot of pressure to implement effective security controls that protects everyone's information from being stolen or exposed. Security controls are safeguards ...

Principle of least privilege

[Completed] Professional Google Cyberse...

Security controls are essential to keeping sensitive data private and safe. One of the most common controls is the principle of least privilege, also referred to as PoLP or least privilege. The principle of least privilege is a security concept in which a user...

最小権限の原則

[Completed] Professional Google Cyberse...

translated with "MixerBox translate" using chatgpt4 as i suck at reading japanese still im not sure if its correct or not its just meant to help me speak and read it セキュリティコントロールは、機密データをプライベートで安全に保つために不可欠です。最も一般的なコントロールの一つは、最小権限の原則とも呼ばれるPoLPまたは最小権限です。最小権限の原則は...

Information privacy: Regulations and compliance

[Completed] Professional Google Cyberse...

Security and privacy have a close relationship. As you may recall, people have the right to control how their personal data is collected and used. Organizations also have a responsibility to protect the information they are collecting from being compromised or...

Heather: The importance of protecting PII

[Completed] Professional Google Cyberse...

Hello, my name is Heather and I'm the Vice President of Security Engineering at Google. PII is everywhere. It's a fundamental part of how we are all working online all the time. If you are using online resources, you are probably putting yo...

obsidian tutorial

cool stuff

https://www.youtube.com/watch?v=DbsAQSIKQXk&ab_channel=NoBoilerplate

Fundamentals of cryptography

[Completed] Professional Google Cyberse...

The internet is an open, public system with a lot of data flowing through it. Even though we all send and store information online, there's some information that we choose to keep private. In security, this type of data is known as personally identif...

Public key infrastructure PKI

[Completed] Professional Google Cyberse...

Computers use a lot of encryption algorithms to send and store information online. They're all helpful when it comes to hiding private information, but only as long as their keys are protected. Can you imagine having to keep track of the encryption k...

Symmetric and asymmetric encryption

[Completed] Professional Google Cyberse...

Previously, you learned these terms:  Encryption: the process of converting data from a readable format to an encoded format Public key infrastructure (PKI):  an encryption framework that secures the exchange of online information Cipher: an alg...

Symmetric and asymmetric encryption

[Completed] Professional Google Cyberse...

Previously, you learned these terms:  Encryption: the process of converting data from a readable format to an encoded format Public key infrastructure (PKI):  an encryption framework that secures the exchange of online information Ciph...

Non-repudiation and hashing

[Completed] Professional Google Cyberse...

We've spent some time together exploring a couple forms of encryption. The two types we've discussed produce keys that are shared when communicating information. Encryption keys are vulnerable to being lost or stolen, which can lead to sensitive info...