Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

948 total results found

The evolution of hash functions

[Completed] Professional Google Cyberse...

Hash functions are important controls that are part of every company's security strategy. Hashing is widely used for authentication and non-repudiation, the concept that the authenticity of information can’t be denied. Previously, you learned that hash functi...

Access controls and authentication systems

[Completed] Professional Google Cyberse...

Protecting data is a fundamental feature of security controls. When it comes to keeping information safe and secure, hashing and encryption are powerful, yet limited tools. Managing who or what has access to information is also key to safeguarding in...

The rise of SSO and MFA

[Completed] Professional Google Cyberse...

Most companies help keep their data safely locked up behind authentication systems. Usernames and passwords are the keys that unlock information for most organizations. But are those credentials enough? Information security often focuses on managing a user's a...

The mechanisms of authorization

[Completed] Professional Google Cyberse...

Access is as much about authorization as it is about authentication. One of the most important functions of access controls is how they assign responsibility for certain systems and processes. Next up in our exploration of access control systems are ...

Why we audit user activity

[Completed] Professional Google Cyberse...

Have you ever wondered if your employer is keeping a record of when you log into company systems? Well, they are, if they're implementing the third and final function of the authentication, authorization, and accounting framework. A...

Tim: Finding purpose in protecting assets

[Completed] Professional Google Cyberse...

My name is Tim and I work on the Detection and Response team at Google. You can think of us as the smoke detectors and the fire departments at Google. So what our job is, is to detect harmful activity that may affect Google and its users. The stakes here...

Identity and access management

[Completed] Professional Google Cyberse...

Security is more than simply combining processes and technologies to protect assets. Instead, security is about ensuring that these processes and technologies are creating a secure environment that supports a defense strategy. A key to doing this is implementi...

Welcome to week 3

[Completed] Professional Google Cyberse...

Wow! We've covered a lot together! It's hard to believe we've reached the midpoint of this course. I hope you're getting a clearer picture of this exciting field and all the opportunities it has to offer. And most importantly, I hope you're having ...

1. Two Sum

[Active] leet code/ctf 1-50

Given an array of integers nums and an integer target, return indices of the two numbers such that they add up to target. You may assume that each input would have exactly one solution, and you may not use the same element twice. You can return the answer in...

splines plugin code default

naru logs splines plugin

using System; using System.Collections.Generic; using System.Linq; using Unity.Collections; using Unity.Mathematics; using UnityEngine; using UnityEngine.Serialization; using UnityEngine.Splines; using Random = UnityEngine.Random; #if UNITY_EDITOR ...

Wrap-up; Terms and definitions from Course 5, Week 2

[Completed] Professional Google Cyberse...

Our focus in this section was on a major theme of security: protecting assets. A large part of this relates to privacy. We should all enjoy the right to decide who can access our information. As we learned, there are several controls in place that ...

Vulnerability management

[Completed] Professional Google Cyberse...

For every asset that needs protecting, there are dozens of vulnerabilities.  Finding those vulnerabilities and fixing them before they become a problem is the key to keep an asset safe. We've already covered what a vulnerability is...

Common vulnerabilities and exposures

[Completed] Professional Google Cyberse...

We've discussed before that security is a team effort. Did you know the group extends well beyond a single security team? Protecting information is a global effort! When it comes to vulnerabilities, there are actually online publi...

Defense in depth strategy

[Completed] Professional Google Cyberse...

A layered defense is difficult to penetrate. When one barrier fails, another takes its place to stop an attack. Defense in depth is a security model that makes use of this concept. It's a layered approach to vulnerability management that reduces ri...

The OWASP Top 10

[Completed] Professional Google Cyberse...

To prepare for future risks, security professionals need to stay informed. Previously, you learned about the CVE® list, an openly accessible dictionary of known vulnerabilities and exposures. The CVE® list is an important source of information that the global ...

Open source intelligence

[Completed] Professional Google Cyberse...

Cyber attacks can sometimes be prevented with the right information, which starts with knowing where your systems are vulnerable. Previously, you learned that the CVE® list and scanning tools are two useful ways of finding weaknesses. But, there are other ways...

The importance of updates

[Completed] Professional Google Cyberse...

At some point in time, you may have wondered, “Why do my devices constantly need updating?” For consumers, updates provide improvements to performance, stability, and even new features! But from a security standpoint, they serve a specific purpose. Updates all...

Vulnerability assessments

[Completed] Professional Google Cyberse...

Our exploration of the vulnerability management process so far has been focused on a couple of topics. We've discussed how vulnerabilities influence the design of defenses. We've also talked about how common vulnerabilities are shared. A topic we'r...

Approaches to vulnerability scanning

[Completed] Professional Google Cyberse...

Previously, you learned about a vulnerability assessment, which is the internal review process of an organization's security systems. An organization performs vulnerability assessments to identify weaknesses and prevent attacks. Vulnerability scanning tools ar...

Omad: My learning journey into cybersecurity

[Completed] Professional Google Cyberse...

My name is Omad, I'm a corporate operations engineer at Google. All I do is solve problems. Googlers have problems, they need somebody to talk to, they usually talk to us. If you asked me at 18 years old where I'd be now, I would have never told you I'd ...