Advanced Search
Search Results
812 total results found
Why we audit user activity
Have you ever wondered if your employer is keeping a record of when you log into company systems? Well, they are, if they're implementing the third and final function of the authentication, authorization, and accounting framework. A...
Tim: Finding purpose in protecting assets
My name is Tim and I work on the Detection and Response team at Google. You can think of us as the smoke detectors and the fire departments at Google. So what our job is, is to detect harmful activity that may affect Google and its users. The stakes here...
Identity and access management
Security is more than simply combining processes and technologies to protect assets. Instead, security is about ensuring that these processes and technologies are creating a secure environment that supports a defense strategy. A key to doing this is implementi...
Welcome to week 3
Wow! We've covered a lot together! It's hard to believe we've reached the midpoint of this course. I hope you're getting a clearer picture of this exciting field and all the opportunities it has to offer. And most importantly, I hope you're having ...
1. Two Sum
Given an array of integers nums and an integer target, return indices of the two numbers such that they add up to target. You may assume that each input would have exactly one solution, and you may not use the same element twice. You can return the answer in...
splines plugin code default
using System; using System.Collections.Generic; using System.Linq; using Unity.Collections; using Unity.Mathematics; using UnityEngine; using UnityEngine.Serialization; using UnityEngine.Splines; using Random = UnityEngine.Random; #if UNITY_EDITOR ...
Wrap-up; Terms and definitions from Course 5, Week 2
Our focus in this section was on a major theme of security: protecting assets. A large part of this relates to privacy. We should all enjoy the right to decide who can access our information. As we learned, there are several controls in place that ...
Vulnerability management
For every asset that needs protecting, there are dozens of vulnerabilities. Finding those vulnerabilities and fixing them before they become a problem is the key to keep an asset safe. We've already covered what a vulnerability is...
Common vulnerabilities and exposures
We've discussed before that security is a team effort. Did you know the group extends well beyond a single security team? Protecting information is a global effort! When it comes to vulnerabilities, there are actually online publi...
Defense in depth strategy
A layered defense is difficult to penetrate. When one barrier fails, another takes its place to stop an attack. Defense in depth is a security model that makes use of this concept. It's a layered approach to vulnerability management that reduces ri...
The OWASP Top 10
To prepare for future risks, security professionals need to stay informed. Previously, you learned about the CVE® list, an openly accessible dictionary of known vulnerabilities and exposures. The CVE® list is an important source of information that the global ...
Open source intelligence
Cyber attacks can sometimes be prevented with the right information, which starts with knowing where your systems are vulnerable. Previously, you learned that the CVE® list and scanning tools are two useful ways of finding weaknesses. But, there are other ways...
The importance of updates
At some point in time, you may have wondered, “Why do my devices constantly need updating?” For consumers, updates provide improvements to performance, stability, and even new features! But from a security standpoint, they serve a specific purpose. Updates all...
Vulnerability assessments
Our exploration of the vulnerability management process so far has been focused on a couple of topics. We've discussed how vulnerabilities influence the design of defenses. We've also talked about how common vulnerabilities are shared. A topic we'r...
Approaches to vulnerability scanning
Previously, you learned about a vulnerability assessment, which is the internal review process of an organization's security systems. An organization performs vulnerability assessments to identify weaknesses and prevent attacks. Vulnerability scanning tools ar...
Omad: My learning journey into cybersecurity
My name is Omad, I'm a corporate operations engineer at Google. All I do is solve problems. Googlers have problems, they need somebody to talk to, they usually talk to us. If you asked me at 18 years old where I'd be now, I would have never told you I'd ...
Penetration testing
An effective security plan relies on regular testing to find an organization's weaknesses. Previously, you learned that vulnerability assessments, the internal review process of an organization's security systems, are used to design defense strategies based on...
Protect all entry points
There's a wide range of vulnerabilities and systems that need to be found. Assessing those weaknesses is a time-consuming process. To position themselves ahead of threats and make the most of their limited resources, companies start by understanding ...
Approach cybersecurity with an attacker mindset
Cybersecurity is a continuously changing field. It's a fast-paced environment where new threats and innovative technologies can disrupt your plans at a moment's notice. As a security professional, it’s up to you to be prepared by anticipating change. This all...
Types of threat actors
Anticipating attacks is an important skill you’ll need to be an effective security professional. Developing this skill requires you to have an open and flexible mindset about where attacks can come from. Previously, you learned about attack surfaces, which are...