Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

812 total results found

Why we audit user activity

[Completed] Professional Google Cyberse...

Have you ever wondered if your employer is keeping a record of when you log into company systems? Well, they are, if they're implementing the third and final function of the authentication, authorization, and accounting framework. A...

Tim: Finding purpose in protecting assets

[Completed] Professional Google Cyberse...

My name is Tim and I work on the Detection and Response team at Google. You can think of us as the smoke detectors and the fire departments at Google. So what our job is, is to detect harmful activity that may affect Google and its users. The stakes here...

Identity and access management

[Completed] Professional Google Cyberse...

Security is more than simply combining processes and technologies to protect assets. Instead, security is about ensuring that these processes and technologies are creating a secure environment that supports a defense strategy. A key to doing this is implementi...

Welcome to week 3

[Completed] Professional Google Cyberse...

Wow! We've covered a lot together! It's hard to believe we've reached the midpoint of this course. I hope you're getting a clearer picture of this exciting field and all the opportunities it has to offer. And most importantly, I hope you're having ...

1. Two Sum

[Active] leet code/ctf 1-50

Given an array of integers nums and an integer target, return indices of the two numbers such that they add up to target. You may assume that each input would have exactly one solution, and you may not use the same element twice. You can return the answer in...

splines plugin code default

naru logs splines plugin

using System; using System.Collections.Generic; using System.Linq; using Unity.Collections; using Unity.Mathematics; using UnityEngine; using UnityEngine.Serialization; using UnityEngine.Splines; using Random = UnityEngine.Random; #if UNITY_EDITOR ...

Wrap-up; Terms and definitions from Course 5, Week 2

[Completed] Professional Google Cyberse...

Our focus in this section was on a major theme of security: protecting assets. A large part of this relates to privacy. We should all enjoy the right to decide who can access our information. As we learned, there are several controls in place that ...

Vulnerability management

[Completed] Professional Google Cyberse...

For every asset that needs protecting, there are dozens of vulnerabilities.  Finding those vulnerabilities and fixing them before they become a problem is the key to keep an asset safe. We've already covered what a vulnerability is...

Common vulnerabilities and exposures

[Completed] Professional Google Cyberse...

We've discussed before that security is a team effort. Did you know the group extends well beyond a single security team? Protecting information is a global effort! When it comes to vulnerabilities, there are actually online publi...

Defense in depth strategy

[Completed] Professional Google Cyberse...

A layered defense is difficult to penetrate. When one barrier fails, another takes its place to stop an attack. Defense in depth is a security model that makes use of this concept. It's a layered approach to vulnerability management that reduces ri...

The OWASP Top 10

[Completed] Professional Google Cyberse...

To prepare for future risks, security professionals need to stay informed. Previously, you learned about the CVE® list, an openly accessible dictionary of known vulnerabilities and exposures. The CVE® list is an important source of information that the global ...

Open source intelligence

[Completed] Professional Google Cyberse...

Cyber attacks can sometimes be prevented with the right information, which starts with knowing where your systems are vulnerable. Previously, you learned that the CVE® list and scanning tools are two useful ways of finding weaknesses. But, there are other ways...

The importance of updates

[Completed] Professional Google Cyberse...

At some point in time, you may have wondered, “Why do my devices constantly need updating?” For consumers, updates provide improvements to performance, stability, and even new features! But from a security standpoint, they serve a specific purpose. Updates all...

Vulnerability assessments

[Completed] Professional Google Cyberse...

Our exploration of the vulnerability management process so far has been focused on a couple of topics. We've discussed how vulnerabilities influence the design of defenses. We've also talked about how common vulnerabilities are shared. A topic we'r...

Approaches to vulnerability scanning

[Completed] Professional Google Cyberse...

Previously, you learned about a vulnerability assessment, which is the internal review process of an organization's security systems. An organization performs vulnerability assessments to identify weaknesses and prevent attacks. Vulnerability scanning tools ar...

Omad: My learning journey into cybersecurity

[Completed] Professional Google Cyberse...

My name is Omad, I'm a corporate operations engineer at Google. All I do is solve problems. Googlers have problems, they need somebody to talk to, they usually talk to us. If you asked me at 18 years old where I'd be now, I would have never told you I'd ...

Penetration testing

[Completed] Professional Google Cyberse...

An effective security plan relies on regular testing to find an organization's weaknesses. Previously, you learned that vulnerability assessments, the internal review process of an organization's security systems, are used to design defense strategies based on...

Protect all entry points

[Completed] Professional Google Cyberse...

There's a wide range of vulnerabilities and systems that need to be found. Assessing those weaknesses is a time-consuming process. To position themselves ahead of threats and make the most of their limited resources, companies start by understanding ...

Approach cybersecurity with an attacker mindset

[Completed] Professional Google Cyberse...

Cybersecurity is a continuously changing field. It's a fast-paced environment where new threats and innovative technologies can disrupt your plans at a moment's notice. As a security professional, it’s up to you to be prepared by anticipating change. This all...

Types of threat actors

[Completed] Professional Google Cyberse...

Anticipating attacks is an important skill you’ll need to be an effective security professional. Developing this skill requires you to have an open and flexible mindset about where attacks can come from. Previously, you learned about attack surfaces, which are...