Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

948 total results found

Penetration testing

[Completed] Professional Google Cyberse...

An effective security plan relies on regular testing to find an organization's weaknesses. Previously, you learned that vulnerability assessments, the internal review process of an organization's security systems, are used to design defense strategies based on...

Protect all entry points

[Completed] Professional Google Cyberse...

There's a wide range of vulnerabilities and systems that need to be found. Assessing those weaknesses is a time-consuming process. To position themselves ahead of threats and make the most of their limited resources, companies start by understanding ...

Approach cybersecurity with an attacker mindset

[Completed] Professional Google Cyberse...

Cybersecurity is a continuously changing field. It's a fast-paced environment where new threats and innovative technologies can disrupt your plans at a moment's notice. As a security professional, it’s up to you to be prepared by anticipating change. This all...

Types of threat actors

[Completed] Professional Google Cyberse...

Anticipating attacks is an important skill you’ll need to be an effective security professional. Developing this skill requires you to have an open and flexible mindset about where attacks can come from. Previously, you learned about attack surfaces, which are...

Niru: Adopt an attacker mindset

[Completed] Professional Google Cyberse...

Hi, I'm Niru, and I lead the red team at Google. The red team at Google simulates attackers that are trying to hack into Google. They function as a sparring partner for the blue team, that is, the teams that build security controls, detection pipelines, or...

Pathways through defenses

[Completed] Professional Google Cyberse...

To defend against attacks, organizations need to have more than just the understanding of the growing digital landscape around them. Positioning themselves ahead of a cyber threat also takes understanding the type of attacks that can be used against th...

Fortify against brute force cyber attacks

[Completed] Professional Google Cyberse...

Usernames and passwords are one of the most common and important security controls in use today. They’re like the door lock that organizations use to restrict access to their networks, services, and data. But a major issue with relying on login credentials as ...

dungeon mastering for chatgpt is a nightmare if u rnt ready for it

Kuroik its just random thoughts nnzekeh

imagine you are and adventurere in a bar drinking a glass of cyder, you are new to this town and are just passing through. and you have weeks to kill before you have to go anywhere. while thinking about nothing basically temporarly ascending to another pla...

who is: nnzakeh

Kuroik its just random thoughts nnzekeh

Character Name: Nnzakeh Race: (Kurozma Dragon) Age: (23?) Very young for Kurozma dragons. Class: Wild Magic Sorcerer, Way of the Astral Self, Pact with an Unknown God Practices chaotic magic, guided by a pact with an enigmatic deity. Possesses mystical ...

Wrap-up; Terms and definitions from Course 5, Week 3

[Completed] Professional Google Cyberse...

Here we are at the end of this section! Can you believe it? I had so much fun exploring the world of vulnerabilities. I hope you felt the same. More importantly, I hope you got a better sense of how complex a landscape the digital world is. This ...

Welcome to week 4; threats and social engeneering

[Completed] Professional Google Cyberse...

Here we are! The final section of the course. What are amazing job you've done so far! Putting in the time, dedication, and hard work to get to this point is definitely something to celebrate. But we're not through yet. As we near the end of this c...

The criminal art of persuasion

[Completed] Professional Google Cyberse...

When you hear the word "cybercriminal", what comes to mind? You may imagine a hacker hunched over a computer in a dark room. If this is what came to mind, you're not alone. In fact, this is what most people outside of security think of. But onlin...

Social engineering tactics

[Completed] Professional Google Cyberse...

Social engineering attacks are a popular choice among threat actors. That’s because it’s often easier to trick people into providing them with access, information, or money than it is to exploit a software or network vulnerability. As you might recall, social...

Phishing for information

[Completed] Professional Google Cyberse...

Cybercriminals prefer attacks that do the most amount of damage with the least amount of effort. One of the most popular forms of social engineering that meets this description is phishing.  Phishing is the use of digital communications to...

Types of phishing

[Completed] Professional Google Cyberse...

Phishing is one of the most common types of social engineering, which are manipulation techniques that exploit human error to gain private information, access, or valuables. Previously, you learned how phishing is the use of digital communications to trick peo...

Malicious software

[Completed] Professional Google Cyberse...

People and computers are very different from one another. There's one way that we're alike. You know how? We're both vulnerable to getting an infection. While humans can be infected by a virus that causes a cold or flu, computers can be infected ...

An introduction to malware

[Completed] Professional Google Cyberse...

Previously, you learned that malware is software designed to harm devices or networks. Since its first appearance on personal computers decades ago, malware has developed into a variety of strains. Being able to identify different types of malware and understa...

The rise of cryptojacking

[Completed] Professional Google Cyberse...

Malware has been around nearly as long as computers. In its earliest forms, it was used by troublemakers as a form of digital vandalism. In today's digital world, alware has become a profitable crime that attackers use for their own financial gai...

Cross-site scripting (XSS)

[Completed] Professional Google Cyberse...

Previously, we explored a few types of malware. Whether it's installed on an individual computer or a network server, all malicious software needs to be delivered to the target before it can work. Phishing and other social engineering techniques are ...

Exploitable gaps in databases

[Completed] Professional Google Cyberse...

Let's keep exploring injection and attacks by investigating another common type of web based exploit. The next one we're going to discuss exploits the way websites access information from databases. Early in the program, you may have learned abou...