Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

948 total results found

Prevent injection attacks; SQL injection categories

[Completed] Professional Google Cyberse...

Previously, you learned that Structured Query Language (SQL) is a programming language used to create, interact with, and request information from a database. SQL is one of the most common programming languages used to interact with databases because it is wid...

A proactive approach to security

[Completed] Professional Google Cyberse...

Preparing for attacks is an important job that the entire security team is responsible for. Threat actors have many tools they can use depending on their target. For example, attacking a small business can be different from attacking a public utility...

Chantelle: The value of diversity in cybersecurity

[Completed] Professional Google Cyberse...

My name is Chantelle. I'm a Security Engineer here at Google, and I am part of the security and implement, and scaling team. We secure and monitor systems that contain sensitive information. My background, initially I was going to be a heart surgeon ...

PASTA: The Process for Attack Simulation and Threat Analysis

[Completed] Professional Google Cyberse...

Let's finish exploring threat modelling by taking a look at real-world scenarios. This time, we'll use a standard threat modelling process called PASTA.  Imagine that a fitness company is getting ready to launch their first mobile app. B...

Traits of an effective threat model

[Completed] Professional Google Cyberse...

Threat modeling is the process of identifying assets, their vulnerabilities, and how each is exposed to threats. It is a strategic approach that combines various security activities, such as vulnerability management, threat analysis, and incident response. Sec...

Wrap-up; terms and definitions from course 5, week 4

[Completed] Professional Google Cyberse...

Managing threats is a major part of what security professionals do. In this part of the course, we've explored some common types of cyber threats that you'll likely encounter in the field. Let's review.  We started off discussing social engi...

Terms and definitions from Course 5

[Completed] Professional Google Cyberse...

Cybersecurity Glossary A Access controls: Security controls that manage access, authorization, andaccountability of informationAdware: A type of legitimate software that is sometimes used to display digitaladvertisements in applicationsAdvanced persistent th...

Course wrap-up

[Completed] Professional Google Cyberse...

Congratulations on making it through the end of this course! I can hardly believe our time together is over. Before moving on in the certificate program, I'd like to reflect on all the amazing progress you've made.  When we start...

Introduction to Course 6

[Completed] Professional Google Cyberse...

Security attacks are on the rise, and new vulnerabilities are exploited and discovered every week. No matter how prepared an organization may be in the event of a security attack, at some point something goes wrong. Whether it's a data breach, ransom...

Welcome to the Ethical Hacker Course

[FORGOTTEN] CISCO DIVD Academy Ethical ...

i started ripping this course on August 30th of 2023  so some things may be a bit different if you take the course https://skillsforall.com/course/ethical-hacker?courseLang=en-US The Fictional Companies in the Ethical Hacker Course Throughout the...

overview

[FORGOTTEN] CISCO DIVD Academy Ethical ...

i started ripping this course on August 30th of 2023  so some things may be a bit different if you take the course https://skillsforall.com/course/ethical-hacker?courseLang=en-US arn the art of offensive security to uncover cyber threats...

1.0.1-1.0.2 Why Should I Take This Module and what will i learn?

[FORGOTTEN] CISCO DIVD Academy Ethical ...

1.0.1 Why Should I Take This Module? Protego Security Solutions Task Welcome to Protego! My name is Alex. I will be your mentor for your first 90 days here. Our recruiter was very impressed with...

1.1.1 Overview

[FORGOTTEN] CISCO DIVD Academy Ethical ...

1.1.1 Overview Protego Security Solutions Alex here! We will be meeting periodically over the next few weeks so you can get oriented to working at Protego and also build yo...

1.1.3 Lab - Researching PenTesting Careers

[FORGOTTEN] CISCO DIVD Academy Ethical ...

Protego Security Solutions I think it is important for you to understand the employment landscape and the different roles and responsibilities that cybersecurity professions include. A good general r...

1.1.4 Threat Actors

[FORGOTTEN] CISCO DIVD Academy Ethical ...

Before you can understand how an ethical hacker or penetration tester can mimic a threat actor (or malicious attacker), you need to understand the different types of threat actors. The following are the most common types of malicious attack...

Terms and definitions from the certificate

[Completed] Professional Google Cyberse...

Google Cybersecurity Certificate glossary from: "Sound the Alarm: Detection and Response; part 6 of 8 in the professional Cybersecurity cert" A Absolute file path: The full file path, which starts from the root Access controls: Security controls that manage...

Dave: Grow your cybersecurity career with mentors

[Completed] Professional Google Cyberse...

My name is Dave.  I'm a Principal Security Strategist with Google Cloud.  My job is to work directly with security practitioners to help them protect their organizations. What I love about my job is the variety. One day I might be troubleshooting a tec...

Welcome to week 1

[Completed] Professional Google Cyberse...

Welcome. In my role as Principal Security Strategist, I've seen how the incident response operations that you'll learn about in this course are implemented in an organization. One of the things I find so exciting about detecting and responding to inc...

Introduction to the incident response lifecycle

[Completed] Professional Google Cyberse...

Incident lifecycle frameworks provide a structure to support incident response operations. Frameworks help organizations develop a standardized approach to their incident response process, so that incidents are managed in an effective and consistent wa...

Incident response teams

[Completed] Professional Google Cyberse...

Hi again! In this section, we'll discuss how incident response teams manage incidents.  You may have been part of a team before. Whether it was a sports team, or a team in the workplace or at school, teams are most successful when ev...