Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

843 total results found

Welcome to week 4; threats and social engeneering

[Completed] Professional Google Cyberse...

Here we are! The final section of the course. What are amazing job you've done so far! Putting in the time, dedication, and hard work to get to this point is definitely something to celebrate. But we're not through yet. As we near the end of this c...

The criminal art of persuasion

[Completed] Professional Google Cyberse...

When you hear the word "cybercriminal", what comes to mind? You may imagine a hacker hunched over a computer in a dark room. If this is what came to mind, you're not alone. In fact, this is what most people outside of security think of. But onlin...

Social engineering tactics

[Completed] Professional Google Cyberse...

Social engineering attacks are a popular choice among threat actors. That’s because it’s often easier to trick people into providing them with access, information, or money than it is to exploit a software or network vulnerability. As you might recall, social...

Phishing for information

[Completed] Professional Google Cyberse...

Cybercriminals prefer attacks that do the most amount of damage with the least amount of effort. One of the most popular forms of social engineering that meets this description is phishing.  Phishing is the use of digital communications to...

Types of phishing

[Completed] Professional Google Cyberse...

Phishing is one of the most common types of social engineering, which are manipulation techniques that exploit human error to gain private information, access, or valuables. Previously, you learned how phishing is the use of digital communications to trick peo...

Malicious software

[Completed] Professional Google Cyberse...

People and computers are very different from one another. There's one way that we're alike. You know how? We're both vulnerable to getting an infection. While humans can be infected by a virus that causes a cold or flu, computers can be infected ...

An introduction to malware

[Completed] Professional Google Cyberse...

Previously, you learned that malware is software designed to harm devices or networks. Since its first appearance on personal computers decades ago, malware has developed into a variety of strains. Being able to identify different types of malware and understa...

The rise of cryptojacking

[Completed] Professional Google Cyberse...

Malware has been around nearly as long as computers. In its earliest forms, it was used by troublemakers as a form of digital vandalism. In today's digital world, alware has become a profitable crime that attackers use for their own financial gai...

Cross-site scripting (XSS)

[Completed] Professional Google Cyberse...

Previously, we explored a few types of malware. Whether it's installed on an individual computer or a network server, all malicious software needs to be delivered to the target before it can work. Phishing and other social engineering techniques are ...

Exploitable gaps in databases

[Completed] Professional Google Cyberse...

Let's keep exploring injection and attacks by investigating another common type of web based exploit. The next one we're going to discuss exploits the way websites access information from databases. Early in the program, you may have learned abou...

Prevent injection attacks; SQL injection categories

[Completed] Professional Google Cyberse...

Previously, you learned that Structured Query Language (SQL) is a programming language used to create, interact with, and request information from a database. SQL is one of the most common programming languages used to interact with databases because it is wid...

A proactive approach to security

[Completed] Professional Google Cyberse...

Preparing for attacks is an important job that the entire security team is responsible for. Threat actors have many tools they can use depending on their target. For example, attacking a small business can be different from attacking a public utility...

Chantelle: The value of diversity in cybersecurity

[Completed] Professional Google Cyberse...

My name is Chantelle. I'm a Security Engineer here at Google, and I am part of the security and implement, and scaling team. We secure and monitor systems that contain sensitive information. My background, initially I was going to be a heart surgeon ...

PASTA: The Process for Attack Simulation and Threat Analysis

[Completed] Professional Google Cyberse...

Let's finish exploring threat modelling by taking a look at real-world scenarios. This time, we'll use a standard threat modelling process called PASTA.  Imagine that a fitness company is getting ready to launch their first mobile app. B...

Traits of an effective threat model

[Completed] Professional Google Cyberse...

Threat modeling is the process of identifying assets, their vulnerabilities, and how each is exposed to threats. It is a strategic approach that combines various security activities, such as vulnerability management, threat analysis, and incident response. Sec...

Wrap-up; terms and definitions from course 5, week 4

[Completed] Professional Google Cyberse...

Managing threats is a major part of what security professionals do. In this part of the course, we've explored some common types of cyber threats that you'll likely encounter in the field. Let's review.  We started off discussing social engi...

Terms and definitions from Course 5

[Completed] Professional Google Cyberse...

Cybersecurity Glossary A Access controls: Security controls that manage access, authorization, andaccountability of informationAdware: A type of legitimate software that is sometimes used to display digitaladvertisements in applicationsAdvanced persistent th...

Course wrap-up

[Completed] Professional Google Cyberse...

Congratulations on making it through the end of this course! I can hardly believe our time together is over. Before moving on in the certificate program, I'd like to reflect on all the amazing progress you've made.  When we start...

Introduction to Course 6

[Completed] Professional Google Cyberse...

Security attacks are on the rise, and new vulnerabilities are exploited and discovered every week. No matter how prepared an organization may be in the event of a security attack, at some point something goes wrong. Whether it's a data breach, ransom...

Welcome to the Ethical Hacker Course

[FORGOTTEN] CISCO DIVD Academy Ethical ...

i started ripping this course on August 30th of 2023  so some things may be a bit different if you take the course https://skillsforall.com/course/ethical-hacker?courseLang=en-US The Fictional Companies in the Ethical Hacker Course Throughout the...