Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

847 total results found

obsidian tutorial

cool stuff

https://www.youtube.com/watch?v=DbsAQSIKQXk&ab_channel=NoBoilerplate

Fundamentals of cryptography

[Completed] Professional Google Cyberse...

The internet is an open, public system with a lot of data flowing through it. Even though we all send and store information online, there's some information that we choose to keep private. In security, this type of data is known as personally identif...

Public key infrastructure PKI

[Completed] Professional Google Cyberse...

Computers use a lot of encryption algorithms to send and store information online. They're all helpful when it comes to hiding private information, but only as long as their keys are protected. Can you imagine having to keep track of the encryption k...

Symmetric and asymmetric encryption

[Completed] Professional Google Cyberse...

Previously, you learned these terms:  Encryption: the process of converting data from a readable format to an encoded format Public key infrastructure (PKI):  an encryption framework that secures the exchange of online information Cipher: an alg...

Symmetric and asymmetric encryption

[Completed] Professional Google Cyberse...

Previously, you learned these terms:  Encryption: the process of converting data from a readable format to an encoded format Public key infrastructure (PKI):  an encryption framework that secures the exchange of online information Ciph...

Non-repudiation and hashing

[Completed] Professional Google Cyberse...

We've spent some time together exploring a couple forms of encryption. The two types we've discussed produce keys that are shared when communicating information. Encryption keys are vulnerable to being lost or stolen, which can lead to sensitive info...

The evolution of hash functions

[Completed] Professional Google Cyberse...

Hash functions are important controls that are part of every company's security strategy. Hashing is widely used for authentication and non-repudiation, the concept that the authenticity of information can’t be denied. Previously, you learned that hash functi...

Access controls and authentication systems

[Completed] Professional Google Cyberse...

Protecting data is a fundamental feature of security controls. When it comes to keeping information safe and secure, hashing and encryption are powerful, yet limited tools. Managing who or what has access to information is also key to safeguarding in...

The rise of SSO and MFA

[Completed] Professional Google Cyberse...

Most companies help keep their data safely locked up behind authentication systems. Usernames and passwords are the keys that unlock information for most organizations. But are those credentials enough? Information security often focuses on managing a user's a...

The mechanisms of authorization

[Completed] Professional Google Cyberse...

Access is as much about authorization as it is about authentication. One of the most important functions of access controls is how they assign responsibility for certain systems and processes. Next up in our exploration of access control systems are ...

Why we audit user activity

[Completed] Professional Google Cyberse...

Have you ever wondered if your employer is keeping a record of when you log into company systems? Well, they are, if they're implementing the third and final function of the authentication, authorization, and accounting framework. A...

Tim: Finding purpose in protecting assets

[Completed] Professional Google Cyberse...

My name is Tim and I work on the Detection and Response team at Google. You can think of us as the smoke detectors and the fire departments at Google. So what our job is, is to detect harmful activity that may affect Google and its users. The stakes here...

Identity and access management

[Completed] Professional Google Cyberse...

Security is more than simply combining processes and technologies to protect assets. Instead, security is about ensuring that these processes and technologies are creating a secure environment that supports a defense strategy. A key to doing this is implementi...

Welcome to week 3

[Completed] Professional Google Cyberse...

Wow! We've covered a lot together! It's hard to believe we've reached the midpoint of this course. I hope you're getting a clearer picture of this exciting field and all the opportunities it has to offer. And most importantly, I hope you're having ...

1. Two Sum

[Active] leet code/ctf 1-50

Given an array of integers nums and an integer target, return indices of the two numbers such that they add up to target. You may assume that each input would have exactly one solution, and you may not use the same element twice. You can return the answer in...

splines plugin code default

naru logs splines plugin

using System; using System.Collections.Generic; using System.Linq; using Unity.Collections; using Unity.Mathematics; using UnityEngine; using UnityEngine.Serialization; using UnityEngine.Splines; using Random = UnityEngine.Random; #if UNITY_EDITOR ...

Wrap-up; Terms and definitions from Course 5, Week 2

[Completed] Professional Google Cyberse...

Our focus in this section was on a major theme of security: protecting assets. A large part of this relates to privacy. We should all enjoy the right to decide who can access our information. As we learned, there are several controls in place that ...

Vulnerability management

[Completed] Professional Google Cyberse...

For every asset that needs protecting, there are dozens of vulnerabilities.  Finding those vulnerabilities and fixing them before they become a problem is the key to keep an asset safe. We've already covered what a vulnerability is...