Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

984 total results found

splines plugin code default

naru logs splines plugin

using System; using System.Collections.Generic; using System.Linq; using Unity.Collections; using Unity.Mathematics; using UnityEngine; using UnityEngine.Serialization; using UnityEngine.Splines; using Random = UnityEngine.Random; #if UNITY_EDITOR ...

Wrap-up; Terms and definitions from Course 5, Week 2

[Completed] Professional Google Cyberse...

Our focus in this section was on a major theme of security: protecting assets. A large part of this relates to privacy. We should all enjoy the right to decide who can access our information. As we learned, there are several controls in place that ...

Vulnerability management

[Completed] Professional Google Cyberse...

For every asset that needs protecting, there are dozens of vulnerabilities.  Finding those vulnerabilities and fixing them before they become a problem is the key to keep an asset safe. We've already covered what a vulnerability is...

Common vulnerabilities and exposures

[Completed] Professional Google Cyberse...

We've discussed before that security is a team effort. Did you know the group extends well beyond a single security team? Protecting information is a global effort! When it comes to vulnerabilities, there are actually online publi...

Defense in depth strategy

[Completed] Professional Google Cyberse...

A layered defense is difficult to penetrate. When one barrier fails, another takes its place to stop an attack. Defense in depth is a security model that makes use of this concept. It's a layered approach to vulnerability management that reduces ri...

The OWASP Top 10

[Completed] Professional Google Cyberse...

To prepare for future risks, security professionals need to stay informed. Previously, you learned about the CVE® list, an openly accessible dictionary of known vulnerabilities and exposures. The CVE® list is an important source of information that the global ...

Open source intelligence

[Completed] Professional Google Cyberse...

Cyber attacks can sometimes be prevented with the right information, which starts with knowing where your systems are vulnerable. Previously, you learned that the CVE® list and scanning tools are two useful ways of finding weaknesses. But, there are other ways...

The importance of updates

[Completed] Professional Google Cyberse...

At some point in time, you may have wondered, “Why do my devices constantly need updating?” For consumers, updates provide improvements to performance, stability, and even new features! But from a security standpoint, they serve a specific purpose. Updates all...

Vulnerability assessments

[Completed] Professional Google Cyberse...

Our exploration of the vulnerability management process so far has been focused on a couple of topics. We've discussed how vulnerabilities influence the design of defenses. We've also talked about how common vulnerabilities are shared. A topic we'r...

Approaches to vulnerability scanning

[Completed] Professional Google Cyberse...

Previously, you learned about a vulnerability assessment, which is the internal review process of an organization's security systems. An organization performs vulnerability assessments to identify weaknesses and prevent attacks. Vulnerability scanning tools ar...

Omad: My learning journey into cybersecurity

[Completed] Professional Google Cyberse...

My name is Omad, I'm a corporate operations engineer at Google. All I do is solve problems. Googlers have problems, they need somebody to talk to, they usually talk to us. If you asked me at 18 years old where I'd be now, I would have never told you I'd ...

Penetration testing

[Completed] Professional Google Cyberse...

An effective security plan relies on regular testing to find an organization's weaknesses. Previously, you learned that vulnerability assessments, the internal review process of an organization's security systems, are used to design defense strategies based on...

Protect all entry points

[Completed] Professional Google Cyberse...

There's a wide range of vulnerabilities and systems that need to be found. Assessing those weaknesses is a time-consuming process. To position themselves ahead of threats and make the most of their limited resources, companies start by understanding ...

Approach cybersecurity with an attacker mindset

[Completed] Professional Google Cyberse...

Cybersecurity is a continuously changing field. It's a fast-paced environment where new threats and innovative technologies can disrupt your plans at a moment's notice. As a security professional, it’s up to you to be prepared by anticipating change. This all...

Types of threat actors

[Completed] Professional Google Cyberse...

Anticipating attacks is an important skill you’ll need to be an effective security professional. Developing this skill requires you to have an open and flexible mindset about where attacks can come from. Previously, you learned about attack surfaces, which are...

Niru: Adopt an attacker mindset

[Completed] Professional Google Cyberse...

Hi, I'm Niru, and I lead the red team at Google. The red team at Google simulates attackers that are trying to hack into Google. They function as a sparring partner for the blue team, that is, the teams that build security controls, detection pipelines, or...

Pathways through defenses

[Completed] Professional Google Cyberse...

To defend against attacks, organizations need to have more than just the understanding of the growing digital landscape around them. Positioning themselves ahead of a cyber threat also takes understanding the type of attacks that can be used against th...

Fortify against brute force cyber attacks

[Completed] Professional Google Cyberse...

Usernames and passwords are one of the most common and important security controls in use today. They’re like the door lock that organizations use to restrict access to their networks, services, and data. But a major issue with relying on login credentials as ...

dungeon mastering for chatgpt is a nightmare if u rnt ready for it

Kuroik its just random thoughts nnzekeh

imagine you are and adventurere in a bar drinking a glass of cyder, you are new to this town and are just passing through. and you have weeks to kill before you have to go anywhere. while thinking about nothing basically temporarly ascending to another pla...

who is: nnzakeh

Kuroik its just random thoughts nnzekeh

Character Name: Nnzakeh Race: (Kurozma Dragon) Age: (23?) Very young for Kurozma dragons. Class: Wild Magic Sorcerer, Way of the Astral Self, Pact with an Unknown God Practices chaotic magic, guided by a pact with an enigmatic deity. Possesses mystical ...