Advanced Search
Search Results
948 total results found
Wrap-up;Terms and definitions from Course 8, Module 3
You've had an opportunity to learn about the important role stakeholders play and different ways to communicate with them.Let's review what we covered.We started by defining stakeholders and their roles in protecting an organization.We also explored the sensit...
Welcome to module 4 (38% complete)
Welcome back!I'm Emily, and I've been working in security education at Google for nearly nine years.My team works closely with our remarkable security experts to craft innovative and engaging educational solutions for our workforce to keep security at the fore...
Helpful cybersecurity resources
As we approach the end of our program, it's important to start thinking about ways to engage with the security community.As the industry evolves, it's essential to stay up-to-date on the latest security trends and news.Let's discuss a few good resources for yo...
Strategies for engaging with the cybersecurity community
You have learned a lot about the security field, from the origins of security and its importance to organizations around the world to recognizing security incidents and communicating with stakeholders. Security is a rapidly evolving industry, so it’s importa...
uhhh websites to visit
# Define the URLs for the security news websites $csoUrl = "https://www.csoonline.com" $krebsUrl = "https://krebsonsecurity.com" $darkReadingUrl = "https://www.darkreading.com" # Function to fetch and display headlines from a URL function Get-NewsHeadli...
Connect with other cybersecurity professionals
You’ve learned the importance of staying engaged with the cybersecurity community after completing this certificate program. The security industry is always evolving, so it’s important that security professionals continue to learn about the field. This readin...
Victoria: Continue your learning journey
I'm Victoria, I'm a security engineer at Google.When I first applied for a cybersecurity job, I felt overwhelmed.I was not a traditionally educated in computer science applicant, I actually majored in biology.So anytime a recruiter saw my resume, I would kind ...
Engage with the cybersecurity community in a meaningful way
Earlier we discussed the importance of staying up-to-date on security trends and news.In this video, we're going to share ways to establish and advance your career in security by connecting with people who are already in the industry.Social media is a great wa...
Sarah: Network in the cybersecurity community
Hi everyone, I'm Sarah and I am a senior program manager on Google's privacy safety and security engineering team.One of the communities I'm most involved in is a group called Women in Cybersecurity.And so I found that community really helpful to me when I fir...
Wrap-up; Terms and definitions from Course 8, Module 4
Great job!Now you've had an opportunity to learn about different ways to stay engaged with the security community.Let's take a moment to review what we've covered.First, we identified reliable security resources.Then, we discussed different ways to engage with...
Create a resume, example resume and Tips
In this video, we'll discuss how to create a resume that is tailored to the job you're applying for.Note that a resume is sometimes called a Curriculum Vitae, or CV, for short.Remember that it's okay if you don't have any cybersecurity experience.This certific...
Security organization worksheet
Part 1: Describe your security interests Part 2: Identify three organizations and include their mission or objectives Organization 1: name1 data Organization 2: name2 data Organiza...
Welcome to module 5
Welcome back!We've covered so many security related topics in detail.Throughout this program, we've discussed protecting organizational assets and data, and the tools and procedures used to protect them.We've also explored how to communicate with stakeholders,...
Find cybersecurity jobs
I hope you feel really proud of how far you've come!You may remember that earlier in this program, we discussed a few security roles in the industry.Now, we'll explore three of those roles.We'll start with security analyst.Security analyst is typically an entr...
Create a resume
In this video, we'll discuss how to create a resume that is tailored to the job you're applying for.Note that a resume is sometimes called a Curriculum Vitae, or CV, for short.Remember that it's okay if you don't have any cybersecurity experience.This certific...
Garvey: Cover letter tips
My name is Garvey, I'm a global staffing manager here at Google.I hire essentially all the cybersecurity engineers here at Google.I've hired across the US, Zurich, London, Sydney, Australia, and virtually any office that you name.This space is unique in the se...
Sandavis desertus and the myth i belive is connected to it -reimon
The "Sandbird" (Sandavis desertus), also known as the "Desert Runner," is a species of reptile found in the deserts of Taurosia. It belongs to the family Sandbirdidae, order Reptilia, and genus Sandavis.The Sandbird is a creature most peculiar, possessing char...
Explore the interview process
After you've submitted your resume to several job postings, you'll hopefully get an opportunity for an interview.The interview process usually starts with a short pre-screening phone call.It typically involves having a 15-minute conversation with a hiring mana...
The interview process
You previously learned how to create a resume and cover letter to apply for security jobs. In this reading, you’ll concentrate on how to prepare for the interview process. Although the interview process can vary widely from one company to another, most compani...
Garvey: Technical interview tips
My name is Garvey, I'm a global staffing manager here at Google.I've hired, I would say, several hundred security engineers here at Google over the last seven years.Advice I'd give those that are preparing for their technical interviews, don't expect that the ...