Advanced Search
Search Results
812 total results found
uhhh websites to visit
# Define the URLs for the security news websites $csoUrl = "https://www.csoonline.com" $krebsUrl = "https://krebsonsecurity.com" $darkReadingUrl = "https://www.darkreading.com" # Function to fetch and display headlines from a URL function Get-NewsHeadli...
Connect with other cybersecurity professionals
You’ve learned the importance of staying engaged with the cybersecurity community after completing this certificate program. The security industry is always evolving, so it’s important that security professionals continue to learn about the field. This readin...
Victoria: Continue your learning journey
I'm Victoria, I'm a security engineer at Google.When I first applied for a cybersecurity job, I felt overwhelmed.I was not a traditionally educated in computer science applicant, I actually majored in biology.So anytime a recruiter saw my resume, I would kind ...
Engage with the cybersecurity community in a meaningful way
Earlier we discussed the importance of staying up-to-date on security trends and news.In this video, we're going to share ways to establish and advance your career in security by connecting with people who are already in the industry.Social media is a great wa...
Sarah: Network in the cybersecurity community
Hi everyone, I'm Sarah and I am a senior program manager on Google's privacy safety and security engineering team.One of the communities I'm most involved in is a group called Women in Cybersecurity.And so I found that community really helpful to me when I fir...
Wrap-up; Terms and definitions from Course 8, Module 4
Great job!Now you've had an opportunity to learn about different ways to stay engaged with the security community.Let's take a moment to review what we've covered.First, we identified reliable security resources.Then, we discussed different ways to engage with...
Create a resume, example resume and Tips
In this video, we'll discuss how to create a resume that is tailored to the job you're applying for.Note that a resume is sometimes called a Curriculum Vitae, or CV, for short.Remember that it's okay if you don't have any cybersecurity experience.This certific...
Security organization worksheet
Part 1: Describe your security interests Part 2: Identify three organizations and include their mission or objectives Organization 1: name1 data Organization 2: name2 data Organiza...
Welcome to module 5
Welcome back!We've covered so many security related topics in detail.Throughout this program, we've discussed protecting organizational assets and data, and the tools and procedures used to protect them.We've also explored how to communicate with stakeholders,...
Find cybersecurity jobs
I hope you feel really proud of how far you've come!You may remember that earlier in this program, we discussed a few security roles in the industry.Now, we'll explore three of those roles.We'll start with security analyst.Security analyst is typically an entr...
Create a resume
In this video, we'll discuss how to create a resume that is tailored to the job you're applying for.Note that a resume is sometimes called a Curriculum Vitae, or CV, for short.Remember that it's okay if you don't have any cybersecurity experience.This certific...
Garvey: Cover letter tips
My name is Garvey, I'm a global staffing manager here at Google.I hire essentially all the cybersecurity engineers here at Google.I've hired across the US, Zurich, London, Sydney, Australia, and virtually any office that you name.This space is unique in the se...
Sandavis desertus and the myth i belive is connected to it -reimon
The "Sandbird" (Sandavis desertus), also known as the "Desert Runner," is a species of reptile found in the deserts of Taurosia. It belongs to the family Sandbirdidae, order Reptilia, and genus Sandavis.The Sandbird is a creature most peculiar, possessing char...
Explore the interview process
After you've submitted your resume to several job postings, you'll hopefully get an opportunity for an interview.The interview process usually starts with a short pre-screening phone call.It typically involves having a 15-minute conversation with a hiring mana...
The interview process
You previously learned how to create a resume and cover letter to apply for security jobs. In this reading, you’ll concentrate on how to prepare for the interview process. Although the interview process can vary widely from one company to another, most compani...
Garvey: Technical interview tips
My name is Garvey, I'm a global staffing manager here at Google.I've hired, I would say, several hundred security engineers here at Google over the last seven years.Advice I'd give those that are preparing for their technical interviews, don't expect that the ...
Conduct pre-interview research
Previously, we discussed how to create a resume and what to expect during an interview.In this video, we're going to cover a few more things that you need to do to prepare for the interview and that could help set you apart as an excellent candidate for the po...
Build rapport with interviewers
In this video, we'll explore a topic that can contribute to your success during the interview process: How to build rapport with your potential employer.Rapport is a friendly relationship in which the people involved understand each other's ideas and communica...
Use strategies to answer interview questions
Welcome back!Preparing for job interviews in the security field is such an exciting process.You've learned a lot through this program that can help you stand out as a candidate.Let's discuss some useful interview strategies to consider when speaking to an empl...
Apply the STAR method during interviews
You’ve been learning about different techniques and strategies to use during future interviews for jobs in the cybersecurity field. In this reading, you’ll learn more details about the STAR method for answering interview questions. Implementing this strategy w...