Advanced Search
Search Results
984 total results found
Course 8 content
Each course of this certificate program is broken into modules. You can complete courses at your own pace, but the module breakdowns are designed to help you finish the entire Google Cybersecurity Certificate in about six months. What’s to come? Here’s a quic...
Dion: My personal career journey
Hi, I'm Dion.I am a program manager at Google.I am a part of the detection and response team which falls under the privacy, safety, and security organization.My favorite part of my job is understanding that there are threats that we encounter day by day.And my...
Helpful resources and tips
As a learner, you can choose to complete one or multiple courses in this program. However, to obtain the Google Cybersecurity Certificate, you must complete all the courses. This reading describes what is required to obtain a certificate and best practices ...
Welcome to module 1
Welcome to the first section of the course!In the next several videos, we'll discuss what it means to have a security mindset, and how you'll use that mindset to protect an organization's assets and data.Then, we'll explore the process of incident escalation i...
firefox yt better audio scaling for when im studying
// ==UserScript== // @name Youtube Music fix volume ratio // @namespace http://tampermonkey.net/ // @version 0.4 // @description Makes the YouTube music volume slider exponential so it's easier to select lower volum...
Security as a mindset
Let's take a little time to discuss a concept that would help you throughout your security career: having a security mindset.In previous courses, we discussed various threats, risks, and vulnerabilities and how they can impact organizational operations and the...
Data and asset classification
Protecting an organization’s business operations and assets from security threats, risks, and vulnerabilities is important. You previously learned what it means to have a security mindset. That mindset can help you identify and reduce security risks and potent...
Detect and protect without neglect
Welcome back!In earlier courses, we discussed the impact that security incidents can have on the critical data and assets of an organization.If data and assets are compromised, it can lead to financial pains for an organization.It can even lead to regulatory f...
Disaster recovery and business continuity
The role of a security professional is to ensure a company’s data and assets are protected from threats, risks, and vulnerabilities. However, sometimes things don’t go as planned. There are times when security incidents happen. You’ve already learned that secu...
Juliana's story: Asset protection
Meet Juliana Soto, who recently completed an online cybersecurity certificate program and was hired as a cybersecurity analyst for Right-On-Time Payment Solutions, a fictional payment processing company allowing individuals to transfer money to friends and fam...
Wrap-up; Terms and definitions from Course 8, Module 1
You've had an opportunity to learn more about the important role an entry-level analyst plays in protecting the data and assets of an organization.Let's quickly review what we covered.We started off by discussing the importance of having a security mindset, in...
Welcome to module 2
I'm excited that you could join me today!Previously, you learned about the importance of various asset types.You also learned about the relationship between incidents and events.Now, we'll focus on escalating those incidents and events to the right people.Prot...
The importance of escalation
Security analysts are hired to protect company assets and data, including knowing when and how to escalate security incidents.In this video, we'll define security incident escalation and discuss your role in making decisions that help protect your organization...
The importance of escalation
Security analysts are hired to protect company assets and data, including knowing when and how to escalate security incidents.In this video, we'll define security incident escalation and discuss your role in making decisions that help protect your organization...
Escalate with a purpose
You previously learned about security incident escalation and the skills needed to help you escalate incidents. In this reading, you’ll learn the importance of escalating security issues and the potential impact of failing to escalate an issue. Incident esca...
Prepare to escalate through security recognition
Previously, we defined what it means to escalate an incident.We also discussed the skills needed to properly escalate incidents when the time comes.In this video, we're going to cover a few incident classification types to be aware of: malware infection, unaut...
Recognize roles and responsibilities during escalation
You previously learned about various incident classification types and how those incidents can impact an organization. This reading will discuss the roles of the various team members who are a part of the incident escalation process. Keep in mind that not al...
From simple activity to major data breach
So far, we've discussed different incident types and the importance of escalating those incidents to the right person.But what happens if an incident goes unescalated for too long?In this video, we'll discuss the potential impact that even the smallest inciden...
When and how to escalate a security incident
We've shared quite a bit about the importance of your role when it comes to escalating incidents.We've even discussed a few incident types that you may encounter.But what are the actual steps you need to take to properly escalate an incident?The answer to that...
Escalation timing
You previously learned about the potential impact even the smallest incident can have on an organization if the incident is not escalated properly. You also discovered just how important your role as an entry-level analyst will be to the effectiveness of an or...