Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

984 total results found

Juliana's story: Attention to detail

[Completed] Professional Google Cyberse...

This is the second reading in the scenario about Juliana Soto, a cybersecurity analyst who was recently hired by Right-On-Time Payment Solutions. In the reading about asset protection , Juliana identified important assets to her organization and came up with ...

Juliana’s story: Effective communication

[Completed] Professional Google Cyberse...

Throughout this course, you’ve been following the story of Juliana Soto. Juliana was recently hired as a cybersecurity analyst by Right-On-Time Payment Solutions, a payment processing company that handles sensitive customer information. In the reading about at...

Welcome to module 3

[Completed] Professional Google Cyberse...

We've covered so much in previous courses, from the foundations of security to a basic understanding of networks and programming languages like SQL and Python.These concepts are core knowledge when preparing for a role in the security profession.But how does t...

Stakeholders in cybersecurity

[Completed] Professional Google Cyberse...

Let's discuss the hierarchy within an organization.It goes from you, the analyst, to management, all the way up to executives.Hierarchy is a great way to understand stakeholders.A stakeholder is defined as an individual or group that has an interest in the dec...

The purpose and impact of stakeholders

[Completed] Professional Google Cyberse...

You previously learned about incident escalation and the various security incident classification types. You also learned about the impact these incidents can have on an organization’s business operations. This reading will explore the individuals who have a ...

Explore: Stakeholder roles and responsibilities

[Completed] Professional Google Cyberse...

Risk manager The risk manager helps to identify risks and manage the response to cybersecurity threats. They may also develop, implement, and enforce IT policies that employees must follow. Chief Executive Officer (CEO) The Chief Executive O...

Clear and concise communication

[Completed] Professional Google Cyberse...

Welcome back!Previously, we discussed stakeholders and the important security roles they play within an organization.Now, let's explore the role you play in communicating with those stakeholders.The information that's communicated to stakeholders is sensitive....

Building blocks of cybersecurity communications

[Completed] Professional Google Cyberse...

Previously, we discussed communicating information that is important to stakeholders.It's essential that communications are specific and clear, so stakeholders understand what's happening and what actions may need to be taken.In this video, we'll go into more ...

Communicate effectively with stakeholders

[Completed] Professional Google Cyberse...

You previously learned about security stakeholders and their significance in an organization. In this reading, you’ll learn the importance of clearly communicating to stakeholders to ensure they have a thorough understanding of the information you’re sharing a...

Visual storytelling in cybersecurity

[Completed] Professional Google Cyberse...

The ability to communicate threats, risks, vulnerabilities, or incidents and possible solutions is a valuable skill for security professionals.In this video, we'll focus on various communication strategies that can help you engage with and convey key ideas to ...

Create visual dashboards for impactful cybersecurity communications

[Completed] Professional Google Cyberse...

You previously learned about security stakeholders, the people responsible for protecting the data and systems of various departments of an organization. An entry-level analyst might communicate directly or indirectly with these individuals. If you do end up c...

How to create a visual dashboard

[Completed] Professional Google Cyberse...

In this video, we're going to have a bit of fun! We'll create a visual security story. Here's the scenario: The operations manager, one of the stakeholders we previously discussed, has been informed that the Chief Information Secu...

Wrap-up;Terms and definitions from Course 8, Module 3

[Completed] Professional Google Cyberse...

You've had an opportunity to learn about the important role stakeholders play and different ways to communicate with them.Let's review what we covered.We started by defining stakeholders and their roles in protecting an organization.We also explored the sensit...

Welcome to module 4 (38% complete)

[Completed] Professional Google Cyberse...

Welcome back!I'm Emily, and I've been working in security education at Google for nearly nine years.My team works closely with our remarkable security experts to craft innovative and engaging educational solutions for our workforce to keep security at the fore...

Helpful cybersecurity resources

[Completed] Professional Google Cyberse...

As we approach the end of our program, it's important to start thinking about ways to engage with the security community.As the industry evolves, it's essential to stay up-to-date on the latest security trends and news.Let's discuss a few good resources for yo...

Strategies for engaging with the cybersecurity community

[Completed] Professional Google Cyberse...

You have learned a lot about the security field, from the origins of security and its importance to organizations around the world to recognizing security incidents and communicating with stakeholders.  Security is a rapidly evolving industry, so it’s importa...

uhhh websites to visit

Anything related to windows

# Define the URLs for the security news websites $csoUrl = "https://www.csoonline.com" $krebsUrl = "https://krebsonsecurity.com" $darkReadingUrl = "https://www.darkreading.com" # Function to fetch and display headlines from a URL function Get-NewsHeadli...

Connect with other cybersecurity professionals

[Completed] Professional Google Cyberse...

You’ve learned the importance of staying engaged with the cybersecurity community after completing this certificate program. The security industry is always evolving, so it’s important that security professionals continue to learn about the field. This readin...

Victoria: Continue your learning journey

[Completed] Professional Google Cyberse...

I'm Victoria, I'm a security engineer at Google.When I first applied for a cybersecurity job, I felt overwhelmed.I was not a traditionally educated in computer science applicant, I actually majored in biology.So anytime a recruiter saw my resume, I would kind ...

Engage with the cybersecurity community in a meaningful way

[Completed] Professional Google Cyberse...

Earlier we discussed the importance of staying up-to-date on security trends and news.In this video, we're going to share ways to establish and advance your career in security by connecting with people who are already in the industry.Social media is a great wa...