- Level Foundation
- المدة 26 ساعات hours
- الطبع بواسطة Google
-
Offered by
عن
This is the fifth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the fourth Google Cybersecurity Certificate course. In this course, you will explore the concepts of assets, threats, and vulnerabilities. First, you'll build an understanding of how assets are classified. Next, you will become familiar with common threats and vulnerabilities, and the security controls used by organizations to protect valuable information and mitigate risk. You will develop an attacker mindset by practicing the threat modeling process, and you'll learn tactics for staying ahead of security breaches. Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs. Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Learn effective data handling processes. - Discuss the role of encryption and hashing in securing assets. - Describe how to effectively use authentication and authorization. - Explain how common vulnerability exposures are identified by MITRE. - Analyze an attack surface to find risks and vulnerabilities. - Identify threats, such as social engineering, malware, and web-based exploits. - Summarize the threat modeling process.الوحدات
Get started with the course
2
Videos
- Introduction to Course 5
- Da'Queshia: My path to cybersecurity
2
Readings
- Course 5 overview
- Helpful resources and tips
Introduction to assets
4
Videos
- Welcome to module 1
- The what, why, and how of asset security
- Tri: Life in asset security
- Security starts with asset classification
3
Readings
- Understand risks, threats, and vulnerabilities
- Common classification requirements
- Activity Exemplar: Classify the assets connected to a home network
2
Quiz
- Test your knowledge: Introduction to assets
- Activity: Classify the assets connected to a home network
Digital and physical assets
1
Videos
- Assets in a digital world
1
Readings
- The emergence of cloud security
1
Quiz
- Test your knowledge: Digital and physical assets
Risk and asset security
2
Videos
- Elements of a security plan
- The NIST Cybersecurity Framework
2
Readings
- Security guidelines in action
- Activity Exemplar: Score risks based on their likelihood and severity
2
Quiz
- Test your knowledge: Risk and asset security
- Activity: Score risks based on their likelihood and severity
Review: Introduction to asset security
1
Videos
- Wrap-up
1
Readings
- Glossary terms from module 1
1
Quiz
- Module 1 challenge
Safeguard information
3
Videos
- Welcome to module 2
- Security controls
- Heather: The importance of protecting PII
4
Readings
- Principle of least privilege
- The data lifecycle
- Information privacy: Regulations and compliance
- Activity Exemplar: Determine appropriate data handling practices
2
Quiz
- Activity: Determine appropriate data handling practices
- Test your knowledge: Safeguard information
Encryption methods
4
External Tool
- Activity: Decrypt an encrypted message
- Optional Exemplar: Decrypt an encrypted message
- Activity: Create hash values
- Optional Exemplar: Create hash values
3
Videos
- Fundamentals of cryptography
- Public key infrastructure
- Non-repudiation and hashing
4
Readings
- Symmetric and asymmetric encryption
- Resources for completing labs
- Lab tips and troubleshooting steps
- The evolution of hash functions
1
Quiz
- Test your knowledge: Encryption methods
Authentication, authorization, and accounting
4
Videos
- Access controls and authentication systems
- The mechanisms of authorization
- Why we audit user activity
- Tim: Finding purpose in protecting assets
3
Readings
- The rise of SSO and MFA
- Identity and access management
- Activity Exemplar: Improve authentication and authorization for a small business
2
Quiz
- Activity: Improve authentication, authorization, and accounting for a small business
- Test your knowledge: Authentication, authorization, and accounting
Review: Protect organizational assets
1
Videos
- Wrap-up
1
Readings
- Glossary terms from module 2
1
Quiz
- Module 2 challenge
Flaws in the system
4
Videos
- Welcome to module 3
- Vulnerability management
- Defense in depth strategy
- Common vulnerabilities and exposures
2
Readings
- The OWASP Top 10
- Open source intelligence
1
Quiz
- Test your knowledge: Flaws in the system
Identify system vulnerabilities
2
Videos
- Vulnerability assessments
- Omad: My learning journey into cybersecurity
4
Readings
- Approaches to vulnerability scanning
- The importance of updates
- Penetration testing
- Portfolio Activity Exemplar: Analyze a vulnerable system for a small business
2
Quiz
- Test your knowledge: Identify system vulnerabilities
- Portfolio Activity: Analyze a vulnerable system for a small business
Cyber attacker mindset
3
Videos
- Protect all entry points
- Niru: Adopt an attacker mindset
- Pathways through defenses
4
Readings
- Approach cybersecurity with an attacker mindset
- Types of threat actors
- Fortify against brute force cyber attacks
- Activity Exemplar: Identify the attack vectors of a USB drive
3
Quiz
- Self-reflection: Approach cybersecurity with an attacker mindset
- Activity: Identify the attack vectors of a USB drive
- Test your knowledge: Cyber attacker mindset
Review: Vulnerabilities in systems
1
Videos
- Wrap-up
1
Readings
- Glossary terms from module 3
1
Quiz
- Module 3 challenge
Social engineering
3
Videos
- Welcome to module 4
- The criminal art of persuasion
- Phishing for information
2
Readings
- Social engineering tactics
- Types of phishing
2
Quiz
- Test your knowledge: Social engineering
- Activity: Filter malicious emails
Malware
2
Videos
- Malicious software
- The rise of cryptojacking
1
Readings
- An introduction to malware
1
Quiz
- Test your knowledge: Malware
Web-based exploits
2
Videos
- Cross-site scripting (XSS)
- Exploitable gaps in databases
1
Readings
- Prevent injection attacks
1
Quiz
- Test your knowledge: Web-based exploits
Threat modeling
3
Videos
- A proactive approach to security
- Chantelle: The value of diversity in cybersecurity
- PASTA: The Process for Attack Simulation and Threat Analysis
2
Readings
- Traits of an effective threat model
- Activity Exemplar: Apply the PASTA threat model framework
2
Quiz
- Activity: Apply the PASTA threat model framework
- Test your knowledge: Threat modeling
Review: Threats in cybersecurity
1
Videos
- Wrap-up
1
Readings
- Glossary terms from module 4
1
Quiz
- Module 4 challenge
Congratulations on completing course 5
1
Videos
- Course wrap-up
3
Readings
- Reflect and connect with peers
- Course 5 glossary
- Get started on the next course
Auto Summary
Explore the fundamentals of cybersecurity with the "Assets, Threats, and Vulnerabilities" course, part of the Google Cybersecurity Certificate series. This foundational course, guided by Google cybersecurity professionals, covers asset classification, common threats, and security controls. Through engaging videos and hands-on activities, you'll learn to identify vulnerabilities, use encryption, and perform threat modeling. Perfect for beginners, this course prepares you for entry-level cybersecurity roles. Available on Coursera with flexible subscription options, it offers comprehensive training in just 1560 minutes. Ideal for IT and Computer Science enthusiasts aiming to secure valuable information and mitigate risks effectively.

Google Career Certificates