- Level Foundation
- Duration 25 hours
- Course by Google
-
Offered by
About
This is the second course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the first Google Cybersecurity Certificate course. In this course, you will take a deeper dive into concepts introduced in the first course, with an emphasis on how cybersecurity professionals use frameworks and controls to protect business operations. In particular, you'll identify the steps of risk management and explore common threats, risks, and vulnerabilities. Additionally, you'll explore Security Information and Event Management (SIEM) data and use a playbook to respond to identified threats, risks, and vulnerabilities. Finally, you will take an important step towards becoming a cybersecurity professional and practice performing a security audit. Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs. Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Identify the common threats, risks, and vulnerabilities to business operations. - Understand the threats, risks, and vulnerabilities that entry-level cybersecurity analysts are most focused on. - Comprehend the purpose of security frameworks and controls. - Describe the confidentiality, integrity, and availability (CIA) triad. - Explain the National Institute of Standards and Technology (NIST) framework. - Explore and practice conducting a security audit. - Use a playbook to respond to threats, risks, and vulnerabilities.Modules
Get started with the course
1
Videos
- Introduction to Course 2
2
Readings
- Course 2 overview
- Helpful resources and tips
More about the CISSP security domains
4
Videos
- Welcome to module 1
- Explore the CISSP security domains, Part 1
- Explore the CISSP security domains, Part 2
- Ashley: My path to cybersecurity
1
Readings
- Security domains cybersecurity analysts need to know
1
Quiz
- Test your knowledge: More about the CISSP security domains
Navigate threats, risks, and vulnerabilities
4
Videos
- Threats, risks, and vulnerabilities
- Key impacts of threats, risks, and vulnerabilities
- Herbert: Manage threats, risks, and vulnerabilities
- NIST’s Risk Management Framework
1
Readings
- Manage common threats, risks, and vulnerabilities
1
Quiz
- Test your knowledge: Navigate threats, risks, and vulnerabilities
Review: Security domains
1
Videos
- Wrap-up
1
Readings
- Glossary terms from module 1
1
Quiz
- Module 1 challenge
More about frameworks and controls
3
Videos
- Welcome to module 2
- Frameworks
- Controls
1
Readings
- The relationship between frameworks and controls
1
Quiz
- Test your knowledge: More about frameworks and controls
The CIA triad: Confidentiality, integrity, and availability
1
Videos
- Explore the CIA triad
1
Readings
- Use the CIA triad to protect organizations
1
Quiz
- Test your knowledge: The CIA triad
NIST frameworks
2
Videos
- NIST frameworks
- Explore the five functions of the NIST Cybersecurity Framework
1
Quiz
- Test your knowledge: NIST frameworks
OWASP principles and security audits
4
Videos
- OWASP security principles
- Wajih: Stay up-to-date on the latest cybersecurity threats
- Plan a security audit
- Complete a security audit
3
Readings
- More about OWASP security principles
- More about security audits
- Portfolio Activity Exemplar: Conduct a security audit
2
Quiz
- Test your knowledge: OWASP principles and security audits
- Portfolio Activity: Conduct a security audit
Review: Security frameworks and controls
1
Videos
- Wrap-up
1
Readings
- Glossary terms from module 2
1
Quiz
- Module 2 challenge
Security information and event management (SIEM) dashboards
4
Videos
- Welcome to module 3
- Logs and SIEM tools
- SIEM dashboards
- Parisa: The parallels of accessibility and security
1
Readings
- The future of SIEM tools
1
Quiz
- Test your knowledge: Security information and event management (SIEM) dashboards
Explore security information and event management (SIEM) tools
2
Videos
- Explore common SIEM tools
- Talya: Myths about the cybersecurity field
2
Readings
- More about cybersecurity tools
- Use SIEM tools to protect organizations
1
Quiz
- Test your knowledge: Identify threats and vulnerabilities with SIEM tools
Review: Introduction to cybersecurity tools
1
Videos
- Wrap-up
1
Readings
- Glossary terms from module 3
1
Quiz
- Module 3 challenge
Phases of incident response playbooks
3
Videos
- Welcome to module 4
- Phases of an incident response playbook
- Zack: Incident response and the value of playbooks
1
Readings
- More about playbooks
1
Quiz
- Test your knowledge: Incident response
Explore incident response
2
Videos
- Use a playbook to respond to threats, risks, or vulnerabilities
- Erin: The importance of diversity of perspective on a security team
1
Readings
- Playbooks, SIEM tools, and SOAR tools
1
Quiz
- Test your knowledge: Use a playbook to respond to an incident
Review: Use playbooks to respond to incidents
1
Videos
- Wrap-up
1
Readings
- Glossary terms from module 4
1
Quiz
- Module 4 challenge
Congratulations on completing Course 2!
1
Videos
- Course wrap-up
3
Readings
- Reflect and connect with peers
- Course 2 glossary
- Get started on the next course
Auto Summary
Enhance your cybersecurity skills with "Play It Safe: Manage Security Risks," the second course in the Google Cybersecurity Certificate. Ideal for IT & Computer Science enthusiasts, this foundational course dives deeper into risk management, threats, vulnerabilities, and security frameworks. Guided by Google cybersecurity experts, you'll engage in hands-on activities, video lessons, and practical security audits. With no prior experience required, this 1500-minute course on Coursera equips you for entry-level cybersecurity roles. Available with a Starter subscription, it’s perfect for aspiring cybersecurity professionals.

Google Career Certificates