Google Cybersecurity Action Team: Cybersecurity Essentials
- Offered byCoursera
Google Cybersecurity Action Team: Cybersecurity Essentials at Coursera Overview
Duration | 9 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Google Cybersecurity Action Team: Cybersecurity Essentials at Coursera Highlights
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Coursera Labs Includes hands on learning projects. Learn more about Coursera Labs External Link
- Beginner Level
- Approx. 9 hours to complete
- English Subtitles: English
Google Cybersecurity Action Team: Cybersecurity Essentials at Coursera Course details
- In today's highly connected world, having an understanding of cybersecurity concepts is increasingly important. Business professionals interested in understanding the risk cybersecurity threats pose to their business, look no further! The Google Cybersecurity Action Team: Cybersecurity Essentials course provides an introduction to cybersecurity terminology, principles, and concepts. Throughout the course, you will cover six security domains, and business continuity and disaster response planning topics. The course includes a series of instructor-led demonstrations to provide real-life examples of cybersecurity tasks in action.
Google Cybersecurity Action Team: Cybersecurity Essentials at Coursera Curriculum
Introduction to Cybersecurity
Course Introduction
Module Objectives
Define Cybersecurity
Inspect the CIA Triad
Defend with Security Controls
Control Types Quiz
Reasons for Strong Defenses
Identify Assets To Protect
End User Devices
Match the Terms
Module Summary
Laws, Policies, and Frameworks
Module Objectives
GRC In the Organization
Cybersecurity Roles and Groups
Managing Risk
Match the Terms
Commonly Used Frameworks and Standards
Laws Policies Frameworks Quiz
Module Summary
Threats, Attacks, and Vulnerabilities
Module Objectives
Examining the Elements Of Risk
Demo Using CVE and CWE
Common Vulnerability Scoring System
Lab: Using CVSS to Score a Vulnerability
Identifying Threat Actors
Match the Terms
Inspecting Types Of Attacks
Demo SQL Injection In Action
Cross-site Scripting
Demo Cross-site Scripting in Action
Client-side Attacks
Demo Sniffing Cleartext Credentials with Wireshark
Other Network Attacks
Social Engineering
Threats Attacks and Vulnerabilities Quiz
Module Summary
Cybersecurity Defenses
Module Objectives
Securing the Organization
Authenticating and Authorizing Access
User Security Training
Protecting the Endpoints
Match the Terms
Defending Networks
Lab: Zero Trust in Action
Implementing Secure Applications
Securing the Cloud
Securing Data with Cryptography
Demo Hashing and Collisions
Encryption
Demo Symmetric Key Encryption Using Cryptool
Public Key Encryption
Lab: Asymmetric Encryption to Sign and Verify Data
Cybersecurity Defenses Quiz
Module Summary
Ensuring Organization Security
Module Objectives
Managing Ongoing Risk
Performing Security Assessments
Demo Port Scanning Using Nmap
Vulnerability Scanners
Demo Web Application Scanning Using Vega
Vulnerability Management Lifecycle
Match the Terms
Utilizing Threat Models and Tools
Lab: Exploring ATT&CK from MITRE
Continuous Diagnostics and Mitigation
Ensuring Organization Security Quiz
Module Summary
Summary
Course Summary