Play It Safe: Manage Security Risks
- Offered byCoursera
Play It Safe: Manage Security Risks at Coursera Overview
Duration | 12 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Play It Safe: Manage Security Risks at Coursera Highlights
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Coursera Labs Includes hands on learning projects. Learn more about Coursera Labs External Link
- Beginner Level
- Approx. 12 hours to complete
- English Subtitles: English
Play It Safe: Manage Security Risks at Coursera Course details
- This is the second course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the first Google Cybersecurity Certificate course.
- In this course, you will take a deeper dive into concepts introduced in the first course, with an emphasis on how cybersecurity professionals use frameworks and controls to protect business operations. In particular, you'll identify the steps of risk management and explore common threats, risks, and vulnerabilities. Additionally, you'll explore Security Information and Event Management (SIEM) data and use a playbook to respond to identified threats, risks, and vulnerabilities. Finally, you will take an important step towards becoming a cybersecurity professional and practice performing a security audit.
- Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs.
- Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary.
- By the end of this course, you will:
- - Identify the common threats, risks, and vulnerabilities to business operations.
- - Understand the threats, risks, and vulnerabilities that entry-level cybersecurity analysts are most focused on.
- - Comprehend the purpose of security frameworks and controls.
- - Describe the confidentiality, integrity, and availability (CIA) triad.
- - Explain the National Institute of Standards and Technology (NIST) framework.
- - Explore and practice conducting a security audit.
- - Use a playbook to respond to threats, risks, and vulnerabilities.
Play It Safe: Manage Security Risks at Coursera Curriculum
Security domains
Introduction to Course 2
Welcome to week 1
Explore the CISSP security domains, Part 1
Explore the CISSP security domains, Part 2
Ashley: My path to cybersecurity
Threats, risks, and vulnerabilities
Key impacts of threats, risks, and vulnerabilities
Herbert: Manage threats, risks, and vulnerabilities
NIST’s Risk Management Framework
Wrap-up
Course 2 overview
Helpful resources and tips
Security domains cybersecurity analysts need to know
Manage common threats, risks, and vulnerabilities
Glossary terms from week 1
Test your knowledge: More about the CISSP security domains
Test your knowledge: Navigate threats, risks, and vulnerabilities
Weekly challenge 1
Security frameworks and controls
Welcome to week 2
Frameworks
Controls
Explore the CIA triad
NIST frameworks
Explore the five functions of the NIST Cybersecurity Framework
OWASP security principles
Wajih: Stay up-to-date on the latest cybersecurity threats
Plan a security audit
Complete a security audit
Wrap-up
The relationship between frameworks and controls
Use the CIA triad to protect organizations
More about OWASP security principles
More about security audits
Portfolio Activity Exemplar: Conduct a security audit, Part 1
Portfolio Activity Exemplar: Conduct a security audit, Part 2
Glossary terms from week 2
Test your knowledge: More about frameworks and controls
Test your knowledge: The CIA triad
Test your knowledge: NIST frameworks
Test your knowledge: OWASP principles and security audits
Portfolio Activity: Conduct a security audit, Part 1
Portfolio Activity: Conduct a security audit, Part 2
Weekly challenge 2
Introduction to cybersecurity tools
Welcome to week 3
Logs and SIEM tools
SIEM dashboards
Parisa: The parallels of accessibility and security
Explore common SIEM tools
Talya: Myths about the cybersecurity field
Wrap-up
The future of SIEM tools
More about cybersecurity tools
Use SIEM tools to protect organizations
Glossary terms from week 3
Test your knowledge: Security information and event management (SIEM) dashboards
Test your knowledge: Identify threats and vulnerabilities with SIEM tools
Weekly challenge 3
Use playbooks to respond to incidents
Welcome to week 4
Phases of an incident response playbook
Use a playbook to respond to threats, risks, or vulnerabilities
Erin: The importance of diversity of perspective on a security team
Wrap-up
Course wrap-up
More about playbooks
Playbooks, SIEM tools, and SOAR tools
Glossary terms from week 4
Course 2 glossary
Get started on the next course
Test your knowledge: Incident response
Test your knowledge: Use a playbook to respond to an incident
Weekly challenge 4