Assets, Threats, and Vulnerabilities


This is the fifth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the fourth Google Cybersecurity Certificate course. In this course, you will explore the concepts of assets, threats, and vulnerabilities. First, you'll build an understanding of how assets are classified. Next, you will become familiar with common threats and vulnerabilities, and the security controls used by organizations to protect valuable information and mitigate risk. You will develop an attacker mindset by practicing the threat modeling process, and you'll learn tactics for staying ahead of security breaches. Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs. Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Learn effective data handling processes. - Discuss the role of encryption and hashing in securing assets. - Describe how to effectively use authentication and authorization. - Explain how common vulnerability exposures are identified by MITRE. - Analyze an attack surface to find risks and vulnerabilities. - Identify threats, such as social engineering, malware, and web-based exploits. - Summarize the threat modeling process.

Certificate Available ✔

Get Started / More Info
Assets, Threats, and Vulnerabilities
More Computer Security and Networks Courses

Blockchain Para a Empresa


Blockchain se posiciona na transformação de toda a indústria e das funções administrativas - redefinindo a maneira como transacionamos online, compartilhamos...

Google Workspace Administration 日本語版

Google Cloud

Google Workspace Administration 専門講座は、組織の管理者が Google Workspace のベストプラクティスを確立して管理するための基礎をマスターできるように作られています。\n\nこの講座で受講者は、新しい...

Cyber Incident Response


The Cyber Incident Response course will give students an understanding of how incidents are responded to at a high level, as well as allow them to build important...

OWASP Top 10 - Risks 6-10


In this course, we will examine Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging...