Assets, Threats, and Vulnerabilities
Offered By: Google via Coursera
Course Description
Overview
This is the fifth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the fourth Google Cybersecurity Certificate course.
In this course, you will explore the concepts of assets, threats, and vulnerabilities. First, you'll build an understanding of how assets are classified. Next, you will become familiar with common threats and vulnerabilities, and the security controls used by organizations to protect valuable information and mitigate risk. You will develop an attacker mindset by practicing the threat modeling process, and you'll learn tactics for staying ahead of security breaches.
Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs.
Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary.
By the end of this course, you will:
- Learn effective data handling processes.
- Discuss the role of encryption and hashing in securing assets.
- Describe how to effectively use authentication and authorization.
- Explain how common vulnerability exposures are identified by MITRE.
- Analyze an attack surface to find risks and vulnerabilities.
- Identify threats, such as social engineering, malware, and web-based exploits.
- Summarize the threat modeling process.
Syllabus
- Introduction to asset security
- You will be introduced to how organizations determine what assets to protect. You'll learn about the connection between managing risk and classifying assets by exploring the unique challenge of securing physical and digital assets. You'll also be introduced to the National Institute of Standards and Technology (NIST) framework standards, guidelines and best practices to manage cybersecurity risk.
- Protect organizational assets
- You will focus on security controls that protect organizational assets. You'll explore how privacy impacts asset security and understand the role that encryption plays in maintaining the privacy of digital assets. You'll also explore how authentication and authorization systems help verify a user’s identity.
- Vulnerabilities in systems
- You will build an understanding of the vulnerability management process. You'll learn about common vulnerabilities and develop an attacker mindset by examining the ways vulnerabilities can become threats to asset security if they are exploited.
- Threats to asset security
- You will explore common types of threats to digital asset security. You'll also examine the tools and techniques used by cybercriminals to target assets. In addition, you'll be introduced to the threat modeling process and learn ways security professionals stay ahead of security breaches.
Taught by
Google Career Certificates
Tags
Related Courses
Google Cloud Apigee Certified API EngineerA Cloud Guru Kubernetes Security
A Cloud Guru Learn Angular Routing by building a Cocktails Application
Coursera Project Network via Coursera API Security on Google Cloud's Apigee API Platform
Google Cloud via Coursera API Security on Google Cloud's Apigee API Platform
Google via Google Cloud Skills Boost