Course
Computer Science, Computer Security and Networks, Information Technology, Security
Continuing Education

Play It Safe: Manage Security Risks

11.94 Hours

Estimated learning time

Self-Paced

Progress at your own speed

Popular course

A popular course among students

About the Course

Description

This is the second course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the first Google Cybersecurity Certificate course.

In this course, you will take a deeper dive into concepts introduced in the first course, with an emphasis on how cybersecurity professionals use frameworks and controls to protect business operations. In particular, you'll identify the steps of risk management and explore common threats, risks, and vulnerabilities. Additionally, you'll explore Security Information and Event Management (SIEM) data and use a playbook to respond to identified threats, risks, and vulnerabilities. Finally, you will take an important step towards becoming a cybersecurity professional and practice performing a security audit.

Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs.

Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary.

By the end of this course, you will:

  • Identify the common threats, risks, and vulnerabilities to business operations.
  • Understand the threats, risks, and vulnerabilities that entry-level cybersecurity analysts are most focused on.
  • Comprehend the purpose of security frameworks and controls.
  • Describe the confidentiality, integrity, and availability (CIA) triad.
  • Explain the National Institute of Standards and Technology (NIST) framework.
  • Explore and practice conducting a security audit.
  • Use a playbook to respond to threats, risks, and vulnerabilities.

This Course is part of a program

You can only buy it along with program.

Sections

Schedule

Asynchronous

Delivery method

Online

Deliverables

  • 0 Credits

    Academic Excellence

    Earn necessary number of credit hours for completing this content