Ось це 2-й курс "Play It Safe: Manage Security Risks" за напрямком Google Cybersecurity Professional Certificate на платформі Coursera та за підтримки (2022-2023 UA Prometheus) - успішно завершено.
Google Cybersecurity Professional Certificate - Play It Safe: Manage Security Risks |
About this Course
This is the second course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the first Google Cybersecurity Certificate course.
In this course, you will take a deeper dive into concepts introduced in the first course, with an emphasis on how cybersecurity professionals use frameworks and controls to protect business operations. In particular, you'll identify the steps of risk management and explore common threats, risks, and vulnerabilities. Additionally, you'll explore Security Information and Event Management (SIEM) data and use a playbook to respond to identified threats, risks, and vulnerabilities. Finally, you will take an important step towards becoming a cybersecurity professional and practice performing a security audit.
Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs.
Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary.
By the end of this course, you will:
- Identify the common threats, risks, and vulnerabilities to business operations.
- Understand the threats, risks, and vulnerabilities that entry-level cybersecurity analysts are most focused on.
- Comprehend the purpose of security frameworks and controls.
- Describe the confidentiality, integrity, and availability (CIA) triad.
- Explain the National Institute of Standards and Technology (NIST) framework.
- Explore and practice conducting a security audit.
- Use a playbook to respond to threats, risks, and vulnerabilities.
Немає коментарів:
Дописати коментар