Your cart is currently empty!
Google Cybersecurity – Foundations of Cybersecurity
MODULE 1
Course offer thru Coursera
Useful Link:
- Study Group: https://lu.ma/GoogleCareerCertificatesStudyGroup?utm_source=course
- Community: https://www.coursera.support/s/group/0F9VH00000001c10AA/google-cybersecurity-community
- Cybersecurity Glossary: https://docs.google.com/document/d/1Feb8pHRY-blnpaLOohds2esd6IWdCIp-ikG7G_omSj4/template/preview?usp=sharing&resourcekey=0-YHcAISkCiqGDq5KwO6yNeQ
Definition:
Cybersecurity or Security is the practice of ensuring Confidentiality, Integrity, and Availability, often noted as CIA, of information by protecting networks, devices, people and data from unauthorized access or criminal exploitation.
Threat Actor: any person or group who presents security risks. Threat Actors could be internal and external.
Benefits of Security:
- protect against external and internal threats
- meets regulatory compliance, for ex. HIPPA (US) and GDPR (EU)
- maintains and improves business productivity
- reduce expenses
- maintaining brand trust
Common Job Title
- Security analyst or specialist
- Security operation center (SOC) analyst
- Information security analyst
Responsibility of Security Analyst: monitor and protecting information and system, install prevention software, conducting periodic security audits
Common Terms:
- Compliance is the process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches.
- Security frameworks are guidelines used for building plans to help mitigate risks and threats to data and privacy.
- Security controls are safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture.
- Security posture is an organization’s ability to manage its defense of critical assets and data and react to change. A strong security posture leads to lower risk for the organization.
- A threat actor, or malicious attacker, is any person or group who presents a security risk. This risk can relate to computers, applications, networks, and data.
- An internal threat can be a current or former employee, an external vendor, or a trusted partner who poses a security risk. At times, an internal threat is accidental. For example, an employee who accidentally clicks on a malicious email link would be considered an accidental threat. Other times, the internal threat actor intentionally engages in risky activities, such as unauthorized data access.
- Network security is the practice of keeping an organization’s network infrastructure secure from unauthorized access. This includes data, services, systems, and devices that are stored in an organization’s network.
- Cloud security is the process of ensuring that assets stored in the cloud are properly configured, or set up correctly, and access to those assets is limited to authorized users. The cloud is a network made up of a collection of servers or computers that store resources and data in remote physical locations known as data centers that can be accessed via the internet. Cloud security is a growing subfield of cybersecurity that specifically focuses on the protection of data, applications, and infrastructure in the cloud.
- Programming is a process that can be used to create a specific set of instructions for a computer to execute tasks. These tasks can include:
- Automation of repetitive tasks (e.g., searching a list of malicious domains)
- Reviewing web traffic
- Alerting suspicious activity
Core Skills required:
- Transferrable skills: communication, collaboration (diverse perspective), analysis, problem solving, growth mindset (curiosity).
- Technical skills: programming languages (Python, SQL), SIEM tools (security, information, event management), computer forensic, IDS (intrusion detection system), threat landscape knowledge, incident response, Google recommend CompTIA Security Plus certification, They will give 30% discount on the exam and practice materials. link https://www.comptia.org/certifications/security
PII: Personal Identifiable Information is any information use to infer an individual’s identity such as name, phone, address, IP, DOB
SPII: Sensitive Personal Identifiable Information: social security, medical records, biometric data, financial records
Digital Forensic Investigators identify, analyze and preserve criminal evidences within the network, computer and electronic devices
Module 1 Conclusion:
As cybersecurity analysts, our job is to protect the Confidentiality, Integrity and Availability of information, data and system to meet the regulatory compliance, maintain and improve business productivity, reduce expense and maintain branding trust. We protect the system by implementing security policies, educate staff on best practices and raise awareness, monitor network and detect incident and provide response when incidences happened, ensuring network security by setting up intrusion detection system, access control. not only we protect data and system, we also protect people such as identity theft, PPI and SPPI, providing safe online environment, maintain privacy in compliances with regulation such as GDPR, HIPAA.