We may earn an affiliate commission when you visit our partners.
Course image
Coursera logo

Faire preuve de prudence

gestion des risques de sécurité

Google Career Certificates

Voici le deuxième cours de la Certification en cybersécurité de Google. Ces cours vous permettront d'acquérir les compétences dont vous avez besoin pour postuler à un emploi de niveau débutant dans le domaine de la cybersécurité. Vous vous appuierez sur votre compréhension des sujets qui ont été introduits dans le premier cours de la Certification en cybersécurité de Google.

Read more

Voici le deuxième cours de la Certification en cybersécurité de Google. Ces cours vous permettront d'acquérir les compétences dont vous avez besoin pour postuler à un emploi de niveau débutant dans le domaine de la cybersécurité. Vous vous appuierez sur votre compréhension des sujets qui ont été introduits dans le premier cours de la Certification en cybersécurité de Google.

Dans ce cours, vous approfondirez les concepts présentés dans le premier cours, en mettant l'accent sur la façon dont les professionnels de la cybersécurité utilisent les cadres et les contrôles pour protéger les activités des entreprises. Nous définirons notamment les étapes relatives à la gestion des risques et explorerons les menaces, les risques et les vulnérabilités les plus courants. Par ailleurs, vous découvrirez les données de la gestion des informations et des événements de sécurité (SIEM) et utiliserez un playbook pour répondre aux menaces, aux risques et aux vulnérabilités identifiés. Enfin, vous franchirez une étape importante pour devenir un professionnel de la cybersécurité en vous entraînant à réaliser un audit de sécurité.

Les employés de Google qui travaillent actuellement dans le domaine de la cybersécurité vous guideront à travers des vidéos, des activités pratiques et des exemples qui simulent des tâches courantes de cybersécurité, et vous aideront à développer vos compétences pour vous préparer à l'emploi.

Les participants qui termineront cette certification seront aptes à postuler à des emplois de niveau débutant dans le domaine de la cybersécurité. Aucune expérience préalable n'est nécessaire.

Enroll now

What's inside

Syllabus

Domaines de sécurité
Découvrez les huit domaines de sécurité de la certification CISSP. Les principales menaces et vulnérabilités, ainsi que les principaux risques qui pèsent sur les activités des entreprises vous seront également présentés. Enfin, vous explorerez le Risk Management Framework (RMF) de l’Institut national des normes et de la technologie (NIST) ainsi que les étapes relatives à la gestion des risques.
Read more
Cadres et contrôles de sécurité
Vous allez vous concentrer sur les cadres et les contrôles de sécurité, ainsi que sur les principaux composants de la triade confidentialité, intégrité et disponibilité (CIA). Vous découvrirez les principes de sécurité et les audits de sécurité de l'OWASP (Open Web Application Security Project).
Introduction aux outils de cybersécurité
Vous allez explorer les principaux outils de gestion des informations et des événements de sécurité (Security Information and Event Management - SIEM) utilisés par les experts en sécurité pour protéger les activités des entreprises. Vous apprendrez comment les analystes sécurité débutants utilisent les tableaux de bord SIEM dans le cadre de leur travail quotidien.
Utiliser des playbooks pour répondre aux incidents
Vous allez apprendre les objectifs des playbooks et leurs utilisations courantes. Vous découvrirez également comment les experts en cybersécurité utilisent les playbooks pour répondre aux menaces, aux risques et aux vulnérabilités identifiés.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Développe des compétences très recherchées sur le marché du travail
Approfondit les concepts enseignés dans le premier cours de la Certification en cybersécurité de Google
Inclut des vidéos, des activités pratiques et des exemples qui simulent des tâches courantes de cybersécurité
Se concentre sur les cadres et les contrôles de sécurité, ainsi que sur les principaux composants de la triade confidentialité, intégrité et disponibilité (CIA)
Explore les menaces, les risques et les vulnérabilités les plus courants
N'exige aucune expérience préalable

Save this course

Save Faire preuve de prudence : gestion des risques de sécurité to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Faire preuve de prudence : gestion des risques de sécurité. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Faire preuve de prudence : gestion des risques de sécurité will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts help protect an organization's computer networks and systems. They do this by identifying security risks and vulnerabilities, and then developing and implementing security measures to mitigate these risks. By taking the course, you will develop your understanding of security concepts and learn to use tools and techniques to protect against cyber threats, making you a competitive candidate for entry-level roles.
Cybersecurity Analyst
Cybersecurity Analysts protect computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course will provide you with a strong foundation in cybersecurity concepts and will teach you how to identify and mitigate security risks, making you a competitive candidate for entry-level roles as a Cybersecurity Analyst.
Systems Security Administrator
Systems Security Administrators are responsible for securing computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. By taking this course, you can learn how to identify and mitigate security risks, and gain a strong foundation in cybersecurity concepts, making you a competitive candidate for entry-level Systems Security Administrator roles.
Security Engineer
Security Engineers design, implement, and manage security solutions to protect an organization's computer networks and systems. Taking this course will help you develop the skills and knowledge necessary to protect against cyber threats, and will teach you to identify and mitigate vulnerabilities and risks, making you a more competitive candidate for entry-level Security Engineer roles.
Network Security Engineer
Network Security Engineers design, implement, and manage security controls to protect computer networks. By understanding the principles and practices of network security, you will learn how to identify and mitigate network security risks, making you a more competitive candidate for entry-level Network Security Engineer roles.
Security Architect
Security Architects design, implement, and manage security architectures to protect an organization's computer networks and systems. Learning how to identify and mitigate security risks and vulnerabilities will help you be a more competitive candidate for entry-level Security Architect roles.
Security Consultant
Security Consultants help organizations identify and mitigate security risks. By taking this course, you will learn how to identify and mitigate security risks, making you a more competitive candidate for entry-level Security Consultant roles.
Incident Responder
Incident Responders are responsible for responding to and mitigating security incidents. This course will teach you the skills you need to identify and mitigate security risks, and will help you develop your incident response skills, making you a more competitive candidate for entry-level Incident Responder roles.
Risk Analyst
Risk Analysts identify and assess risks to an organization's computer networks and systems. By understanding the principles and practices of risk management, you will learn how to write security policies and procedures, making you a more competitive candidate for entry-level Risk Analyst roles.
Cloud Security Engineer
Cloud Security Engineers design, implement, and manage security solutions for cloud computing environments. Understanding the principles and practices of cloud security will give you a solid foundation in cloud security and make you a more competitive candidate for entry-level Cloud Security Engineer roles.
Compliance Analyst
Compliance Analysts ensure that an organization complies with security regulations. By learning the principles and practices of security compliance, you will learn how to develop and implement security policies and procedures, making you a more competitive candidate for entry-level Compliance Analyst roles.
Security Manager
Security Managers are responsible for managing an organization's security program. By learning the principles and practices of information security management, you will learn how to develop and implement security policies and procedures, making you a more competitive candidate for entry-level Security Manager roles.
CISO
CISOs are responsible for overseeing an organization's security program. Learning the principles and practices of information security management will give you a strong foundation in cybersecurity and make you a more competitive candidate for entry-level CISO roles.
IT Director
IT Directors are responsible for managing an organization's IT infrastructure. Understanding the principles and practices of information technology management will give you a foundation in information management and make you a more competitive candidate for entry-level IT Director roles.
Data Privacy Analyst
Data Privacy Analysts help organizations protect the privacy of their data. By understanding the principles and practices of data privacy, you will learn how to develop and implement data privacy policies and procedures, making you a more competitive candidate for entry-level Data Privacy Analyst roles.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Faire preuve de prudence : gestion des risques de sécurité.
Provides a comprehensive guide to the CISSP certification, covering topics such as security assessment, risk management, and incident response. It also includes practice questions and exercises to help candidates prepare for the exam.
Provides a comprehensive guide to enterprise security risk management, covering topics such as risk assessment, risk mitigation, and security governance. It also includes case studies and exercises to help organizations implement an effective security risk management program.
Provides a detailed overview of the OWASP Top 10, a list of the most critical web application security risks. It covers each risk in depth, including its impact, likelihood, and mitigation strategies.
Provides a comprehensive guide to security engineering, covering topics such as threat modeling, secure software development, and cloud security. It also includes case studies and exercises to help readers apply their knowledge.
Provides a comprehensive guide to cryptography and network security, covering topics such as encryption, authentication, and network security protocols. It also includes case studies and exercises to help readers apply their knowledge.
Provides a comprehensive guide to incident response and computer forensics, covering topics such as incident investigation, evidence collection, and forensics analysis. It also includes case studies and exercises to help readers apply their knowledge.
Provides a unique perspective on security by focusing on the human element. It covers topics such as social engineering, phishing, and identity theft. It also includes case studies and exercises to help readers understand the threats and how to mitigate them.
Provides a comprehensive guide to hacking, covering topics such as reconnaissance, exploitation, and post-exploitation. It also includes case studies and exercises to help readers understand the threats and how to mitigate them.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Faire preuve de prudence : gestion des risques de sécurité.
Application : se préparer aux métiers de la cybersécurité
Most relevant
Ressources numériques, menaces et vulnérabilités
Most relevant
Fondamentaux de la cybersécurité
Most relevant
Automatiser les tâches de cybersécurité avec Python
Most relevant
Les outils du métier : Linux et SQL
Most relevant
Tirer la sonnette d'alarme : détection et réponse
Most relevant
Connecter et protéger : réseaux et sécurité des réseaux
Most relevant
Les coulisses des systèmes de recommandation
Most relevant
Création de designs et de prototypes haute fidélité dans...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser