We may earn an affiliate commission when you visit our partners.
Course image
Google Career Certificates

Google サイバーセキュリティ プロフェッショナル認定証の 5 つめのコースです。各コースでは初級サイバーセキュリティの職に必要なスキルを身につけることができます。

Read more

Google サイバーセキュリティ プロフェッショナル認定証の 5 つめのコースです。各コースでは初級サイバーセキュリティの職に必要なスキルを身につけることができます。

このコースではアセット、脅威、脆弱性の概念について学びます。まず、アセットがどのように分類されるのかについて理解を深めます。次に、一般的な脅威と脆弱性、貴重な情報を保護し、リスクを軽減するために組織が使用しているセキュリティ コントロールについて理解します。さらに脅威モデリング プロセスの実践を通じて、攻撃者の考え方を身につけ、セキュリティ侵害を未然に防ぐための対策を学びます。

サイバーセキュリティの分野で働いている現職の Google 社員が最適なツールやリソースを使って一般的なサイバーセキュリティの業務を遂行する実践的な方法を指導します。また就職活動への準備も手助けします。

この認定プログラムを修了すると、エントリーレベルのサイバーセキュリティの職に応募できるようになります。過去の業務経験は不要です。

Enroll now

What's inside

Syllabus

入門編:アセットのセキュリティ
ここでは、組織が守るべきアセットをどのように決定しているかを学びます。デジタル アセット・物理的アセットのセキュリティという特殊な課題を探ることで、リスクのマネジメントと資産の分類の関連性を学んでいきます。また、サイバーセキュリティのリスクを管理するための米国立標準技術研究所(NIST)のフレームワークの基準やガイドライン、ベストプラクティスについてもご紹介します。
Read more
組織のアセットを守る
ここでは、組織のアセットを守るセキュリティコントロールに焦点を当てます。プライバシーが資産のセキュリティにどのような影響を与えるかを探るとともに、デジタル資産のプライバシーを維持するために暗号化が果たす役割について理解します。また、情報システムの運用認可がどのようにユーザーの身元確認に役立っているのかについても学んでいきます。
システムにおける脆弱性
ここでは、脆弱性を管理するプロセスについて理解を深めます。一般的な脆弱性について理解し、脆弱性が悪用された場合に資産のセキュリティに対する脅威となりうる方法を検討することで、攻撃者の考え方を学びます。
アセットのセキュリティに対する脅威
ここでは、デジタル資産のセキュリティを脅かす一般的な脅威の種類を探ります。また、サイバー犯罪者がアセットを狙うために使用するツールやテクニックについても考察します。さらに、脅威モデリング プロセスを紹介し、セキュリティの職がセキュリティ侵害に先手を打つ方法についても学んでいきます。

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
入門編:アセットのセキュリティ
組織のアセットを守る
システムにおける脆弱性
アセットのセキュリティに対する脅威

Save this course

Save 5. アセット、脅威、そして脆弱性 to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in 5. アセット、脅威、そして脆弱性 with these activities:
Review Security Definition and Concepts
Refreshes the core security definitions and concepts you will learn in this course to help build a strong foundation for understanding the material.
Browse courses on Security Fundamentals
Show steps
  • Read the following article: 'What is Cybersecurity?' by TechTarget
  • Watch the following video: 'Cybersecurity 101: What is Cybersecurity?' by Pluralsight
  • Review your notes from any previous cybersecurity courses you have taken
  • Take a practice quiz on basic security concepts
Review network fundamentals
Refreshes network fundamentals to ensure a clear understanding of the foundational components of cybersecurity.
Browse courses on Network Fundamentals
Show steps
  • Review OSI model and its layers
  • Understand the protocols associated with each layer, such as TCP/IP
  • Identify common network devices and their functions
Learn About NIST Cybersecurity Framework
Provides a deeper understanding of the NIST Cybersecurity Framework, which is essential for understanding the best practices and standards used in the industry.
Show steps
  • Read the NIST Cybersecurity Framework Overview
  • Watch a video tutorial on the NIST Cybersecurity Framework
  • Complete an online course or training on the NIST Cybersecurity Framework
Nine other activities
Expand to see all activities and additional details
Show all 12 activities
Review concepts of assets
Revisiting concepts of asset classification can help you understand how organizations identify and secure their valuable assets.
Browse courses on Security Management
Show steps
  • Recall the different types of assets organizations have
  • Consider the challenges of securing digital assets
Complete exercises on security controls
Engaging in practice drills can enhance your understanding of the various security controls organizations implement to protect their assets.
Browse courses on Security Controls
Show steps
  • Identify different types of security controls
  • Analyze how security controls mitigate risks
Practice Recognizing Vulnerabilities
Develops your ability to identify and classify vulnerabilities, a crucial skill for cybersecurity professionals.
Browse courses on Vulnerability Management
Show steps
  • Use a vulnerability scanner to scan a sample system
  • Analyze the scan results and identify potential vulnerabilities
  • Classify the vulnerabilities based on their severity and impact
  • Recommend appropriate remediation measures for each vulnerability
Learn about encryption and user identification
Exploring tutorials on encryption and user identification can provide valuable insights into how organizations protect sensitive information and ensure data integrity.
Browse courses on Encryption
Show steps
  • Research different encryption algorithms
  • Examine techniques for user identification
Practice identifying common vulnerabilities
Completing practice exercises will reinforce your understanding of common vulnerabilities and how to identify them in real-world scenarios.
Browse courses on Vulnerability Assessment
Show steps
  • Review examples of software vulnerabilities
  • Analyze the impact of vulnerabilities on system security
  • Practice using tools for vulnerability scanning
Develop a Threat Model for a Sample Application
Enhances your understanding of threat modeling by applying it to a practical scenario, enabling you to identify and mitigate potential threats to a system.
Browse courses on Threat Modeling
Show steps
  • Identify the assets and stakeholders of the application
  • Analyze the potential threats to the application
  • Develop a threat model that documents the threats and their potential impact
  • Recommend countermeasures to mitigate the threats
Develop a threat model for a given scenario
Creating a threat model will help you identify potential threats to a system and develop countermeasures to mitigate risks.
Browse courses on Threat Modeling
Show steps
  • Identify the assets that need protection
  • Analyze potential threats and vulnerabilities
  • Develop a mitigation plan to address identified threats
  • Evaluate the effectiveness of the mitigation plan
Attend a Cybersecurity Workshop
Provides an opportunity to learn from experts, network with other professionals, and gain hands-on experience in a structured workshop environment.
Show steps
  • Research and identify relevant cybersecurity workshops
  • Register for and attend the workshop
  • Actively participate in the workshop activities and discussions
  • Follow up with the workshop organizers or speakers to continue learning
Join a Cybersecurity Study Group
Creates opportunities for collaborative learning, where you can share knowledge, ask questions, and work together to solve cybersecurity challenges.
Show steps
  • Find or form a study group with other cybersecurity learners
  • Establish regular meeting times and a study schedule
  • Collaborate on assignments, practice exercises, and mock interviews
  • Provide feedback and support to group members

Career center

Learners who complete 5. アセット、脅威、そして脆弱性 will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
An Information Security Analyst is responsible for protecting an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. They investigate and respond to security incidents, and develop and implement security policies and procedures. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Risk Analyst
A Risk Analyst assesses the risks to an organization's computer networks and systems. They identify and prioritize risks, and recommend solutions to mitigate these risks. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Security Engineer
A Security Engineer designs, implements, and maintains security systems and solutions. They work with other IT professionals to ensure that an organization's computer networks and systems are protected from security threats. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Cybersecurity Analyst
A Cybersecurity Analyst monitors and analyzes an organization's security systems and data for security threats. They investigate security incidents and recommend solutions. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to protect their computer networks and systems from security threats. They assess an organization's security posture, identify vulnerabilities, and recommend solutions. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Incident Responder
An Incident Responder responds to security incidents and helps to mitigate their impact. They work with other IT professionals to restore an organization's systems and data to a secure state. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Compliance Manager
A Compliance Manager ensures that an organization's security systems and processes are compliant with applicable laws and regulations. They work with other IT professionals to implement and maintain compliance programs. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Penetration Tester
A Penetration Tester simulates attacks on an organization's computer networks and systems to identify vulnerabilities. They provide recommendations on how to fix these vulnerabilities. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Security Architect
A Security Architect designs and implements security solutions for an organization's computer networks and systems. They work with other IT professionals to ensure that an organization's security posture is aligned with its business goals. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Vulnerability Manager
A Vulnerability Manager identifies and tracks vulnerabilities in an organization's computer networks and systems. They work with other IT professionals to prioritize vulnerabilities and develop remediation plans. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Forensic Investigator
A Forensic Investigator investigates computer crimes and provides expert testimony in court. They use their knowledge of computer systems and networks to analyze evidence and identify the perpetrators of cybercrimes. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Threat Intelligence Analyst
A Threat Intelligence Analyst collects and analyzes information about security threats. They use this information to develop threat reports and provide recommendations on how to protect an organization's computer networks and systems. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Security Auditor
A Security Auditor reviews an organization's security systems and processes to identify vulnerabilities and recommend improvements. They work with other IT professionals to ensure that an organization's security posture is aligned with its business goals. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Cybersecurity Architect
A Cybersecurity Architect designs and implements security solutions for an organization's computer networks and systems. They work with other IT professionals to ensure that an organization's security posture is aligned with its business goals. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Security Operations Manager
A Security Operations Manager oversees the day-to-day operations of an organization's security program. They are responsible for ensuring that the organization's security systems and processes are effective and efficient. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in 5. アセット、脅威、そして脆弱性.
暗号化の基礎から応用までを網羅した教科書。デジタル資産の保護や、サイバー攻撃からの防御に用いる暗号化技術をより深く理解するのに役立ちます。
コンピュータセキュリティに関する標準的な教科書。暗号化、アクセス制御、ネットワークセキュリティなど、基本的な概念から高度なトピックまでを網羅しています。
ネットワーク侵入検知システム(IDS)の仕組みや導入方法について解説した書籍。アセットを脅威から守るセキュリティ対策の一環として、IDSの役割を理解するのに役立ちます。
ソーシャルエンジニアリングやハッキングのテクニックに焦点を当てた書籍。人間の心理を活用してセキュリティを侵害する手法を学び、防御対策を検討できます。
セキュリティ侵害時の対応とコンピューターフォレンジックに関する教科書。被害の特定と軽減、証拠の収集と分析の手順を学ぶことができます。

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to 5. アセット、脅威、そして脆弱性.
8. 実践編:サイバーセキュリティ関連の職に就く準備
Most relevant
4. ツールを使いこなす:Linux と SQL
Most relevant
7. Python を使ったサイバーセキュリティ タスクの自動化
Most relevant
3. つなぎ、守る:ネットワークとネットワーク セキュリティ
Most relevant
2. 安心を担う: セキュリティリスクの管理
Most relevant
6. 警告を発する: 検知と対応
Most relevant
1.基礎知識:サイバーセキュリティとは
Most relevant
2. データに基づいた意思決定を行うための問いかけ
Most relevant
7. データ分析とR 言語
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser