We may earn an affiliate commission when you visit our partners.
Course image
Coursera logo

5. アセット、脅威、そして脆弱性

Google Career Certificates

Google サイバーセキュリティ プロフェッショナル認定証の 5 つめのコースです。各コースでは初級サイバーセキュリティの職に必要なスキルを身につけることができます。

Read more

Google サイバーセキュリティ プロフェッショナル認定証の 5 つめのコースです。各コースでは初級サイバーセキュリティの職に必要なスキルを身につけることができます。

このコースではアセット、脅威、脆弱性の概念について学びます。まず、アセットがどのように分類されるのかについて理解を深めます。次に、一般的な脅威と脆弱性、貴重な情報を保護し、リスクを軽減するために組織が使用しているセキュリティ コントロールについて理解します。さらに脅威モデリング プロセスの実践を通じて、攻撃者の考え方を身につけ、セキュリティ侵害を未然に防ぐための対策を学びます。

サイバーセキュリティの分野で働いている現職の Google 社員が最適なツールやリソースを使って一般的なサイバーセキュリティの業務を遂行する実践的な方法を指導します。また就職活動への準備も手助けします。

この認定プログラムを修了すると、エントリーレベルのサイバーセキュリティの職に応募できるようになります。過去の業務経験は不要です。

Enroll now

What's inside

Syllabus

入門編:アセットのセキュリティ
ここでは、組織が守るべきアセットをどのように決定しているかを学びます。デジタル アセット・物理的アセットのセキュリティという特殊な課題を探ることで、リスクのマネジメントと資産の分類の関連性を学んでいきます。また、サイバーセキュリティのリスクを管理するための米国立標準技術研究所(NIST)のフレームワークの基準やガイドライン、ベストプラクティスについてもご紹介します。
Read more
組織のアセットを守る
ここでは、組織のアセットを守るセキュリティコントロールに焦点を当てます。プライバシーが資産のセキュリティにどのような影響を与えるかを探るとともに、デジタル資産のプライバシーを維持するために暗号化が果たす役割について理解します。また、情報システムの運用認可がどのようにユーザーの身元確認に役立っているのかについても学んでいきます。
システムにおける脆弱性
ここでは、脆弱性を管理するプロセスについて理解を深めます。一般的な脆弱性について理解し、脆弱性が悪用された場合に資産のセキュリティに対する脅威となりうる方法を検討することで、攻撃者の考え方を学びます。
アセットのセキュリティに対する脅威
ここでは、デジタル資産のセキュリティを脅かす一般的な脅威の種類を探ります。また、サイバー犯罪者がアセットを狙うために使用するツールやテクニックについても考察します。さらに、脅威モデリング プロセスを紹介し、セキュリティの職がセキュリティ侵害に先手を打つ方法についても学んでいきます。

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
入門編:アセットのセキュリティ
組織のアセットを守る
システムにおける脆弱性
アセットのセキュリティに対する脅威

Save this course

Save 5. アセット、脅威、そして脆弱性 to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for 5. アセット、脅威、そして脆弱性. These are activities you can do either before, during, or after a course.

Career center

Learners who complete 5. アセット、脅威、そして脆弱性 will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
An Information Security Analyst is responsible for protecting an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. They investigate and respond to security incidents, and develop and implement security policies and procedures. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Risk Analyst
A Risk Analyst assesses the risks to an organization's computer networks and systems. They identify and prioritize risks, and recommend solutions to mitigate these risks. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Security Engineer
A Security Engineer designs, implements, and maintains security systems and solutions. They work with other IT professionals to ensure that an organization's computer networks and systems are protected from security threats. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Cybersecurity Analyst
A Cybersecurity Analyst monitors and analyzes an organization's security systems and data for security threats. They investigate security incidents and recommend solutions. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to protect their computer networks and systems from security threats. They assess an organization's security posture, identify vulnerabilities, and recommend solutions. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Incident Responder
An Incident Responder responds to security incidents and helps to mitigate their impact. They work with other IT professionals to restore an organization's systems and data to a secure state. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Compliance Manager
A Compliance Manager ensures that an organization's security systems and processes are compliant with applicable laws and regulations. They work with other IT professionals to implement and maintain compliance programs. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Penetration Tester
A Penetration Tester simulates attacks on an organization's computer networks and systems to identify vulnerabilities. They provide recommendations on how to fix these vulnerabilities. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Security Architect
A Security Architect designs and implements security solutions for an organization's computer networks and systems. They work with other IT professionals to ensure that an organization's security posture is aligned with its business goals. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Vulnerability Manager
A Vulnerability Manager identifies and tracks vulnerabilities in an organization's computer networks and systems. They work with other IT professionals to prioritize vulnerabilities and develop remediation plans. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Forensic Investigator
A Forensic Investigator investigates computer crimes and provides expert testimony in court. They use their knowledge of computer systems and networks to analyze evidence and identify the perpetrators of cybercrimes. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Threat Intelligence Analyst
A Threat Intelligence Analyst collects and analyzes information about security threats. They use this information to develop threat reports and provide recommendations on how to protect an organization's computer networks and systems. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Security Auditor
A Security Auditor reviews an organization's security systems and processes to identify vulnerabilities and recommend improvements. They work with other IT professionals to ensure that an organization's security posture is aligned with its business goals. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Cybersecurity Architect
A Cybersecurity Architect designs and implements security solutions for an organization's computer networks and systems. They work with other IT professionals to ensure that an organization's security posture is aligned with its business goals. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.
Security Operations Manager
A Security Operations Manager oversees the day-to-day operations of an organization's security program. They are responsible for ensuring that the organization's security systems and processes are effective and efficient. This course may be useful in helping you to gain the knowledge and skills needed to succeed in this role, as it covers topics such as asset management, threat identification, and vulnerability assessment.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in 5. アセット、脅威、そして脆弱性.
暗号化の基礎から応用までを網羅した教科書。デジタル資産の保護や、サイバー攻撃からの防御に用いる暗号化技術をより深く理解するのに役立ちます。
コンピュータセキュリティに関する標準的な教科書。暗号化、アクセス制御、ネットワークセキュリティなど、基本的な概念から高度なトピックまでを網羅しています。
ネットワーク侵入検知システム(IDS)の仕組みや導入方法について解説した書籍。アセットを脅威から守るセキュリティ対策の一環として、IDSの役割を理解するのに役立ちます。
ソーシャルエンジニアリングやハッキングのテクニックに焦点を当てた書籍。人間の心理を活用してセキュリティを侵害する手法を学び、防御対策を検討できます。
セキュリティ侵害時の対応とコンピューターフォレンジックに関する教科書。被害の特定と軽減、証拠の収集と分析の手順を学ぶことができます。

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to 5. アセット、脅威、そして脆弱性.
8. 実践編:サイバーセキュリティ関連の職に就く準備
Most relevant
4. ツールを使いこなす:Linux と SQL
Most relevant
7. Python を使ったサイバーセキュリティ タスクの自動化
Most relevant
3. つなぎ、守る:ネットワークとネットワーク セキュリティ
Most relevant
2. 安心を担う: セキュリティリスクの管理
Most relevant
6. 警告を発する: 検知と対応
Most relevant
1.基礎知識:サイバーセキュリティとは
Most relevant
2. データに基づいた意思決定を行うための問いかけ
Most relevant
7. データ分析とR 言語
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser