We may earn an affiliate commission when you visit our partners.
Course image
Google Career Certificates

This is the second course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the first Google Cybersecurity Certificate course.

Read more

This is the second course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the first Google Cybersecurity Certificate course.

In this course, you will take a deeper dive into concepts introduced in the first course, with an emphasis on how cybersecurity professionals use frameworks and controls to protect business operations. In particular, you'll identify the steps of risk management and explore common threats, risks, and vulnerabilities. Additionally, you'll explore Security Information and Event Management (SIEM) data and use a playbook to respond to identified threats, risks, and vulnerabilities. Finally, you will take an important step towards becoming a cybersecurity professional and practice performing a security audit.

Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs.

Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary.

By the end of this course, you will:

- Identify the common threats, risks, and vulnerabilities to business operations.

- Understand the threats, risks, and vulnerabilities that entry-level cybersecurity analysts are most focused on.

- Comprehend the purpose of security frameworks and controls.

- Describe the confidentiality, integrity, and availability (CIA) triad.

- Explain the National Institute of Standards and Technology (NIST) framework.

- Explore and practice conducting a security audit.

- Use a playbook to respond to threats, risks, and vulnerabilities.

Enroll now

What's inside

Syllabus

Security domains
You will gain understanding of the CISSP’s eight security domains. Then, you'll learn about primary threats, risks, and vulnerabilities to business operations. In addition, you'll explore the National Institute of Standards and Technology’s (NIST) Risk Management Framework (RMF) and the steps of risk management.
Read more
Security frameworks and controls
You will focus on security frameworks and controls, along with the core components of the confidentiality, integrity, and availability (CIA) triad. You'll learn about Open Web Application Security Project (OWASP) security principles and security audits.
Introduction to cybersecurity tools
You will explore industry leading security information and event management (SIEM) tools that are used by security professionals to protect business operations. You'll learn how entry-level security analysts use SIEM dashboards as part of their every day work.
Use playbooks to respond to incidents
You'll learn about the purposes and common uses of playbooks. You'll also explore how cybersecurity professionals use playbooks to respond to identified threats, risks, and vulnerabilities.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores industry standard CISSP’s eight security domains
Examines risks, threats, and vulnerabilities of business operations
Familiarizes learners with the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and the steps of risk management
Covers key components of confidentiality, integrity, and availability (CIA) triad
Provides hands-on practice in conducting a security audit
Emphasizes cybersecurity playbooks and their response to threats, risks, and vulnerabilities

Save this course

Save Play It Safe: Manage Security Risks to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Play It Safe: Manage Security Risks with these activities:
Offer guidance to aspiring cybersecurity professionals
Strengthens understanding of cybersecurity concepts by explaining them to others, enhances communication skills, and contributes to the community.
Show steps
  • Connect with students, mentees, or individuals seeking guidance in cybersecurity
  • Share knowledge and experience, providing support and guidance on technical concepts
  • Provide encouragement and motivation to aspiring cybersecurity professionals
  • Foster a sense of community and support within the cybersecurity field
Review foundational cybersecurity concepts
Strengthen foundational understanding of key cybersecurity principles and concepts to enhance comprehension in the course.
Show steps
  • Review CISSP security domains to refresh awareness of the eight core security domains
  • Identify common threats and vulnerabilities to business operations to assess risk exposure
  • Explore security principles and tools used in the field to enhance understanding of security measures
Review NIST Special Publication 800-53
Provides a comprehensive overview of security controls and risk management, enhancing understanding of industry standards and best practices.
Show steps
  • Obtain a copy of NIST Special Publication 800-53
  • Review the publication, focusing on security controls and risk management principles
  • Identify key concepts and their application in practical cybersecurity scenarios
  • Relate the information to the course material to deepen understanding
Four other activities
Expand to see all activities and additional details
Show all seven activities
Attend a cybersecurity workshop
Provides hands-on experience in applying cybersecurity principles and enhances understanding of the course material.
Show steps
  • Research and identify relevant cybersecurity workshops in the area
  • Register for the workshop and prepare for active participation
  • Attend the workshop and engage in hands-on activities and discussions
  • Reflect on the workshop and apply the knowledge gained to the course
Conduct simulated risk assessments and security audits
Reinforces the concepts of risk management and security auditing, improves practical skills, and deepens understanding of cybersecurity measures.
Browse courses on Risk Management
Show steps
  • Identify a simulated business environment or application to conduct a risk assessment
  • Apply the principles of risk management to identify and analyze potential threats and vulnerabilities
  • Create a security audit plan and conduct a thorough audit of the simulated environment
  • Document the findings and recommendations resulting from the audit
Develop a security playbook for incident response
Enhances problem-solving and critical thinking skills by providing practical experience in developing a plan for handling cybersecurity incidents.
Browse courses on Incident Response
Show steps
  • Define the scope and objectives of the incident response playbook
  • Identify potential cybersecurity incidents and threats to address in the playbook
  • Create a step-by-step action plan for each incident scenario
  • Test and refine the playbook to enhance its effectiveness
Participate in cybersecurity competitions or hackathons
Provides a challenging and immersive experience to apply and test cybersecurity skills and knowledge in a competitive environment.
Show steps
  • Identify and register for relevant cybersecurity competitions or hackathons
  • Prepare thoroughly by honing technical skills and studying attack and defense strategies
  • Collaborate with teammates or work individually to solve cybersecurity challenges
  • Analyze the results and learn from both successes and failures

Career center

Learners who complete Play It Safe: Manage Security Risks will develop knowledge and skills that may be useful to these careers:
Security Engineer
Security Engineers design and implement security solutions to protect businesses from cyberattacks. This course can help you prepare for this role by teaching you about security frameworks, controls, and tools. You will also learn how to respond to security incidents and conduct security audits.
Cybersecurity Consultant
Cybersecurity Consultants help businesses assess their security risks and develop strategies to mitigate them. This course can help you prepare for this role by teaching you about security frameworks, controls, and tools. You will also learn how to conduct security audits and develop security plans.
Information Security Manager
Information Security Managers are responsible for overseeing the security of an organization's information systems. This course can help you prepare for this role by teaching you about security frameworks, controls, and tools. You will also learn how to develop and implement security policies and procedures.
Security Analyst
Security Analysts help protect businesses from security breaches. They do this by analyzing a company's IT infrastructure and identifying potential risks. This course can help prepare you for this role by teaching you how to identify threats, risks, and vulnerabilities. You will also learn about security frameworks and controls, which are essential for protecting business operations.
Security Auditor
Security Auditors assess the security of computer systems and networks. This course can help you prepare for this role by teaching you about security frameworks, controls, and tools. You will also learn how to conduct security audits and report on your findings.
Network Security Engineer
Network Security Engineers design and implement security solutions for computer networks. This course can help you prepare for this role by teaching you about security frameworks, controls, and tools. You will also learn how to secure networks from cyberattacks.
Incident Responder
Incident Responders investigate and respond to security incidents. This course can help you prepare for this role by teaching you about security frameworks, controls, and tools. You will also learn how to conduct incident investigations and develop incident response plans.
Penetration Tester
Penetration Testers simulate cyberattacks to identify vulnerabilities in computer systems and networks. This course can help you prepare for this role by teaching you about security frameworks, controls, and tools. You will also learn how to conduct penetration tests and report on your findings.
Security Architect
Security Architects design and implement security solutions for complex systems. This course may help you prepare for this role by teaching you about security frameworks, controls, and tools. You will also learn how to develop and implement security architectures.
Chief Information Security Officer (CISO)
CISOs are responsible for overseeing the security of an organization's information systems. This course may help you prepare for this role by teaching you about security frameworks, controls, and tools. You will also learn how to develop and implement security policies and procedures.
Chief Technology Officer (CTO)
CTOs are responsible for the technology strategy of an organization. This course may help you prepare for this role by teaching you about security frameworks, controls, and tools. You will also learn how to develop and implement technology strategies.
Information Technology (IT) Manager
IT Managers oversee the IT operations of an organization. This course may help you prepare for this role by teaching you about security frameworks, controls, and tools. You will also learn how to manage IT budgets and resources.
Software Engineer
Software Engineers design, develop, and test software applications. This course may help you prepare for this role by teaching you about security frameworks, controls, and tools. You will also learn how to develop secure software applications.
Business Analyst
Business Analysts analyze business processes and identify opportunities for improvement. This course may help you prepare for this role by teaching you about security frameworks, controls, and tools. You will also learn how to analyze business processes and develop solutions.
Project Manager
Project Managers plan and manage projects. This course may help you prepare for this role by teaching you about security frameworks, controls, and tools. You will also learn how to manage project budgets and resources.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Play It Safe: Manage Security Risks.
This publication comprehensive guide to security and privacy controls for information systems and organizations. It valuable resource for anyone who is responsible for securing information systems.
Classic guide to security engineering. It covers topics such as threat modeling, risk assessment, and secure software design.
Practical guide to developing information security policies. It covers topics such as risk assessment, policy writing, and policy implementation.
Comprehensive guide to system and network administration tasks. It covers topics such as planning, installing, configuring, and maintaining systems, as well as network security and troubleshooting.
Comprehensive guide to network security. It covers topics such as firewalls, intrusion detection systems, and virtual private networks.
Practical guide to hacking techniques. It covers topics such as buffer overflows, SQL injection, and web application security.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Play It Safe: Manage Security Risks.
Assets, Threats, and Vulnerabilities
Most relevant
Put It to Work: Prepare for Cybersecurity Jobs
Most relevant
Cybersecurity Analyst Assessment
Most relevant
Beginners Guide to Cybersecurity
Most relevant
Certificate in Cybersecurity Analysis (IIBA®- CCA):...
Most relevant
Cyber Threat Intelligence
Most relevant
Microsoft Windows Defender and Firewall for Beginners
Most relevant
Threat Intelligence in Cybersecurity
Most relevant
Network Security
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser