When you enroll in this course, you'll also be enrolled in this Professional Certificate.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate from Google
There are 4 modules in this course
This is the fifth course in the Google Cybersecurity Certificate. These courses will further explore the importance of protecting organizational assets from threats, risks, and vulnerabilities. They will also continue to develop an understanding of asset classification and how to use the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF), as well as security controls, to protect assets and mitigate risk. Additionally, learners will gain an understanding of how to develop a threat actor mindset to help protect assets from ever-evolving threat actor tactics and techniques.
By the end of this course, you will:
- Learn effective data handling processes.
- Discuss the role of encryption and hashing in securing assets.
- Describe how to effectively use authentication and authorization.
- Explain how common vulnerability exposures are identified by MITRE.
- Analyze an attack surface to find risks and vulnerabilities.
- Identify threats, such as social engineering, malware, and web-based exploits.
- Summarize the threat modeling process.
In this module, learners will be introduced to the way organizations determine what they want to protect. They will learn about the connection between managing risk and classifying assets by exploring the unique challenge of securing physical and digital assets. Learners will be introduced to the NIST framework standards, guidelines and best practices to manage cybersecurity risk.
What's included
10 videos9 readings6 assignments1 plugin
Show info about module content
10 videos•Total 32 minutes
Introduction to Course 5 •3 minutes
Da'Queshia: My path to cybersecurity•2 minutes
Welcome to module 1 •2 minutes
The what, why, and how of asset security•4 minutes
Tri: Life in asset security•3 minutes
Security starts with asset classification •4 minutes
Assets in a digital world •4 minutes
Elements of a security plan•4 minutes
The NIST Cybersecurity Framework•4 minutes
Wrap-up •2 minutes
9 readings•Total 48 minutes
Course 5 overview•4 minutes
Helpful resources and tips•8 minutes
Understand risks, threats, and vulnerabilities•8 minutes
Common classification requirements •4 minutes
Activity Exemplar: Classify the assets connected to a home network•4 minutes
The emergence of cloud security •8 minutes
Security guidelines in action •4 minutes
Activity Exemplar: Score risks based on their likelihood and severity•4 minutes
Glossary terms from module 1 •4 minutes
6 assignments•Total 134 minutes
Test your knowledge: Introduction to assets•8 minutes
Activity: Classify the assets connected to a home network•30 minutes
Test your knowledge: Digital and physical assets•8 minutes
Test your knowledge: Risk and asset security•8 minutes
Activity: Score risks based on their likelihood and severity•30 minutes
Module 1 challenge •50 minutes
1 plugin•Total 10 minutes
Identify: States of data in the workplace•10 minutes
Protect organizational assets
Module 2•6 hours to complete
Module details
In this module, learners will focus on security controls that help protect organizational assets. They will explore how privacy considerations impact asset security. They will gain an understanding of encryption and the role it plays in maintaining the privacy of digital assets. They will also explore how authentication and authorization systems verify that someone is who they claim to be.
What's included
11 videos14 readings6 assignments4 app items
Show info about module content
11 videos•Total 35 minutes
Welcome to module 2•2 minutes
Security controls•3 minutes
Heather: The importance of protecting PII •2 minutes
Fundamentals of cryptography•4 minutes
Public key infrastructure•5 minutes
Non-repudiation and hashing•3 minutes
Access controls and authentication systems•4 minutes
The mechanisms of authorization•5 minutes
Why we audit user activity•3 minutes
Tim: Finding purpose in protecting assets•1 minute
Wrap-up•2 minutes
14 readings•Total 96 minutes
Principle of least privilege•8 minutes
The data lifecycle •12 minutes
Information privacy: Regulations and compliance•8 minutes
Activity Exemplar: Determine appropriate data handling practices•4 minutes
Symmetric and asymmetric encryption •8 minutes
Resources for completing labs•4 minutes
Lab tips and troubleshooting steps•4 minutes
Exemplar: Decrypt an encrypted a message•8 minutes
The evolution of hash functions•8 minutes
Exemplar: Create hash values•8 minutes
The rise of SSO and MFA •8 minutes
Identity and access management•8 minutes
Activity Exemplar: Improve authentication and authorization for a small business•4 minutes
Glossary terms from module 2 •4 minutes
6 assignments•Total 138 minutes
Activity: Determine appropriate data handling practices•30 minutes
Test your knowledge: Safeguard information•8 minutes
Test your knowledge: Encryption methods•10 minutes
Activity: Improve authentication, authorization, and accounting for a small business•30 minutes
Test your knowledge: Authentication, authorization, and accounting•10 minutes
Module 2 challenge •50 minutes
4 app items•Total 80 minutes
Activity: Decrypt an encrypted message•30 minutes
Optional Exemplar: Decrypt an encrypted message•10 minutes
Activity: Create hash values•30 minutes
Optional Exemplar: Create hash values•10 minutes
Vulnerabilities in systems
Module 3•5 hours to complete
Module details
In this module, learners will build an understanding of the vulnerability management process. They will learn about common vulnerabilities . They will develop an attacker mindset by examining the ways vulnerabilities can become threats to asset security if they are exploited.
What's included
10 videos12 readings7 assignments
Show info about module content
10 videos•Total 33 minutes
Welcome to module 3 •2 minutes
Vulnerability management •4 minutes
Defense in depth strategy •4 minutes
Common vulnerabilities and exposures •5 minutes
Vulnerability assessments •3 minutes
Omad: My learning journey into cybersecurity•2 minutes
Protect all entry points•4 minutes
Niru: Adopt an attacker mindset•3 minutes
Pathways through defenses •4 minutes
Wrap-up •2 minutes
12 readings•Total 102 minutes
Vulnerabilities of CI/CD•10 minutes
The OWASP Top 10•12 minutes
Open source intelligence•12 minutes
Approaches to vulnerability scanning •8 minutes
The importance of updates •8 minutes
Penetration testing •12 minutes
Portfolio Activity Exemplar: Analyze a vulnerable system for a small business•4 minutes
Approach cybersecurity with an attacker mindset•8 minutes
Types of threat actors•8 minutes
Fortify against brute force cyber attacks•12 minutes
Activity Exemplar: Identify the attack vectors of a USB drive•4 minutes
Glossary terms from module 3 •4 minutes
7 assignments•Total 164 minutes
Test your knowledge: Flaws in the system •8 minutes
Test your knowledge: Identify system vulnerabilities•8 minutes
Portfolio Activity: Analyze a vulnerable system for a small business•30 minutes
Self-reflection: Approach cybersecurity with an attacker mindset•30 minutes
Activity: Identify the attack vectors of a USB drive•30 minutes
Test your knowledge: Cyber attacker mindset•8 minutes
Module 3 challenge •50 minutes
Threats to asset security
Module 4•4 hours to complete
Module details
In this module, learners will explore the common types of threats to digital asset security. They will also examine the tools and techniques used by cybercriminals to target assets. After gaining this understanding, they will be introduced to the threat modeling process and learn ways security professionals stay ahead of security breaches.
What's included
12 videos10 readings7 assignments2 plugins
Show info about module content
12 videos•Total 43 minutes
Welcome to module 4 •2 minutes
The criminal art of persuasion •4 minutes
Phishing for information •5 minutes
Malicious software•5 minutes
The rise of cryptojacking•4 minutes
Cross-site scripting (XSS)•5 minutes
Exploitable gaps in databases •4 minutes
A proactive approach to security •4 minutes
Chantelle: The value of diversity in cybersecurity•2 minutes
PASTA: The Process for Attack Simulation and Threat Analysis •4 minutes
Wrap-up •2 minutes
Course wrap-up•3 minutes
10 readings•Total 60 minutes
Social engineering tactics•8 minutes
Types of phishing•8 minutes
An introduction to malware •8 minutes
Prevent injection attacks•12 minutes
Traits of an effective threat model •8 minutes
Activity Exemplar: Apply the PASTA threat model framework•4 minutes
Glossary terms from module 4 •4 minutes
Reflect and connect with peers•2 minutes
Course 5 glossary •2 minutes
Get started on the next course •4 minutes
7 assignments•Total 146 minutes
Test your knowledge: Social engineering •8 minutes
Activity: Filter malicious emails•30 minutes
Test your knowledge: Malware •8 minutes
Test your knowledge: Web-based exploits•10 minutes
Activity: Apply the PASTA threat model framework•30 minutes
Test your knowledge: Threat modeling•10 minutes
Module 4 challenge •50 minutes
2 plugins•Total 20 minutes
Identify: Steps of the threat model process•10 minutes
Explore: Apply PASTA to an application's threat model•10 minutes
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor
Instructor ratings
Instructor ratings
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
Grow with Google is an initiative that draws on Google's decades-long history of building products, platforms, and services that help people and businesses grow. We aim to help everyone – those who make up the workforce of today and the students who will drive the workforce of tomorrow – access the best of Google’s training and tools to grow their skills, careers, and businesses.
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Learner reviews
4.8
4,124 reviews
5 stars
84.89%
4 stars
11.12%
3 stars
2.30%
2 stars
0.72%
1 star
0.94%
Showing 3 of 4124
M
MS
4·
Reviewed on Dec 11, 2023
Overall very informative and well presented course. I'd really like more hands-on tasks than purely theoretical frameworks where possible. But still happy and motivated by this course content.
X
XZ
4·
Reviewed on Jun 7, 2023
The structure of this course isn't as clear as the previous ones, and some of the quiz questions are a little vague and confusing. But overall the instructor did a great job.
M
M
5·
Reviewed on Sep 14, 2023
Such a great course!! learning a lot and discovering about so many things about what we are about to protect.. Thank you for this Google and Coursera!!
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Certificate?
When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.