This is the fifth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the fourth Google Cybersecurity Certificate course.
Assets, Threats, and Vulnerabilities
This course is part of Google Cybersecurity Professional Certificate
Instructor: Google Career Certificates
Top Instructor
Sponsored by University of Texas at Austin
203,846 already enrolled
(3,010 reviews)
What you'll learn
Classify assets
Analyze an attack surface to find risks and vulnerabilities
Identify threats, such as social engineering, malware and web-based exploits
Summarize the threat modeling process
Details to know
Add to your LinkedIn profile
26 quizzes
See how employees at top companies are mastering in-demand skills
Build your Computer Security and Networks expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate from Google
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 4 modules in this course
You will be introduced to how organizations determine what assets to protect. You'll learn about the connection between managing risk and classifying assets by exploring the unique challenge of securing physical and digital assets. You'll also be introduced to the National Institute of Standards and Technology (NIST) framework standards, guidelines and best practices to manage cybersecurity risk.
What's included
10 videos9 readings6 quizzes1 plugin
You will focus on security controls that protect organizational assets. You'll explore how privacy impacts asset security and understand the role that encryption plays in maintaining the privacy of digital assets. You'll also explore how authentication and authorization systems help verify a user’s identity.
What's included
11 videos14 readings6 quizzes4 app items
You will build an understanding of the vulnerability management process. You'll learn about common vulnerabilities and develop an attacker mindset by examining the ways vulnerabilities can become threats to asset security if they are exploited.
What's included
10 videos11 readings7 quizzes
You will explore common types of threats to digital asset security. You'll also examine the tools and techniques used by cybercriminals to target assets. In addition, you'll be introduced to the threat modeling process and learn ways security professionals stay ahead of security breaches.
What's included
12 videos10 readings7 quizzes2 plugins
Instructor
Offered by
Why people choose Coursera for their career
Learner reviews
Showing 3 of 3010
3,010 reviews
- 5 stars
84.65%
- 4 stars
11.29%
- 3 stars
2.45%
- 2 stars
0.62%
- 1 star
0.96%
Open new doors with Coursera Plus
Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy