Assets, Threats, and Vulnerabilities
This is the fifth course in the Google Cybersecurity Certificate. These courses will further explore the importance of protecting organizational assets from threats, risks, and vulnerabilities. They will also continue to develop an understanding of asset classification and how to use the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF), as well as security controls, to protect assets and mitigate risk. Additionally, learners will gain an understanding of how to develop a threat actor mindset to help protect assets from ever-evolving threat actor tactics and techniques.
By the end of this course, you will:
- Learn effective data handling processes.
- Discuss the role of encryption and hashing in securing assets.
- Describe how to effectively use authentication and authorization.
- Explain how common vulnerability exposures are identified by MITRE.
- Analyze an attack surface to find risks and vulnerabilities.
- Identify threats, such as social engineering, malware, and web-based exploits.
- Summarize the threat modeling process.
Watch on Coursera ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Related AI Lessons
⚡
⚡
⚡
⚡
Stop Blindly Disabling CSRF — Dynamic CSRF Configuration in Spring Security 6
Medium · Cybersecurity
The OpenAI Breach Wasn't About OpenAI – It Was About the 84 Packages Above Them
Dev.to · Dimitris Kyrkos
Years of Apple's Best Security Work, Cracked in Five Days — Here's What Developers Should Know
Dev.to · ArshTechPro
TorCT PHP RAT 2026
Dev.to AI
🎓
Tutor Explanation
DeepCamp AI