Foundations of Cybersecurity

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Foundations of Cybersecurity

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
This is the first course in the Google Cybersecurity Certificate. In this course, learners will be introduced to the cybersecurity profession, including the primary job responsibilities and core skills of entry-level analysts; significant events that led to the development of the cybersecurity field; and security’s continued importance to organizational operations. Learners will also explore the Certified Information Systems Security Professional (CISSP) eight security domains, common security frameworks and controls, as well as the confidentiality, integrity, and availability (CIA) triad. This course covers a wide variety of cybersecurity topics to provide an overview of what’s to come in this certificate program. Learners who complete the eight courses in the Google Cybersecurity Certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Identify how security attacks impact business operations. - Explore the job responsibilities and core skills of an entry-level cybersecurity analyst. - Recognize how past and present attacks on organizations led to the development of the cybersecurity field. - Learn the CISSP eight security domains. - Identify security domains, frameworks, and controls. - Explain security ethics. - Recognize common tools used by cybersecurity analysts.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Stop Blindly Disabling CSRF — Dynamic CSRF Configuration in Spring Security 6
Learn to dynamically configure CSRF protection in Spring Security 6 for hybrid enterprise APIs, replacing global disable strategies
Medium · Cybersecurity
Microsoft Reveals Kazuar Malware’s Advanced Modular Design and Peer-to-Peer Botnet Capabilities
Microsoft reveals Kazuar malware's advanced modular design and peer-to-peer botnet capabilities, posing a significant threat to cybersecurity
Medium · Cybersecurity
The OpenAI Breach Wasn't About OpenAI – It Was About the 84 Packages Above Them
The OpenAI breach highlights the importance of securing dependencies in the software supply chain, affecting 84 packages above them
Dev.to · Dimitris Kyrkos
Years of Apple's Best Security Work, Cracked in Five Days — Here's What Developers Should Know
Apple's best security measures were cracked in five days, highlighting the importance of ongoing security efforts for developers
Dev.to · ArshTechPro
Up next
How do I restrict access of IAM Identities to specific Amazon EC2 resources?
Amazon Web Services
Watch →