05
Assets, Threats, and Vulnerabilities
05
Assets, Threats, and Vulnerabilities
Develop an attacker mindset and learn tactics to stay ahead of security breaches. Explore assets, threats, and vulnerabilities, understanding how organizations protect valuable information and mitigate risk with security controls. This is the fifth course in the Google Cybersecurity Certificate, a series designed to prepare you for an entry-level cybersecurity role.
Course Info
Objectives
By the end of this course, you will:
- Learn effective data handling processes.
- Discuss the role of encryption and hashing in securing assets.
- Describe how to effectively use authentication and authorization.
- Explain how common vulnerability exposures are identified by MITRE.
- Analyze an attack surface to find risks and vulnerabilities.
- Identify threats, such as social engineering, malware, and web-based exploits.
- Summarize the threat modeling process.
Prerequisites
No prior experience required
Audience
Beginner
Available languages
English