Chevron Left
Back to Assets, Threats, and Vulnerabilities

Learner Reviews & Feedback for Assets, Threats, and Vulnerabilities by Google

4.8
stars
2,144 ratings

About the Course

This is the fifth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the fourth Google Cybersecurity Certificate course. In this course, you will explore the concepts of assets, threats, and vulnerabilities. First, you'll build an understanding of how assets are classified. Next, you will become familiar with common threats and vulnerabilities, and the security controls used by organizations to protect valuable information and mitigate risk. You will develop an attacker mindset by practicing the threat modeling process, and you'll learn tactics for staying ahead of security breaches. Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs. Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Learn effective data handling processes. - Discuss the role of encryption and hashing in securing assets. - Describe how to effectively use authentication and authorization. - Explain how common vulnerability exposures are identified by MITRE. - Analyze an attack surface to find risks and vulnerabilities. - Identify threats, such as social engineering, malware, and web-based exploits. - Summarize the threat modeling process....

Top reviews

BR

May 12, 2024

The study material and videos are very useful to understand the subject. Overall the manner in which this course was planned that can be understood easily with little attention. Thank you

AM

Jul 13, 2023

This course is awesome! The instructor was very clear in her explanations. The threats, vulnerabilities are real and the modeling exercise in anticipation of threat is a brilliant idea!

Filter by:

276 - 300 of 310 Reviews for Assets, Threats, and Vulnerabilities

By Christopher K

•

Feb 13, 2023

A good high-level into to the topic. Lots more to learn but this is a great starting point.

By Semaj

•

Dec 8, 2023

So far this course has been really great at helping to understand the topics.

By Jairo G

•

Sep 2, 2023

Very good, might feel a bit slow at times but it was very informative.

By Eddie M

•

Jul 5, 2023

nice overview of lots of different subjects in cybersecurity

By Pablo E B

•

Jan 25, 2024

she was suboptimal. SHE WILL NEVER BE TORI!!!

By Maysa

•

Dec 8, 2023

amazing , add more practical exersices

By Dimuth D

•

Nov 28, 2023

Grate course. She is super. Well-done!

By Chapal P

•

Jan 21, 2024

Good Start for the foundation

By Adahi D M V

•

May 24, 2024

It was a quite difficult

By James W

•

Mar 8, 2024

Tough, but thorough.

By DJENABOU D

•

Mar 13, 2024

very instructive.

By Rajan N

•

Aug 10, 2023

great course

By Mutasim A

•

Mar 13, 2024

eqrf

By Christopher S

•

Apr 7, 2024

While the instructor is probably a nice person.... you should use someone that is not as nervous in front of the camera (way out of control hand motions!).... also her mis pronouncing words (no 't's in the middle of words that should have t's - saying 'rooen' rather than rotten.... and ax rather than ask.... drive me crazy.....

By Scott M D

•

Sep 2, 2023

I feel like I'm missing a little bit more of "real-life examples", the information is good but it's 98% theoretical. Give me videos of someone on a VM showing what they're doing like with the SQL samples.

By Ryan C

•

Jan 11, 2024

Good course and material, but the excessive hand movements by the presenter just got to be far too distracting by end of the course, and made it hard to focus on the content being communicated.

By Audrey V

•

Jun 12, 2024

Great high level introduction to cybersecurity, but the industry does not recognize this certificate in any meaningful way and it has been nearly impossible to find a job.

By Zaid E

•

Feb 23, 2024

Since I am technical minded, this course was a bit boring for me. Not going deep enough into the various threats, focusing too much on terms, sequences and processes.

By Sumi L

•

Mar 27, 2024

Projects are not interactive enough. Making it more interactive can help people understand and engage more intellectually

By Shant G

•

Dec 27, 2023

The course material was great. However, sorry to say this, but the presenter's tone and pronunciation were distractive.

By Serdar E

•

Dec 13, 2023

contents of the course kind of overall info, in details you can not conduct any process by only the course info,

By C

•

Jan 3, 2024

Should maybe go before the Linux portion of the course. Very tedious and a lot of talking.

By Joshua N

•

Nov 29, 2023

The teacher's constant hand gestures while talking were very distracting.

By Jay P

•

Oct 30, 2023

Videos were distracting due to mispronunciations and lisp on most words.

By Chidubem

•

Oct 12, 2023

I think this is my most difficult module in the course.