When you enroll in this course, you'll also be enrolled in this Professional Certificate.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate from Google
There are 4 modules in this course
This course takes a deeper dive into concepts introduced in the first course, with an emphasis on recognizing the focus of the CISSP eight security domains, steps of risk management, security frameworks and controls (e.g., NIST, CIA triad, OWASP), as well as common security threats, risks, and vulnerabilities. Additionally, learners are provided with an opportunity to explore and analyze SIEM data, use a playbook to respond to identified threats, risks, and vulnerabilities, and conduct a security audit.
By the end of this course, you will:
- Identify the common threats, risks, and vulnerabilities to business operations.
- Understand the threats, risks, and vulnerabilities that entry-level cybersecurity analysts are most focused on.
- Comprehend the purpose of security frameworks and controls.
- Describe the confidentiality, integrity, and availability (CIA) triad.
- Explain the National Institute of Standards and Technology (NIST) framework.
- Explore and practice conducting a security audit.
- Use a playbook to respond to threats, risks, and vulnerabilities.
This module explains the focus of CISSP’s eight security domains. Then, primary threats, risks, and vulnerabilities to business operations are identified and defined, along with a discussion of the threats, risks, and vulnerabilities entry-level security analysts focus on most. Additionally, NIST’s Risk Management Framework (RMF) is introduced.
What's included
10 videos5 readings3 assignments1 plugin
Show info about module content
10 videos•Total 34 minutes
Introduction to Course 2•2 minutes
Welcome to module 1 •1 minute
Explore the CISSP security domains, Part 1•5 minutes
Explore the CISSP security domains, Part 2•5 minutes
Ashley: My path to cybersecurity•3 minutes
Threats, risks, and vulnerabilities•5 minutes
Key impacts of threats, risks, and vulnerabilities•4 minutes
Herbert: Manage threats, risks, and vulnerabilities•2 minutes
NIST’s Risk Management Framework•5 minutes
Wrap-up•1 minute
5 readings•Total 28 minutes
Course 2 overview•4 minutes
Helpful resources and tips•4 minutes
Security domains cybersecurity analysts need to know•8 minutes
Manage common threats, risks, and vulnerabilities•8 minutes
Glossary terms from module 1 •4 minutes
3 assignments•Total 66 minutes
Module 1 challenge•50 minutes
Test your knowledge: More about the CISSP security domains•8 minutes
Test your knowledge: Navigate threats, risks, and vulnerabilities•8 minutes
This module explains security frameworks and controls, along with the core components of the confidentiality, integrity, and availability (CIA) triad. They will also learn about Open Web Application Security Project, recently renamed Open Worldwide Application Security Project® (OWASP), security principles and security audits.
What's included
11 videos6 readings6 assignments1 plugin
Show info about module content
11 videos•Total 37 minutes
Welcome to module 2•1 minute
Frameworks•2 minutes
Controls •4 minutes
Explore the CIA triad•4 minutes
NIST frameworks •5 minutes
Explore the six functions of the NIST Cybersecurity Framework•4 minutes
OWASP security principles •4 minutes
Wajih: Stay up-to-date on the latest cybersecurity threats•2 minutes
Plan a security audit•4 minutes
Complete a security audit•5 minutes
Wrap-up•2 minutes
6 readings•Total 28 minutes
The relationship between frameworks and controls•4 minutes
Use the CIA triad to protect organizations•4 minutes
More about OWASP security principles •4 minutes
More about security audits •8 minutes
Portfolio Activity Exemplar: Conduct a security audit•4 minutes
Glossary terms from module 2•4 minutes
6 assignments•Total 112 minutes
Portfolio Activity: Conduct a security audit•30 minutes
Module 2 challenge•50 minutes
Test your knowledge: More about frameworks and controls•8 minutes
Test your knowledge: The CIA triad•8 minutes
Test your knowledge: NIST frameworks•8 minutes
Test your knowledge: OWASP principles and security audits•8 minutes
1 plugin•Total 10 minutes
Practice: Use the CIA triad in workplace situations•10 minutes
Introduction to cybersecurity tools
Module 3•2 hours to complete
Module details
This module will explore industry leading security information and event management (SIEM) tools that are used by security professionals to protect business operations. You'll learn how entry-level security analysts use SIEM dashboards as part of their every day work.
What's included
7 videos4 readings3 assignments
Show info about module content
7 videos•Total 16 minutes
Welcome to module 3•1 minute
Logs and SIEM tools •3 minutes
SIEM dashboards•3 minutes
Parisa: The parallels of accessibility and security•3 minutes
Explore common SIEM tools•4 minutes
Talya: Myths about the cybersecurity field•2 minutes
Wrap-up •1 minute
4 readings•Total 28 minutes
The future of SIEM tools•8 minutes
More about cybersecurity tools•8 minutes
Use SIEM tools to protect organizations•8 minutes
Glossary terms from module 3•4 minutes
3 assignments•Total 56 minutes
Module 3 challenge•40 minutes
Test your knowledge: Security information and event management (SIEM) dashboards•8 minutes
Test your knowledge: Identify threats and vulnerabilities with SIEM tools•8 minutes
Use playbooks to respond to incidents
Module 4•2 hours to complete
Module details
This module discusses the purposes and common uses of playbooks. They’ll also explore how cybersecurity professionals use playbooks to respond to identified threats, risks, and vulnerabilities.
What's included
7 videos6 readings3 assignments2 plugins
Show info about module content
7 videos•Total 19 minutes
Welcome to module 4 •1 minute
Phases of an incident response playbook •6 minutes
Zack: Incident response and the value of playbooks•3 minutes
Use a playbook to respond to threats, risks, or vulnerabilities•4 minutes
Erin: The importance of diversity of perspective on a security team •3 minutes
Wrap-up •1 minute
Course wrap-up •2 minutes
6 readings•Total 20 minutes
More about playbooks •4 minutes
Playbooks, SIEM tools, and SOAR tools•4 minutes
Glossary terms from module 4•2 minutes
Reflect and connect with peers•4 minutes
Course 2 glossary •2 minutes
Get started on the next course•4 minutes
3 assignments•Total 56 minutes
Module 4 challenge•40 minutes
Test your knowledge: Incident response•8 minutes
Test your knowledge: Use a playbook to respond to an incident•8 minutes
2 plugins•Total 20 minutes
Identify: Phases of an incident response playbook•10 minutes
Practice: Respond to a SIEM alert•10 minutes
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor
Instructor ratings
Instructor ratings
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
Grow with Google is an initiative that draws on Google's decades-long history of building products, platforms, and services that help people and businesses grow. We aim to help everyone – those who make up the workforce of today and the students who will drive the workforce of tomorrow – access the best of Google’s training and tools to grow their skills, careers, and businesses.
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Learner reviews
4.8
10,973 reviews
5 stars
86.30%
4 stars
11.34%
3 stars
1.54%
2 stars
0.38%
1 star
0.41%
Showing 3 of 10973
A
AM
5·
Reviewed on Sep 26, 2023
Everything is perfectly explained. The real life experience being shared is also crucial to the overall success of the course, as it helps eliminate fear, or myth about Cybersecurity field.
J
JF
4·
Reviewed on Jul 12, 2023
Great Class the only thing the portfolio I wish you made example video what it actually looks like or anything to related to portfolio small video would go a long way for new people to understand
D
DT
5·
Reviewed on Aug 2, 2023
Holistic coverage of foundational concepts of what security is and how it is practiced in the industry, industry frameworks, before overlaying with contextualised cyber security practices.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Certificate?
When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.