MS
Overall very informative and well presented course. I'd really like more hands-on tasks than purely theoretical frameworks where possible. But still happy and motivated by this course content.
This is the fifth course in the Google Cybersecurity Certificate. These courses will further explore the importance of protecting organizational assets from threats, risks, and vulnerabilities. They will also continue to develop an understanding of asset classification and how to use the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF), as well as security controls, to protect assets and mitigate risk. Additionally, learners will gain an understanding of how to develop a threat actor mindset to help protect assets from ever-evolving threat actor tactics and techniques.
By the end of this course, you will: - Learn effective data handling processes. - Discuss the role of encryption and hashing in securing assets. - Describe how to effectively use authentication and authorization. - Explain how common vulnerability exposures are identified by MITRE. - Analyze an attack surface to find risks and vulnerabilities. - Identify threats, such as social engineering, malware, and web-based exploits. - Summarize the threat modeling process.
MS
Overall very informative and well presented course. I'd really like more hands-on tasks than purely theoretical frameworks where possible. But still happy and motivated by this course content.
XZ
The structure of this course isn't as clear as the previous ones, and some of the quiz questions are a little vague and confusing. But overall the instructor did a great job.
BR
The study material and videos are very useful to understand the subject. Overall the manner in which this course was planned that can be understood easily with little attention. Thank you
LR
This was my favorite Module in the course. Easier to understand and it help guided me to what direction I may want to start in my Cybersecurity career.
NW
By far my favorite course in this certificate training program. The main host was engaging and personably, with content and labs that were also enjoyable. Well done!
KA
I liked the course expecially the theories provided as answers foe the portfolio; however, there is missing something namely real practical examples ?
HA
Great course by exceptional tutors. One disadvantage is that there is no way to get a certificate without verification, which is not possible for minors
SM
Very insightful i learnt alot from Da Queish forgive me for the mispelling of her name but she is a good teacher. Thanks may my journey bear fruits from this knowledge.
AF
It was one of the best courses so far as it gave knowledge about Threats and Vulnerability which is greatly needed for a Cybersecurity Professional like me
SK
This is one of the best platform to learn more about security ever since from the first course until up to this one it keeps o showing me that there is more in security then I have known.
CL
Very informational and gives you hands on experience throughout the course! I felt challenged and was forced to think differently to come up with the solutions.
OE
Faunistic course, I learned a lot but I can not give it five stars because I didn’t get to see some of the tools (IDS and the rest) mentioned in the course in action.
Showing: 20 of 580
I didn't like this course. The instructor was no good.
Let me be clear: I firmly believe in equality, and race has no biological basis
However, I must express my disappointment in the low quality of Google courses, where the primary criterion for selecting instructors, it seems that Google prioritizes their minority status over their ability to effectively convey information or vocalize concepts for student understanding
Merit, not backgrounds, should be the basis for selection I hope I'm not misunderstood
This was the first of the certificate courses that was a struggle to make it through. Not because of the content, but because of the instructor. Her mispronunciation of words ("liberries, essplor, etc), awkward transitions and emphasis on random words, and extremely distracting hand movements made the videos very difficult to watch. This content was extremely important, and I hated every second of it due to the instructor.
I don't have any complain about the course item, but the instructor, I swear she is the worst instructor of my life. This course took the highest time to complete because of her pronunciation. She is the one and only reason I stopped going on this course, she made me feel depressed as I couldn't understand her pronunciation and had to try multiple time for a single quiz. Please google, re upload this course and DO NOT BRING her.
The course material was great, but i really did not like the presentation style of the instructor, and her lisp was so distracting
the instructor talk not well
This was very trivial, especially being this late in the course, it seems un-needed.
Full on repeated information's and delivered in a worst possible manner
Instructor not easy to understand
Reinforces information covered earlier in the course and introduces several new ideas and concepts to provide insight on cybersecurity's role in both offensive and defensive situations.
Not as many hands-on opportunities as I hoped, but provided an excellent expansion of vocabulary.
This course is awesome! The instructor was very clear in her explanations. The threats, vulnerabilities are real and the modeling exercise in anticipation of threat is a brilliant idea!
Enjoyed this course. I was somewhat familiar with these concepts going in but learned a lot that was new to me. The course went in depth enough to really dig into the material.
I did acquire a lot of knowledge and skills in the domain. It was an eye opener for me how things were take for granted can exposed us or our systems to threat actors.
By far my favorite course in this certificate training program. The main host was engaging and personably, with content and labs that were also enjoyable. Well done!
I think this course/module contained too much video material that could easily be condensed into text or more interactive material. I could feel myself lose interest in the course over time simply by being worn down due to the long video formats.
The person presenting the information was great, she explained everything very clearly. However, the information itself is a major drain. Information overload is the first thing that I think of here.
I think this lesson could have used some more hands on approach for learning. Going from a course that was mostly hands on to a very not hands on made it difficult to stay focused on the material. (This is only in relation to part 5 or (course 5) of this certificate program.
I actually gave 2 stars because of the instructor. Didn't like it, seems like doesn't know the topic very well. Maybe can be a good employer but definitely not a good instructor.
Very long and tedious course, the worst so far. I truly wish they would pick instructors based on their ability to speak and teach on camera, that is clearly NOT the case.
of all course of cibersecurity this is the worst and most boring so far, shame on Google that lead technologies can't make a good course that we really learn and keep that learning instead of informational videos and lot of reading to memorize, at this point I will temporary quit because I can't go like this I will die of boredom if I continue specting all other are the same, please Google make this course more about videos and reading, make it more of practices something we can do and keep all learnings.
Awful. Terrible definitions, an entire video is missing on detecting and removing malware. Just terrible. Once again, no hands-on application of anything that could prepare me for a job.