Chevron Left
返回到 Assets, Threats, and Vulnerabilities

学生对 Google 提供的 Assets, Threats, and Vulnerabilities 的评价和反馈

4.8
4,070 个评分

课程概述

This is the fifth course in the Google Cybersecurity Certificate. These courses will further explore the importance of protecting organizational assets from threats, risks, and vulnerabilities. They will also continue to develop an understanding of asset classification and how to use the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF), as well as security controls, to protect assets and mitigate risk. Additionally, learners will gain an understanding of how to develop a threat actor mindset to help protect assets from ever-evolving threat actor tactics and techniques. By the end of this course, you will: - Learn effective data handling processes. - Discuss the role of encryption and hashing in securing assets. - Describe how to effectively use authentication and authorization. - Explain how common vulnerability exposures are identified by MITRE. - Analyze an attack surface to find risks and vulnerabilities. - Identify threats, such as social engineering, malware, and web-based exploits. - Summarize the threat modeling process....

热门审阅

MS

Dec 11, 2023

Overall very informative and well presented course. I'd really like more hands-on tasks than purely theoretical frameworks where possible. But still happy and motivated by this course content.

XZ

Jun 7, 2023

The structure of this course isn't as clear as the previous ones, and some of the quiz questions are a little vague and confusing. But overall the instructor did a great job.

筛选依据:

576 - Assets, Threats, and Vulnerabilities 的 576 个评论(共 576 个)

创建者 A L

Sep 20, 2025

i dont take this class but it shows up in my learning