This course is part of Google Cybersecurity Professional Certificate
Instructor: Google Career Certificates
What you'll learn
Skills you'll gain
There are 4 modules in this course
By the end of this course, you will: - Learn effective data handling processes. - Discuss the role of encryption and hashing in securing assets. - Describe how to effectively use authentication and authorization. - Explain how common vulnerability exposures are identified by MITRE. - Analyze an attack surface to find risks and vulnerabilities. - Identify threats, such as social engineering, malware, and web-based exploits. - Summarize the threat modeling process.
Protect organizational assets
Vulnerabilities in systems
Threats to asset security
Explore more from Computer Security and Networks
©2025 ementorhub.com. All rights reserved