TrueschoTruescho
All Courses
Office of the CISO Institute: Cybersecurity Essentials
Coursera
Course
Unknown

Office of the CISO Institute: Cybersecurity Essentials

Google

In today’s highly connected world, having an understanding of cybersecurity concepts is increasingly important. Business professionals interested in understanding the risk cybersecurity threats pose to their business, look no further! The Google Cybersecurity Action Team: Cybersecurity Essentials course provides an introduction to cybersecurity terminology, principles, and concepts. Throughout the course, you will cover six security domains, and business continuity and disaster response planning

Unknown6 weeks12,029 enrolled

About this Course

In today’s highly connected world, having an understanding of cybersecurity concepts is increasingly important. Business professionals interested in understanding the risk cybersecurity threats pose to their business, look no further! The Google Cybersecurity Action Team: Cybersecurity Essentials course provides an introduction to cybersecurity terminology, principles, and concepts. Throughout the course, you will cover six security domains, and business continuity and disaster response planning

What You'll Learn

  • Understand core cybersecurity terms, acronyms, concepts, and controls to be able to communicate about cybersecurity with confidence
  • Evaluate cybersecurity scenarios for better decision making
  • Analyze threats and risks within an organization’s landscape
  • Recognize various cybersecurity technologies, including: firewalls, encryption, intrusion detection systems, antivirus/anti-malware, and many more

Instructors

O

Office of the CISO Institute

Topics

أمن نقاط النهاية
إدارة المخاطر
الاستجابة للحوادث
سياسات الأمن السيبراني
المصادقة والتحقق
التشفير
تقييم الثغرات
أمن الشبكات
اكتشاف التهديدات
استمرارية الأعمال

Course Info

PlatformCoursera
LevelUnknown
PacingUnknown
PriceFree

Skills

أمن نقاط النهاية
إدارة المخاطر
الاستجابة للحوادث
سياسات الأمن السيبراني
المصادقة والتحقق
التشفير
تقييم الثغرات
أمن الشبكات
اكتشاف التهديدات
استمرارية الأعمال

Start Learning Now