Begin your journey into cybersecurity! You’ll explore the cybersecurity field, and learn about the job responsibilities of cybersecurity professionals.
Learning Objectives
- Explain how this certificate program will help prepare learners for a career in security
- Define the field of security
- Explore the job responsibilities of an entry-level security analyst
- Recognize core skills and knowledge needed to become a security analyst
- Describe how security analysts protect networks and information
Get started with the certificate program
Video: Welcome to the Google Cybersecurity Certificate
- The Google Career Certificate in Cybersecurity is designed to help you get started or advance in a career in security.
- The program is made up of several courses that will teach you about core security concepts, security domains, network security, computing basics, and understanding assets, threats, and vulnerabilities.
- You will also learn about incident detection and response, how to use programming languages, like Python, to accomplish common security tasks, and valuable job search strategies.
- The program is designed to prepare you for a job in 3-6 months if you work on the certificate part-time.
- Once you graduate, you can connect with over 200 employers who are interested in hiring Google Career Certificate graduates.
- You don’t need prior experience or knowledge in the security field to enroll in this program.
- The program is also flexible. You can complete all of the courses in this certificate on your own terms and at your own pace, online.
Here are some additional points that you may want to include in your summary:
- The demand for security professionals is growing at an incredible rate.
- The security industry offers many different paths and career options.
- The Google Career Certificates are designed by industry professionals with decades of experience at Google.
- Throughout the program, you will gain hands-on practice with detecting and responding to attacks, monitoring and protecting networks, investigating incidents, and writing code to automate tasks.
Hello and welcome to the Google Career Certificate
focused on cybersecurity. I’m so excited that you’re here! My name is Toni, and I am a Security Engineering
Manager at Google. I’ll be your instructor for the first course of this
certificate program. By starting this course, you’ve already taken
a big step towards building new skills that will
help you in your career. Cybersecurity may seem
daunting at first, but you’d be surprised by the different backgrounds
many of us have. I worked as an intelligence
analyst before I got my first job in
the security industry, and I’m excited to be your instructor as you begin
your journey into security. The demand for
security professionals is growing at an
incredible rate. By 2030, the U.S. Bureau
of Labor Statistics expects security roles to
grow by more than 30%, which is higher than the average growth rate
for other occupations. Global access to the
internet is expanding. Every day, more people and organizations are adopting
new digital technologies. Having a diverse community of security professionals
with unique backgrounds, perspectives, and experiences is essential for protecting and
serving different markets. Working in security
has allowed me to work with people from
all around the world. Working with people who have diverse backgrounds
ensures that our teams get to ask lots of questions and come up with more
creative solutions. The main objective
in security is to protect organizations
and people. This line of work allows you to support and interact with
people across the globe. There are many openings for entry-level security analysts, and employers are
struggling to find enough candidates with
the right expertise. This program is designed to
give you the knowledge and skills you need to start or advance in the
security profession. No matter your
current skill level, by the time you finish
this certificate program, you’ll be prepared to find a security-related job or
expand your career in security. You may be wondering, what do security
professionals actually do? Have you ever had to
update your password online to include a number
or a special symbol? If so, then you’re
already familiar with basic security measures,
like password management. And if you’ve ever received
a notification from a service provider about
stolen data or a software hack, then you have
first-hand experience with the impact of
a security breach. If you’ve ever asked yourself how organizations
safeguard data, then you already have two important traits
that are necessary to thrive in this industry:
curiosity and excitement. Security analysts help minimize risks to organizations
and people. Analysts work to proactively
guard against incidents while continuously monitoring
systems and networks. And, if an incident does occur, they investigate and
report their findings. They are always asking questions and looking
for solutions. One of the best things
about the security industry is the many paths and career
options it exposes you to. Each option involves
a unique set of skills and responsibilities. No matter what your
background is, you’ll probably find that you already have some
relevant experience. If you enjoy collaborating
with and helping others, solving puzzles, and are
motivated by challenges, then this is the career for you. For example, my background as an intelligence analyst had nothing to do with
cybersecurity. However, having strong critical thinking skills
and communication skills provided a solid foundation for my success when I decided to
pursue a career in security. If you’re not sure what
direction you want to take in the security
industry, that’s okay. This program will give
you an overview of many different types
of available jobs. It will also let you explore certain specialized
skill sets to help you figure out where you
want to take your career. The Google Career
Certificates are designed by industry professionals
with decades of experience here at Google. You’ll have a
different expert from Google guide you through each
course in the certificate. We’ll share our
knowledge in videos, provide practice opportunities
with hands-on activities, and take you through
real scenarios that you might
encounter on the job. Throughout this
program, you’ll gain hands-on practice with detecting and responding to attacks, monitoring and
protecting networks, investigating incidents, and writing code
to automate tasks. The program is made up of
several courses that are designed to help you
land an entry-level job. You’ll learn about topics
like: core security concepts; security domains;
network security; computing basics,
including Linux and SQL; along with understanding assets, threats, and vulnerabilities. Our goal is to help you reach your goal of joining
the security industry. You’ll learn about
incident detection and response, as well as how to use programming languages,
like Python, to accomplish common
security tasks. You’ll also gain valuable job search strategies
that will benefit you as you begin to find and apply for jobs in the
security profession. Completing this Google
Career Certificate will help you develop
skills and learn how to use tools to prepare you for a job in a fast-growing,
high-demand field. The certificate is designed
to prepare you for a job in 3-6 months if you work on the
certificate part-time. Once you graduate, you can connect with over 200 employers who are interested in hiring Google Career Certificate
graduates, like you. Whether you’re looking
to switch jobs, start a new career, or level up your skills, this Google Career
Certificate can open doors to new
job opportunities. You don’t need prior
experience or knowledge in the security field because this certificate program
will begin with the basics. I’ll be by your side
throughout this first course, making sure that you’re learning the foundational
knowledge needed to succeed in the field. This program is also flexible. You can complete all of the courses in this
certificate on your own terms and at
your own pace, online. We’ve gathered some amazing
instructors to support you on your journey, and they’d like to introduce
themselves now: Hi! My name is Ashley, and I’m a Customer
Engineering Enablement Lead for Security
Operations Sales at Google. I’ll take you through
security domains, frameworks and controls, as well as common
security threats, risks, and vulnerabilities. You’ll also be introduced to common tools used by
security analysts. I can’t wait to get started! Hi there! My name is Chris, and I’m the Chief
Information Security Officer for Google Fiber. I’m excited to talk to you about the structure
of a network, network protocols,
common network attacks, and how to secure a network. Hi there! My name is Kim, and I’m a Technical
Program Manager at Google. I will guide you through
foundational computing skills that support the work
of a security analyst. We’ll also learn about
operating systems, the Linux command line, and SQL. Hi! My name is Da’Queshia, and I’m a Security
Engineer at Google. Together we’ll
explore protecting organizational assets
through a variety of security controls and develop a deeper understanding of
risks and vulnerabilities. Hi! My name is Dave, and I’m a Principal Security
Strategist at Google. In our time together,
we’ll learn about detecting and responding
to security incidents. You’ll also have the chance
to monitor and analyze network activity using
powerful security tools. Hello! I’m Angel, and I’m a Security
Engineer at Google. We’ll explore foundational
Python programming concepts to help you automate
common security tasks. Hello! I’m Dion. I’m a Program Manager at Google. I’m your instructor for the first portion of the
final course of the program. There, we’ll discuss
how to escalate incidents and communicate
with stakeholders. And my name is Emily. I’m a
Program Manager at Google. I’ll guide you through
the final portion of the program and share
ways that you can engage with the
security community and prepare for your
upcoming job search. And, as you already know, I’ll guide you through the
first course of this program. This is such a great time to grow your career in
the field of security. Sound exciting?
Let’s get started!
Reading: Google Cybersecurity Certificate overview
Reading
Hello, and welcome to the Google Cybersecurity Certificate! In this program, you will explore the growing field of cybersecurity, learn how cybersecurity is crucial to organizations and the people they serve, and develop relevant skills for a future career in the field. By completing the eight courses in this certificate program, you’ll prepare for entry-level jobs in cybersecurity, such as cybersecurity analyst, security analyst, and security operations center (SOC) analyst. No prior experience in cybersecurity is required to complete this program.
Enter a growing field
Why are skills in cybersecurity in such high demand? The world is undergoing a digital transformation. Every day, global access to the internet is expanding, introducing more devices, more applications, and an even larger amount of data to the World Wide Web. As a result, threats, risks, and vulnerabilities are expanding and causing a significant amount of harm to organizations and people. Cybersecurity professionals are in high demand to help keep organizations, people, and data safe.
Throughout the program, you will have multiple opportunities to develop your cybersecurity knowledge and skills. You will explore concepts and scenarios to learn what an entry-level cybersecurity analyst must know and be able to do to thrive in the cybersecurity profession.
Google Cybersecurity Certificate courses
The Google Cybersecurity Certificate has eight courses that focus and build upon core concepts and skills related to the daily work of cybersecurity professionals, including foundational cybersecurity models and frameworks that are used to mitigate risk; protecting networks and data; using programming to automate tasks; identifying and responding to security incidents; and communicating and collaborating with stakeholders. Additionally, you will apply what you’ve learned in each course by completing portfolio projects that can be used to showcase your understanding of essential cybersecurity concepts to potential employers. The courses of the program are as follows:
- Foundations of Cybersecurity (current course)
- Play It Safe: Manage Security Risks
- Connect and Protect: Networks and Network Security
- Tools of the Trade: Linux and SQL
- Assets, Threats, and Vulnerabilities
- Sound the Alarm: Detection and Response
- Automate Cybersecurity Tasks with Python
- Put It to Work: Prepare for Cybersecurity Jobs
Benefits for job seekers
After completing all eight courses, Google Cybersecurity Certificate graduates have access to job search resources, courtesy of Google. You’ll have the opportunity to:
- Build your resume, participate in mock interviews, and receive job search tips through Big Interview, a job-training platform that’s free for program graduates.
- Improve your interview technique with Interview Warmup, a tool built by Google with certificate graduates in mind. Access cybersecurity-specific practice questions, transcripts of your responses, and automatic insights that help you grow your skills and confidence.
- Access thousands of job postings and free one-on-one career coaching with Career Circle. (You must be eligible to work in the U.S. to join.)
- Claim your Google Cybersecurity Certificate badge, and share your achievement on LinkedIn® professional networking services to stand out among other candidates to potential employers.
- Prepare for the CompTIA Security+ exam, the industry-leading certification for cybersecurity roles. You’ll earn a dual credential when you complete both the Google Cybersecurity Certificate and the CompTIA Security+ exam.
Congratulations on taking this first step to build your skills for a career in cybersecurity. Enjoy the journey!
Reading: Course 1 overview
Video: Welcome to week 1
- This course will introduce you to the world of security and how it’s used to protect business operations, users, and devices.
- You will learn about foundational security concepts, including the definition of security, common job responsibilities of security analysts, core skills of a security analyst, and the value of security for protecting organizations and people.
- You will also learn about eight security domains, common security frameworks and controls, and common tools and programming languages that entry-level security analysts may use.
- Finally, you will learn about resources that will help you get the most out of this program.
Here are some additional points that you may want to include in your summary:
- This course is designed to give you a foundation in security so that you can contribute to the creation of a safer internet for all.
- The course is comprehensive and covers a wide range of security topics.
- The course is taught by experienced security professionals who will share their knowledge and expertise with you.
- The course is self-paced and flexible, so you can learn at your own pace.
Hi again! Now that you have some idea of what to expect
from the program as a whole, let’s discuss more about what you’ll learn
in this course. This course will
introduce you to the world of security
and how it’s used to protect business
operations, users, and devices, so you can contribute
to the creation of a safer internet for all. In this section, we’ll cover foundational
security concepts. First, we’ll define security. Then, we’ll explore common job responsibilities
of security analysts. Building on that, we’ll cover core skills a security
analyst may have. Finally, we’ll
discuss the value of security for protecting
organizations and people. Later on, we’ll cover
eight security domains. Then, we’ll cover common security
frameworks and controls. Finally, we’ll wrap up the course by
discussing common tools and programming languages that entry-level security
analysts may use. Coming up, we’ll go over
some resources that will allow you to get the
most out of this program. I’m really excited
for you to start this journey–let’s begin!
Introduction to cybersecurity
Video: Introduction to cybersecurity
- Security is the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.
- Security teams protect against external and internal threats. External threats are from someone outside of the organization trying to gain access to private information, networks or devices. Internal threats come from current or former employees, external vendors, or trusted partners.
- Security teams also ensure an organization meets regulatory compliance, or laws and guidelines, that require the implementation of specific security standards.
- Security teams maintain and improve business productivity by establishing a plan for business continuity.
- Security teams also maintain brand trust by protecting customer data.
- Some common security-based roles include security analyst, cybersecurity analyst, security operation center (SOC) analyst, and information security analyst.
The passage compares the preparation for a security incident to the preparation for a storm. Just like we prepare for a storm by securing our homes and gathering the necessary supplies, organizations should prepare for security incidents by implementing security measures and having a plan in place to respond to incidents.
What is cybersecurity?
Cybersecurity is the practice of protecting systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a broad field that encompasses a wide range of topics, including:
- Network security
- Endpoint security
- Application security
- Data security
- Identity and access management (IAM)
- Risk management
- Compliance
Why is cybersecurity important?
Cybersecurity is important because it protects our critical infrastructure, our personal information, and our financial assets. In today’s digital world, we are all connected to the internet, and our data is constantly being transmitted and stored online. This makes us vulnerable to cyberattacks.
Cyberattacks can have a devastating impact on individuals and organizations. They can lead to data breaches, financial losses, and even physical harm. According to the Ponemon Institute, the average cost of a data breach is now $3.86 million.
What are the different types of cyberattacks?
There are many different types of cyberattacks, but some of the most common include:
- Phishing: This is a type of social engineering attack where the attacker sends an email or text message that appears to be from a legitimate source, such as a bank or credit card company. The email or text message will often contain a link or attachment that, when clicked, will install malware on the victim’s computer.
- Malware: This is software that is designed to harm a computer system. Malware can be installed on a computer through a variety of ways, such as clicking on a malicious link, opening an infected attachment, or downloading a file from an untrusted source.
- Ransomware: This is a type of malware that encrypts the victim’s files and demands a ransom payment in order to decrypt them.
- Denial-of-service (DoS) attacks: These attacks are designed to overwhelm a computer system with traffic, making it unavailable to its intended users.
- Zero-day attacks: These are attacks that exploit vulnerabilities in software that the software vendor is not aware of. Zero-day attacks are often the most difficult to defend against.
How can I protect myself from cyberattacks?
There are a number of things you can do to protect yourself from cyberattacks, including:
- Use strong passwords and don’t reuse them across different websites and services.
- Be careful about what links you click on and what attachments you open.
- Keep your software up to date.
- Install antivirus and anti-malware software and keep it up to date.
- Be aware of the latest cyberattacks and how to protect yourself from them.
How can I become a cybersecurity professional?
If you are interested in a career in cybersecurity, there are a number of things you can do to prepare. You can get a degree in cybersecurity, take online courses, or get certified. You can also gain experience by working in IT or another related field.
Cybersecurity is a growing field with many opportunities. If you are interested in protecting people and organizations from cyberattacks, then a career in cybersecurity may be the right choice for you.
Fill in the blank: Cybersecurity is the practice of ensuring ___. Select three answers.
integrity, availability of information, confidentiality
Confidentiality, integrity, and availability of information are ensured through the effective practice of security. This involves protecting networks, devices, people, and data from unauthorized access or criminal exploitation.
Imagine that you’re
preparing for a storm. You’ve received notification
that a storm is coming. You prepare by gathering the tools and materials
you’ll need to stay safe. You make sure your windows
and doors are secure. You assemble a first aid kit, tools, food and water.
You’re prepared. The storm hits and there are powerful winds and heavy rain. The storm is using its force
to try and breach your home. You notice some water leaks and begin patching them quickly in order to minimize any
risk or potential damage. Handling a security
incident is no different. Organizations must prepare for
the storm by ensuring they have the tools to mitigate and quickly respond to
outside threats. The objective is to minimize
risk and potential damage. As a security analyst, you’ll work to protect your organization and the
people it serves from a variety of risks and outside threats. And if a threat
does get through, you and your team will provide a solution to remedy
the situation. To help you better
understand what this means, we’ll define
security and discuss the roles of security
professionals in organizations. Let’s start with
some definitions: Cybersecurity, or
security, is the practice of ensuring
confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or
criminal exploitation. For example, requiring complex passwords
to access sites and services improves
confidentiality by making it much
more difficult for a threat actor to
compromise them. A threat actor is any person or group who presents
a security risk. Now that you know the
definition of security, let’s discuss what security
teams do for an organization. Security protects against
external and internal threats. An external threat is someone
outside of the organization trying to gain access to private information,
networks or devices. An internal threat comes from current or
former employees, external vendors, or
trusted partners. Often these internal
threats are accidental, such as an employee clicking on a compromised link in an email. Other times, the internal
actor intentionally engages in activities such as
unauthorized data access or abusing systems
for personal use. Experienced security
professionals will help organizations mitigate or reduce the impact
of threats like these. Security teams also ensure an organization meets
regulatory compliance, or laws and guidelines, that require the implementation of
specific security standards. Ensuring that
organizations are in compliance may allow
them to avoid fines and audits, while also upholding their ethical obligation
to protect users. Security teams also maintain and improve business
productivity. By establishing a plan
for business continuity, security teams allow
people to do their jobs, even in the case of something
like a data breach. Being security
conscious can also reduce expenses
associated with risks, such as recovering
from data loss or operational downtime, and
potentially avoiding fines. The last benefit of
security that we’ll discuss is maintaining
brand trust. If services or customer
data are compromised, this can lower trust
in the organization, damage the brand, and hurt the
business in the long term. Loss of customer trust may also lead to less revenue
for the business. Now, let’s go over some
common security-based roles. After completing this
certificate program, here are some job titles
you may want to search for: Security analyst or specialist, Cybersecurity analyst
or specialist, Security operation center or SOC analyst, Information
security analyst. You’ll also learn more
about the responsibilities associated with some of these job titles
later in the program. As you may now realize, the field of security includes many topics and concepts and every activity you complete in this program moves you one
step closer to a new job. Let’s keep learning together.
Video: Toni: My path to cybersecurity
- Toni is a Security Engineering Manager at Google.
- She grew up as an army brat and was always interested in security and international relations.
- She started her career as an intelligence analyst, but eventually transitioned into cybersecurity.
- The transition was challenging, but she learned a lot on the job and through self-paced learning.
- She found that she works best with a structured learning style and recommends online courses and resources that take material from first principles to application.
- She also emphasizes the importance of working well with teammates and asking questions.
- Her advice for aspiring cybersecurity professionals is to stay curious and keep learning, especially focusing on technical skills.
- She also warns against imposter syndrome, which is common in cybersecurity because the field is so broad.
Here are some key takeaways from Toni’s story:
- Cybersecurity is a broad field that requires a variety of skills.
- It is important to be able to learn on the job and be open to feedback.
- Networking with other cybersecurity professionals is a great way to learn and grow.
- Don’t be afraid to ask questions.
- Imposter syndrome is common in cybersecurity, but it’s important to push through it and keep learning.
Hi, I’m Toni, I’m a Security
Engineering Manager. Our teams protect Google and its users from serious threats. Usually government-backed
attackers, coordinated influence
operations and serious cybercrime
threat actors. I grew up as an army brat. My dad was in the military
and we moved around a lot. I’ve always had an interest
in security sort of generally. I got really hooked
on international relations when I
was in high school. I did a lot of Model
United Nations. And that really sort of brought these
two things together for me, the way that security
works in the world. I come from a big family. I knew I was going
to need financial assistance to go to college. And the Department of
Defense provides a lot of educational
opportunities that are tied to service. So this was a natural fit for me. I knew I was interested in this area and this was going to provide a career path into something I was
passionate about. I started as an
intelligence analyst, but not focused
on cybersecurity. I worked counterinsurgency
for a number of years and geopolitical
intelligence issues. Eventually, as I
looked and saw that the way that cybersecurity
was starting to have an impact both in our daily lives and in that world of
international relations, I got more and more drawn to it. Transitioning into cybersecurity
was a huge shift for me. I came in without a solid
technical background, had to learn a lot of
that on the job and through self-paced learning in different types of courses, I needed to learn
programming languages like Python and SQL, two of the things that we
cover in this certificate, I needed to learn a
whole new language about the vocabulary of threats and the
different components and how those
manifest technically. One of the things that I had
to figure out very early in this journey is
what kind of learner I was. I work best with a
structured learning style. So turning to a lot of these online courses
and resources that took this material and
structured it sort of from first principles
through application resonated very well for me. A lot of this was
also learned on the job by co-workers who were willing to share and invest time in helping me
understand this. I asked a lot of
questions and I still do. Most of cybersecurity work
is going to be learned on the job in the specific environment that
you’re protecting. So you have to work well with
your teammates in order to be able to build
that knowledge base. My advice would be to stay
curious and keep learning, especially focusing on
your technical skills and growing those
throughout your career. It’s really easy to get imposter syndrome in
cybersecurity because it’s so broad and mastery of all these different areas
is a lifetime’s work. And sometimes that
imposter syndrome can shut us down and
make it feel like, why bother trying
to keep growing. I’m never going to
be able to master this instead of motivating us. So keep learning, push
through that fear. The efforts always
going to be rewarded.
Video: Responsibilities of an entry-level cybersecurity analyst
- Security analysts are responsible for monitoring and protecting information and systems.
- They do this by protecting computer and network systems, proactively working to prevent threats, and conducting periodic security audits.
- To protect computer and network systems, security analysts monitor an organization’s internal network and respond to threats. They also participate in penetration testing and ethical hacking exercises to identify vulnerabilities.
- To proactively prevent threats, security analysts work with IT teams to install prevention software and identify risks and vulnerabilities. They may also be involved in software and hardware development to support product security.
- To conduct periodic security audits, security analysts review an organization’s security records, activities, and other documents. They may also examine in-house security issues, such as making sure that confidential information is not accessible to unauthorized users.
Here are some key takeaways from the video:
- Security analysts play an important role in protecting organizations from cyberattacks.
- The job of a security analyst is challenging and requires a variety of skills, including technical skills, problem-solving skills, and communication skills.
- If you are interested in a career in cybersecurity, a security analyst position is a great way to get started.
Technology is
rapidly changing and so are the tactics and
techniques that attackers use. As digital
infrastructure evolves, security professionals are
expected to continually grow their skills in order to protect and secure
sensitive information. In this video, we’ll discuss some job responsibilities of an entry-level security analyst. So, what do security analysts do? Security analysts
are responsible for monitoring and protecting
information and systems. Now, we’ll discuss three
primary responsibilities of a security analyst, starting with protecting
computer and network systems. Protecting computer and
network systems requires an analyst to monitor an
organization’s internal network. If a threat is detected, then an analyst is generally
the first to respond. Analysts also often take
part in exercises to search for weaknesses in an
organization’s own systems. For example, a
security analyst may contribute to penetration
testing or ethical hacking. The goal is to penetrate or hack their own organization’s
internal network to identify vulnerabilities and suggest ways to strengthen
their security measures. Think of it like this. After you lock your car, you check the door
handles to make sure no one can access any
valuables you keep inside. Security analysts also
proactively work to prevent threats from
happening in the first place. One way they do this
is by working with information technology,
or IT, teams to install prevention software
for the purposes of identifying risks
and vulnerabilities. Analysts may also be involved in software and
hardware development. They’ll often work with
development teams to support product
security by setting up appropriate processes
and systems to meet the organization’s
data protection needs. The last task we’ll discuss is conducting periodic
security audits. A security audit is a review of an organization’s
security records, activities, and other
related documents. For example, an analyst may examine in-house
security issues, such as making sure that
confidential information, like individual
computer passwords, isn’t available
to all employees. Phew, that was a lot to cover! But hopefully you have
a general idea of what entry-level security analysts
do on a day-to-day basis. Security analysts are an important part of
any organization. Their daily tasks protect
small businesses, large companies, nonprofit organizations,
and government agencies. They also help to
ensure that the people served by those
organizations remain safe.
Video: Nikki: A day in the life of a security engineer
- Nikki is a security engineer at Google.
- She is part of the insider threat detection team, which is responsible for catching insider threats or suspicious activity within the company.
- Nikki’s first experience with cybersecurity was when she was interning at the aquarium.
- She chose to pursue a career in cybersecurity because of the flexible career path and the opportunity to protect user data.
- A day in the life of an entry-level security professional can vary, but it typically involves responding to detections and doing investigations, as well as working on projects to improve security.
- The main difference between an entry-level cybersecurity analyst and an entry-level cybersecurity engineer is that the analyst is more focused on operations, while the engineer is also responsible for building detections and working on projects.
- Nikki’s favorite task is doing investigations because she enjoys solving problems and protecting user data.
- One of the biggest ways she has made an impact as an entry-level cybersecurity professional is by working on playbooks that help other analysts investigate incidents.
- If you love solving problems, protecting user data, and being at the front lines of cybersecurity, then a career in cybersecurity may be a good fit for you.
Here are some key takeaways from the video:
- Cybersecurity is a broad field with many different career paths.
- Entry-level cybersecurity professionals typically have a variety of responsibilities, including responding to detections, doing investigations, and working on projects.
- The main difference between an entry-level cybersecurity analyst and an entry-level cybersecurity engineer is that the analyst is more focused on operations, while the engineer is also responsible for building detections and working on projects.
- If you are interested in a career in cybersecurity, it is important to have strong problem-solving and analytical skills, as well as a passion for protecting user data.
[MUSIC] My name is Nikki and
I’m a security engineer at Google. I am part of the insider threat detection
team at Google, so my role is more focused on catching insider threats or insider
suspicious activity within the company. My first experience with cybersecurity
was when I was interning at the aquarium. I learned a lot of network security there,
they had a lot of phishing attempts, of course, you know, at the aquarium. My manager was really focused on making
sure that our networks were secure and I learned a lot from him and that really
sparked my interest in cybersecurity. The main reason I chose to pursue a career
in cybersecurity is just how flexible the career path is. Once you’re in security, there’s so
many different fields you can dive into. Whether it’s through the blue team,
protecting the user or the red team, which is just, you know, poking
holes in other people’s defenses and letting them know where
they’re going wrong. A day in the life as a entry-
level security professional? Um, it can change day to day, but
there’s two basic parts to it. There’s the operation side,
which is responding to detections and doing investigations. And then there’s the project side where
you’re working with other teams to build new detections or
improve the current detections. The difference between this entry-
level cybersecurity analyst and an entry-level cybersecurity engineer
is pretty much that the analyst is more focused on operations and
the engineer, while they can do operations,
they also build the, the detections and they do more project focused work. My favorite task is probably
the operations side doing investigations because we can sometimes get something
like this actor did such and such on this day. And we’re supposed to then dive
into what they’ve been doing, what they’ve been working on to figure
out if there’s any suspicious activity or if it was just a false positive. One of the biggest ways I’ve made
an impact as an entry-level cybersecurity professional is actually working
on the playbooks that, um, our team uses. A playbook is a list of how to go
through a certain detection, and what the analyst needs to look at in
order to investigate those incidents. I was really proud of those, those playbooks
that I’ve made so far because a lot of my teammates have even said how
helpful they’ve been to them. If you love solving problems,
if you love protecting user data, being at the front lines of a lot of headlines,
then this is definitely the role for you.
Reading: Common cybersecurity terminology
Reading
As you’ve learned, cybersecurity (also known as security) is the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation. In this reading, you’ll be introduced to some key terms used in the cybersecurity profession. Then, you’ll be provided with a resource that’s useful for staying informed about changes to cybersecurity terminology.
Key cybersecurity terms and concepts
There are many terms and concepts that are important for security professionals to know. Being familiar with them can help you better identify the threats that can harm organizations and people alike. A security analyst or cybersecurity analyst focuses on monitoring networks for breaches. They also help develop strategies to secure an organization and research information technology (IT) security trends to remain alert and informed about potential threats. Additionally, an analyst works to prevent incidents. In order for analysts to effectively do these types of tasks, they need to develop knowledge of the following key concepts.
Compliance is the process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches.
Security frameworks are guidelines used for building plans to help mitigate risks and threats to data and privacy.
Security controls are safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture.
Security posture is an organization’s ability to manage its defense of critical assets and data and react to change. A strong security posture leads to lower risk for the organization.
A threat actor, or malicious attacker, is any person or group who presents a security risk. This risk can relate to computers, applications, networks, and data.
An internal threat can be a current or former employee, an external vendor, or a trusted partner who poses a security risk. At times, an internal threat is accidental. For example, an employee who accidentally clicks on a malicious email link would be considered an accidental threat. Other times, the internal threat actor intentionally engages in risky activities, such as unauthorized data access.
Network security is the practice of keeping an organization’s network infrastructure secure from unauthorized access. This includes data, services, systems, and devices that are stored in an organization’s network.
Cloud security is the process of ensuring that assets stored in the cloud are properly configured, or set up correctly, and access to those assets is limited to authorized users. The cloud is a network made up of a collection of servers or computers that store resources and data in remote physical locations known as data centers that can be accessed via the internet. Cloud security is a growing subfield of cybersecurity that specifically focuses on the protection of data, applications, and infrastructure in the cloud.
Programming is a process that can be used to create a specific set of instructions for a computer to execute tasks. These tasks can include:
- Automation of repetitive tasks (e.g., searching a list of malicious domains)
- Reviewing web traffic
- Alerting suspicious activity
Key takeaways
Understanding key technical terms and concepts used in the security field will help prepare you for your role as a security analyst. Knowing these terms can help you identify common threats, risks, and vulnerabilities. To explore a variety of cybersecurity terms, visit the National Institute of Standards and Technology glossary. Or use your browser to search for high-quality, reliable cybersecurity glossaries from research institutes or governmental authorities. Glossaries are available in multiple languages.
Practice Quiz: Test your knowledge: Introduction to cybersecurity
Fill in the blank: Cybersecurity is the practice of ensuring _ by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.
confidentiality, integrity, and availability of information
Cybersecurity is the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.
What are the primary responsibilities of an entry-level security analyst? Select three answers.
Search for weaknesses, Protect information, Monitor systems
The primary responsibilities of an entry-level security analyst are as follows: Monitor systems, protect information, and search for weaknesses.
Fill in the blank: Performing _ enables security professionals to review an organization’s security records, activities, and related documents.
security audits
In what ways do security teams bring value to an organization? Select two answers.
- Protecting against external and internal threats
- Achieving regulatory compliance
Achieving regulatory compliance and protecting against external and internal threats are ways that security teams bring value to an organization.
Core skills for cybersecurity professionals
Video: Core skills for cybersecurity professionals
- Security analysts need both transferable and technical skills.
- Transferable skills are skills that can be applied to different careers, such as communication, collaboration, problem-solving, and analytical thinking.
- Technical skills are skills that are specific to the security field, such as programming, SIEM, and computer forensics.
- Security analysts need to have a diverse background and be intellectually curious in order to keep up with the ever-changing security landscape.
Here are some specific examples of how transferable skills can be applied in a security analyst role:
- Communication: Security analysts need to be able to communicate technical information to non-technical audiences. For example, they may need to explain a security policy to a business manager or write a report about a security incident for executives.
- Collaboration: Security analysts often work on teams with other security professionals, engineers, and IT staff. They need to be able to collaborate effectively to identify and mitigate security threats.
- Problem-solving: Security analysts need to be able to identify and solve security problems. This requires the ability to think critically and creatively.
- Analytical thinking: Security analysts need to be able to analyze security data and identify trends. This helps them to identify potential threats and vulnerabilities.
Here are some specific examples of technical skills that are important for security analysts:
- Programming: Security analysts can use programming languages to automate tasks, develop security tools, and analyze security data.
- SIEM: Security information and event management (SIEM) tools are used to collect and analyze security logs. Security analysts use SIEM tools to identify and investigate security threats.
- Computer forensics: Computer forensics is the process of recovering and analyzing digital evidence. Security analysts use computer forensics to investigate security incidents.
The video also emphasizes the importance of intellectual curiosity and the willingness to learn new things for security analysts. The security landscape is constantly changing, so security analysts need to be able to keep up with the latest threats and technologies.
Transferable Skills
- Communication: Cybersecurity professionals need to be able to communicate effectively with a variety of stakeholders, including technical and non-technical audiences. They need to be able to explain complex security concepts in a clear and concise way.
- Collaboration: Cybersecurity professionals often work on teams with other security professionals, engineers, and IT staff. They need to be able to collaborate effectively to identify and mitigate security threats.
- Problem-solving: Cybersecurity professionals need to be able to identify and solve security problems. This requires the ability to think critically and creatively.
- Analytical thinking: Cybersecurity professionals need to be able to analyze security data and identify trends. This helps them to identify potential threats and vulnerabilities.
- Attention to detail: Cybersecurity professionals need to be able to pay attention to detail in order to identify and prevent security threats.
- Resilience: Cybersecurity professionals need to be able to handle stress and setbacks. The security field is constantly evolving, and cybersecurity professionals need to be able to adapt to new threats and technologies.
Technical Skills
- Networking: Cybersecurity professionals need to have a strong understanding of networking concepts and technologies. This includes understanding how networks work, how data is transmitted, and how vulnerabilities can be exploited.
- Systems administration: Cybersecurity professionals need to have the skills to install, configure, and maintain computer systems. This includes understanding the operating system, software, and hardware.
- Programming: Cybersecurity professionals can use programming languages to automate tasks, develop security tools, and analyze security data.
- Security information and event management (SIEM): SIEM tools are used to collect and analyze security logs. Cybersecurity professionals use SIEM tools to identify and investigate security threats.
- Cloud security: Cybersecurity professionals need to have a strong understanding of cloud computing concepts and technologies. This includes understanding how cloud services work, how data is stored and protected, and how vulnerabilities can be exploited.
- Cyber forensics: Cyber forensics is the process of recovering and analyzing digital evidence. Cybersecurity professionals use cyber forensics to investigate security incidents.
Other Skills
- Security awareness: Cybersecurity professionals need to be aware of the latest security threats and vulnerabilities. They need to stay up-to-date on the latest security news and trends.
- Continuous learning: The security landscape is constantly changing, so cybersecurity professionals need to be lifelong learners. They need to be willing to learn new skills and technologies in order to stay ahead of the curve.
- Integrity: Cybersecurity professionals need to be trustworthy and ethical. They need to be able to keep sensitive information confidential and to act in the best interests of their organization.
These are just some of the core skills that are important for cybersecurity professionals. The specific skills that are required will vary depending on the specific job role and the organization. However, all cybersecurity professionals need to have a strong foundation in the core skills listed above.
If you are interested in a career in cybersecurity, there are many resources available to help you learn the skills you need. You can take courses, get certifications, and read books and articles on cybersecurity. You can also get involved in cybersecurity communities and participate in online forums and discussions.
The field of cybersecurity is constantly evolving, so it is important to stay up-to-date on the latest threats and technologies. You can do this by reading security news, attending conferences, and taking continuing education courses.
If you are passionate about protecting computer systems and networks from security threats, then a career in cybersecurity may be the right choice for you. With hard work and dedication, you can develop the skills you need to succeed in this exciting field.
What are some core skills entry-level security analysts need to develop? Select three answers.
Problem-solving, Communication, Programming
Some core skills entry-level analysts need to develop are programming, communication, and problem-solving skills.
For any job, you need certain
skills to be successful, and many of these
core skills are transferable from one
role to the next. No matter what job
you currently have, you likely have many
core skills already. Having a diverse background
enhances your core skills, which means your
personal experiences and perspectives are
especially valuable. In this video, we’ll discuss both transferable and
technical skills that are particularly useful for
a security analyst. Transferable skills
are skills from other areas that can apply
to different careers. Technical skills may apply to several professions as well. However, at times they
may require knowledge of specific tools,
procedures, and policies. Let’s discuss some core transferable skills
you may already have that will benefit you in a career as a
security analyst. Communication is a
transferable skill for a security analyst. They will often need to describe
certain threats, risks, or vulnerabilities to people who may not have a
technical background. For example, security
analysts may be tasked with interpreting and
communicating policies and procedures to
other employees. Or analysts may be asked
to report findings to their supervisors, so
the appropriate actions can be taken to secure
the organization. Another transferable
skill is collaboration. Security analysts often work
in teams with engineers, digital forensic investigators,
and program managers. For example, if you are working to roll out a new
security feature, you will likely have
a project manager, an engineer, and an ethical
hacker on your team. Security analysts also
need to be able to analyze complex scenarios
that they may encounter. For example, a security analyst may need to make recommendations
about how different tools can
support efficiency and safeguard an organization’s
internal network. The last transferable skill that we’ll discuss is
problem-solving. Identifying a security problem and then diagnosing
it and providing solutions is a necessary skill to keep business
operations safe. Understanding threat actors
and identifying trends can provide insight on how
to handle future threats. Okay, now that we’ve covered some important
transferable skills, let’s discuss some
technical skills that security analysts
need to develop. A basic understanding of programming languages is an important skill
to develop because security analysts can
use programming to automate tasks and
identify error messages. Like learning any
other language, learning a programming language may seem challenging at first. However, this
certificate program assumes no prior
programming experience, so we’ll start at
the very beginning and provide several
opportunities for hands-on practice with
languages like Python and SQL. Another important technical
skill is knowing how to use security information and event
management, or SIEM, tools. Security professionals use
SIEM tools to identify and analyze security threats,
risks, and vulnerabilities. For example, a SIEM
tool may alert you that an unknown user
has accessed the system. In the event of an unknown
user accessing the system, you may use computer forensics to investigate the incident. Now, let’s discuss
computer forensics. Similar to an investigator and a forensic scientist working in the criminal justice system, digital forensic
investigators will attempt to identify, analyze, and preserve criminal
evidence within networks, computers, and
electronic devices. Keep in mind that
you may already have some of the core skills
we’ve discussed. And if you don’t have the
technical skills, that’s okay! This program is designed to support you in
learning those skills. For example, over the past seven years
working in cybersecurity, I’ve learned that security
analysts need to have intellectual curiosity
and the motivation to keep learning in
order to succeed. Personally, I dedicate time on a regular basis
towards learning more Python and SQL
skills in order to meet the demands of the
projects I’m working on. You’ll get to learn
about Python and SQL later in this program. As you continue this journey, you’ll build the
knowledge and skills you need to enter
the security field.
Video: Veronica: My path to working in cybersecurity
- Veronica is a security engineer at Google. She loves her job and feels lucky to get to do something that she is passionate about.
- Veronica did not have a technical background when she first started her career. She worked as an IT resident at Google and learned analytical thinking skills, troubleshooting, and debugging.
- Veronica didn’t realize she had transferable skills until she got into her role in cybersecurity. She then took it upon herself to learn more about cybersecurity by talking to security engineers.
- Veronica believes that anyone can be successful in cybersecurity, regardless of their background. She also believes that it is important to ask for help and to not be afraid to take risks.
- Veronica’s advice to aspiring cybersecurity professionals is to not be afraid to shoot their shot and to not let perfectionism get in the way of their goals.
Here are some of the key points from Veronica’s story:
- Cybersecurity is a fulfilling career that can be enjoyed by people with different backgrounds.
- It is important to have transferable skills, such as analytical thinking and troubleshooting.
- It is also important to be willing to learn and to ask for help.
- Perfectionism can be a barrier to success, so it is important to be willing to take risks and to learn from mistakes.
Hi, I’m Veronica and I’m a
security engineer at Google. My journey into
cybersecurity has changed my life for the
better in so many ways. The most important part
is fulfilling work. I get to do something
that I absolutely love and that I’m
super interested in, and I feel very lucky that this is what I
get to do for work. Before I entered
my current field, I had no idea what
cybersecurity was. My knowledge of cybersecurity was using secure passwords, and that was about it. So if you asked me, you know, would I be in cybersecurity five years ago? I would’ve said, what is that? Someone without a
technical background can 100% be
successful in cybersecurity. My path to my current
role in cybersecurity started as an IT resident here at Google
staff in Techstop. I learned a lot of
analytical thinking skills, working on a help desk,
troubleshooting, debugging. I didn’t realize I had
transferable skills until I got into my
role in cybersecurity. And from there, I took
it upon myself to bug a bunch of
security engineers, interviewed a lot of them. I didn’t get here alone. It took a village of
mentors to get me here, so don’t be afraid
to ask for help. I don’t think someone needs a college degree to go
into cybersecurity. Some of the brightest minds that I get to work with
don’t have a college degree, so I think that’s one
of the best parts about the industry. Looking back at my career, I wish I would have known that I don’t have
to check all the boxes, that I don’t have
to be an expert in the area to shoot my shot, and I also wish I
would’ve known that perfectionism can get in the way of what you want to achieve.
Reading: Transferable and technical cybersecurity skills
Reading
Previously, you learned that cybersecurity analysts need to develop certain core skills to be successful at work. Transferable skills are skills from other areas of study or practice that can apply to different careers. Technical skills may apply to several professions, as well; however, they typically require knowledge of specific tools, procedures, and policies. In this reading, you’ll explore both transferable skills and technical skills further.
Transferable skills
You have probably developed many transferable skills through life experiences; some of those skills will help you thrive as a cybersecurity professional. These include:
- Communication: As a cybersecurity analyst, you will need to communicate and collaborate with others. Understanding others’ questions or concerns and communicating information clearly to individuals with technical and non-technical knowledge will help you mitigate security issues quickly.
- Problem-solving: One of your main tasks as a cybersecurity analyst will be to proactively identify and solve problems. You can do this by recognizing attack patterns, then determining the most efficient solution to minimize risk. Don’t be afraid to take risks, and try new things. Also, understand that it’s rare to find a perfect solution to a problem. You’ll likely need to compromise.
- Time management: Having a heightened sense of urgency and prioritizing tasks appropriately is essential in the cybersecurity field. So, effective time management will help you minimize potential damage and risk to critical assets and data. Additionally, it will be important to prioritize tasks and stay focused on the most urgent issue.
- Growth mindset: This is an evolving industry, so an important transferable skill is a willingness to learn. Technology moves fast, and that’s a great thing! It doesn’t mean you will need to learn it all, but it does mean that you’ll need to continue to learn throughout your career. Fortunately, you will be able to apply much of what you learn in this program to your ongoing professional development.
- Diverse perspectives: The only way to go far is together. By having respect for each other and encouraging diverse perspectives and mutual respect, you’ll undoubtedly find multiple and better solutions to security problems.
Technical skills
There are many technical skills that will help you be successful in the cybersecurity field. You’ll learn and practice these skills as you progress through the certificate program. Some of the tools and concepts you’ll need to use and be able to understand include:
- Programming languages: By understanding how to use programming languages, cybersecurity analysts can automate tasks that would otherwise be very time consuming. Examples of tasks that programming can be used for include searching data to identify potential threats or organizing and analyzing information to identify patterns related to security issues.
- Security information and event management (SIEM) tools: SIEM tools collect and analyze log data, or records of events such as unusual login behavior, and support analysts’ ability to monitor critical activities in an organization. This helps cybersecurity professionals identify and analyze potential security threats, risks, and vulnerabilities more efficiently.
- Intrusion detection systems (IDSs): Cybersecurity analysts use IDSs to monitor system activity and alerts for possible intrusions. It’s important to become familiar with IDSs because they’re a key tool that every organization uses to protect assets and data. For example, you might use an IDS to monitor networks for signs of malicious activity, like unauthorized access to a network.
- Threat landscape knowledge: Being aware of current trends related to threat actors, malware, or threat methodologies is vital. This knowledge allows security teams to build stronger defenses against threat actor tactics and techniques. By staying up to date on attack trends and patterns, security professionals are better able to recognize when new types of threats emerge such as a new ransomware variant.
- Incident response: Cybersecurity analysts need to be able to follow established policies and procedures to respond to incidents appropriately. For example, a security analyst might receive an alert about a possible malware attack, then follow the organization’s outlined procedures to start the incident response process. This could involve conducting an investigation to identify the root issue and establishing ways to remediate it.
CompTIA Security+
In addition to gaining skills that will help you succeed as a cybersecurity professional, the Google Cybersecurity Certificate helps prepare you for the CompTIA Security+ exam, the industry leading certification for cybersecurity roles. You’ll earn a dual credential when you complete both, which can be shared with potential employers. After completing all eight courses in the Google Cybersecurity Certificate, you will unlock a 30% discount for the CompTIA Security+ exam and additional practice materials.
Key takeaways
Understanding the benefits of core transferable and technical skills can help prepare you to successfully enter the cybersecurity workforce. Throughout this program, you’ll have multiple opportunities to develop these and other key cybersecurity analyst skills.
Video: The importance of cybersecurity
- Security is essential for ensuring an organization’s business continuity and ethical standing.
- There are both legal implications and moral considerations to maintaining an organization’s security.
- A data breach can affect an organization’s reputation as well as the lives and reputations of their users, clients, and customers.
- By maintaining strong security measures, organizations can increase user trust.
- Maintaining and securing user, customer, and vendor data is an important part of preventing incidents that may expose people’s personally identifiable information (PII).
- Sensitive personally identifiable information (SPII) is a specific type of PII that falls under stricter handling guidelines and may include social security numbers, medical or financial information, and biometric data, such as facial recognition.
- When a person’s identifiable information is compromised, leaked, or stolen, identity theft is the primary concern.
- Employers need security analysts to fill the current and future demand to protect data, products, and people while ensuring confidentiality, integrity, and safe access to information.
- The U.S. Bureau of Labor Statistics expects the demand for security professionals to grow by more than 30% by the year 2030.
Here are some of the key points from the text:
- Security is important because it protects organizations and individuals from harm.
- Security is also important for maintaining an organization’s reputation and ethical standing.
- Data breaches can have a significant negative impact on organizations and individuals.
- Strong security measures can help to prevent data breaches and other security incidents.
- Security professionals are in high demand and the demand is expected to grow in the future.
Cybersecurity is the practice of protecting systems, networks, and data from digital attacks. It is essential for businesses of all sizes, as well as individuals, to protect their information from cyber threats.
There are many reasons why cybersecurity is important. Here are a few of the most important reasons:
- To protect sensitive data: Businesses and individuals often store sensitive data on their computer systems and networks. This data can include financial information, personal identification information, and intellectual property. Cybersecurity helps to protect this data from unauthorized access, use, or disclosure.
- To prevent financial losses: Cyber attacks can lead to financial losses for businesses and individuals. For example, a data breach could allow criminals to steal credit card numbers or other financial information. This could lead to identity theft, fraud, and other financial crimes.
- To protect reputation: A data breach or other cyber attack can damage a business’s reputation. Customers may lose trust in a business that has been hacked, and this can lead to lost sales and revenue.
- To comply with regulations: Many businesses are subject to regulations that require them to protect their data. For example, financial institutions are subject to the Payment Card Industry Data Security Standard (PCI DSS), which requires them to implement specific security measures to protect customer credit card data.
- To protect national security: Cyber attacks can also pose a threat to national security. For example, a cyber attack could be used to disrupt critical infrastructure or steal sensitive government information.
There are many things that businesses and individuals can do to improve their cybersecurity posture. Here are a few tips:
- Use strong passwords and keep them updated: Passwords should be at least 12 characters long and should include a mix of letters, numbers, and symbols. Passwords should be changed regularly.
- Use multi-factor authentication: Multi-factor authentication adds an extra layer of security by requiring users to provide two or more pieces of information to authenticate themselves. For example, users may be required to enter their password and a code that is sent to their phone.
- Keep software up to date: Software updates often include security patches that fix vulnerabilities. It is important to install software updates as soon as they are available.
- Be careful about what you click on: Phishing emails and malicious websites are often used to spread malware. It is important to be careful about what links you click on and what attachments you open.
- Back up your data: In the event of a data breach, it is important to have a backup of your data. This will help you to recover your data if it is lost or stolen.
Cybersecurity is a complex and ever-evolving field. However, by following these tips, businesses and individuals can improve their cybersecurity posture and protect themselves from cyber threats.
As we’ve discussed, security professionals
protect many physical and digital assets. These skills are desired
by organizations and government entities because
risk needs to be managed. Let’s continue to discuss
why security matters. Security is essential for ensuring
an organization’s business continuity and ethical standing. There are both legal implications and moral considerations to maintaining
an organization’s security. A data breach, for example, affects everyone that is
associated with the organization. This is because data losses or leaks
can affect an organization’s reputation as well as the lives and reputations
of their users, clients, and customers. By maintaining strong security measures,
organizations can increase user trust. This may lead to financial growth and
ongoing business referrals. As previously mentioned, organizations are not the only ones
that suffer during a data breach. Maintaining and
securing user, customer, and vendor data is an important part
of preventing incidents that may expose people’s personally
identifiable information. Personally identifiable
information, known as PII, is any information used to infer
an individual’s identity. PII includes someone’s full name,
date of birth, physical address,
phone number, email address, internet protocol, or IP address and
similar information. Sensitive personally
identifiable information, known as SPII, is a specific type of PII that
falls under stricter handling guidelines and may include social security numbers,
medical or financial information, and
biometric data, such as facial recognition. If SPII is stolen,
this has the potential to be significantly more damaging to an individual
than if PII is stolen. PII and SPII data are key assets
that a threat actor will look for if an organization experiences a breach. When a person’s identifiable
information is compromised, leaked, or stolen,
identity theft is the primary concern. Identity theft is the act of stealing
personal information to commit fraud while impersonating a victim. And the primary objective of
identity theft is financial gain. We’ve explored several
reasons why security matters. Employers need security analysts
like you to fill the current and future demand to protect data,
products, and people while ensuring confidentiality, integrity, and
safe access to information. This is why the U.S. Bureau of
Labor Statistics expects the demand for security professionals to grow by
more than 30% by the year 2030. So keep learning, and eventually you’ll be
able to do your part to create a safer and more secure environment for
organizations and people alike!
Practice Quiz: Test your knowledge: Core skills for cybersecurity professionals
Which of the following proficiencies are transferable skills, likely to be applicable in almost any field? Select three answers.
Written and verbal communication, Problem-solving, Analysis
Analysis, problem-solving, and written and verbal communication skills are transferable entry-level security analyst skills.
Which of the following proficiencies are technical skills that are needed to become an entry-level security analyst? Select two answers.
Data analysis, Programming
Programming and data analysis are technical skills, which are needed to become an entry-level security analyst.
Fill in the blank: _ identify, analyze, and preserve criminal evidence within networks, computers, and electronic devices.
Digital forensic investigators
Digital forensic investigators identify, analyze, and preserve criminal evidence within networks, computers, and electronic devices.
What are examples of sensitive personally identifiable information (SPII) that cybersecurity professionals need to protect? Select two answers.
Medical records, Bank account numbers
Medical records and bank account numbers are examples of sensitive personally identifiable information. SPII is a specific type of PII that requires stricter protections because it can be significantly more damaging to individuals if it is stolen.
Review: Welcome to the exciting world of cybersecurity
Video: Wrap-up
The first section of the course covered the basics of security, including:
- What is security?
- The benefits of implementing security in an organization
- Different job responsibilities in security, such as managing threats and installing prevention software
- Important core skills for security professionals, such as collaboration and computer forensics
- The value of security and how it supports critical business functions
The section ended with a call to action to continue learning about security and to explore some well-known attacks that shaped the security industry.
Here is a more detailed summary of each topic:
- What is security? Security is the protection of assets, such as data, systems, and people, from unauthorized access, use, disclosure, disruption, modification, or destruction.
- The benefits of implementing security in an organization There are many benefits to implementing security in an organization, including:
- Protecting sensitive data from unauthorized access
- Preventing financial losses due to fraud or cyberattacks
- Maintaining business continuity in the event of a security incident
- Protecting the reputation of the organization
- Different job responsibilities in security There are many different job responsibilities in security, including:
- Security analyst: Analyzes security logs and data to identify and investigate security incidents
- Security engineer: Designs, implements, and maintains security systems and solutions
- Security architect: Develops the security architecture for an organization
- Security manager: Oversees the security program for an organization
- Important core skills for security professionals There are many important core skills for security professionals, including:
- Collaboration: The ability to work effectively with others
- Communication: The ability to communicate effectively, both verbally and in writing
- Problem-solving: The ability to identify and solve security problems
- Critical thinking: The ability to think critically and analyze security threats
- Technical skills: The ability to understand and use security tools and technologies
- The value of security and how it supports critical business functions Security is essential for supporting critical business functions, such as:
- Financial transactions
- Customer data
- Intellectual property
- Supply chain management
- Human resources
Congratulations on completing the first section
of this course! Let’s quickly review what we’ve covered so far, before moving on. We defined security and introduced the benefits of implementing
security in an organization. Then, we discussed different
job responsibilities, such as managing threats and installing
prevention software. We also introduced some
important core skills, like collaboration and
computer forensics. We finished by discussing
the value of security and how it supports critical
business functions. I hope you’ve gained a greater
understanding of security. If you feel like you need a
refresher before moving on, you can always go
back and review any content you’re unsure about. By learning the basics, you are laying the
foundation for the rest of your
security career. Coming up, we’ll explore some well-known attacks that
shaped the security industry. I’m excited to continue
this journey with you!
Reading: Glossary terms from week 1
Reading
Terms and definitions from Course 1, Week 1
Cybersecurity (or security): The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation
Cloud security: The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users
Internal threat: A current or former employee, external vendor, or trusted partner who poses a security risk
Network security: The practice of keeping an organization’s network infrastructure secure from unauthorized access
Personally identifiable information (PII): Any information used to infer an individual’s identity
Security posture: An organization’s ability to manage its defense of critical assets and data and react to change
Sensitive personally identifiable information (SPII): A specific type of PII that falls under stricter handling guidelines
Technical skills: Skills that require knowledge of specific tools, procedures, and policies
Threat: Any circumstance or event that can negatively impact assets
Threat actor: Any person or group who presents a security risk
Transferable skills: Skills from other areas that can apply to different careers
Quiz: Weekly challenge 1
Fill in the blank: Cybersecurity aims to protect networks, devices, people, and data from _ or criminal exploitation.
unauthorized access
What occurs during a security audit?
Review of an organization’s security records, activities, and other related documents
Which of the following entities may be an internal threat to an organization? Select three answers.
Employees, Trusted partners, Vendors
What is identity theft?
Stealing personal information to commit fraud while impersonating a victim
What is regulatory compliance?
Laws and guidelines that require implementation of security standards
Which of the following proficiencies are examples of technical skills? Select two answers.
Automating tasks with programming, Applying computer forensics
Fill in the blank: Security information and _ management (SIEM) tools enable security professionals to identify and analyze threats, risks, and vulnerabilities.
event
What do security professionals typically do with SIEM tools?
Identify and analyze security threats, risks, and vulnerabilities
Which of the following statements accurately describe personally identifiable information (PII) and sensitive personally identifiable information (SPII)? Select all that apply.
The theft of SPII is often more damaging than the theft of PII.
An example of PII is someone’s email address.
SPII is a type of PII that falls under stricter handling guidelines.
Fill in the blank: The purpose of _ is to protect networks, devices, people, and data from unauthorized access or criminal exploitation.
cybersecurity
A security professional collaborates with information technology teams to deploy an application that helps identify risks and vulnerabilities. What does this scenario describe?
Installing detection software
Fill in the blank: Identity theft is the act of stealing _ to commit fraud while impersonating a victim.
personal information
What are some key benefits associated with an organization meeting regulatory compliance? Select two answers.
Avoiding fines, Upholding ethical obligations
An individual is in their first job as an entry-level security professional. They apply the problem-solving proficiencies that they learned in past roles to their current security career. What does this scenario describe?
Using transferable skills