Skip to content
Home » Google Career Certificates » Google Cybersecurity Professional Certificate » Put It to Work: Prepare for Cybersecurity Jobs » Module 1: Protect data and communicate incidents

Module 1: Protect data and communicate incidents

You will recognize the importance of security professionals in the workplace. You’ll discover how proper detection and escalation can impact an organization’s security posture.

Learning Objectives

  • Recognize the importance of incident detection.
  • Describe the importance of various asset types.
  • Examine the relationship between events and incidents.
  • Determine incidents that need to be escalated to stakeholders.
  • Recognize the sensitive nature of secured assets and data.
  • Explain how having an ethical security mindset supports an entry-level security analyst’s ability to protect secured assets and data

Get started with the course


Video: Introduction to Course 8

This is an introduction to a course about security analysis. The speaker, Dion, is a Program Manager at Google with five years of experience in security. He will be the instructor for the first part of the course.

The course will cover a variety of topics, including how to protect assets, communicate incidents, and escalate incidents. It will also cover how to find, prepare for, and apply for security jobs.

By the end of the course, students will have had multiple opportunities to refine their understanding of key security concepts, create a resume, build confidence in their interview skills, and even participate in an AI-generated interview.

Dion is excited for the students to join the security profession and asks them if they are ready to get started.

Here are some key takeaways from the introduction:

  • Security analysis is a complex and important field.
  • There are many different skills that security analysts need to have.
  • This course will help students develop the skills they need to be successful security analysts.
  • Dion is excited to help students learn about security analysis.

Video: Dion: My personal career journey

Dion’s Cybersecurity Journey:

  • Job: Program Manager at Google, Detection & Response Team (part of Privacy, Safety & Security organization)
  • Mission: Understand, find, and respond to threats to keep online information safe and private.
  • Why it matters: Cybersecurity protects our online data, trusted to companies like Google.
  • Previous Jobs: Radio DJ & online personality (key takeaway: Keep things moving!)
  • Motivation: Protecting his children as a father and information as a security professional.
  • Challenges: Constantly learning in a rapidly evolving field (no formal security training).
  • Learning Strategies: Online courses, journals, and team support.
  • Advice for beginners: Don’t be afraid to ask for help, getting stuck is normal.

Key Takeaways:

  • Cybersecurity is crucial for online safety and privacy.
  • Anyone can learn cybersecurity with dedication and support.
  • Teamwork and a positive attitude are essential in this field.

[MUSIC PLAYING] Hi, I’m Dion.
I am a program manager at Google. I am a part of the detection and response
team which falls under the privacy, safety, and security organization. My favorite part of my job is
understanding that there are threats that we encounter day by day. And my team helps to ensure that
we can find those threats and respond to them accordingly. Cybersecurity is very important. Just as we need to keep
ourselves physically secure, we need to keep our information
online safe and secure. So, whenever you use a computer or a device, that data lives somewhere online. And you trust Google and other companies to secure that data and
keep it private, only to you. The work that I do day by day ensures
that your information, your data, and the world’s information stays secure,
stays private, and protected. I’ve held many jobs in different areas
before getting involved in cybersecurity. One of those jobs is
serving as a radio DJ and online personality,
which has not much to do with security. One of the key things I got from
that was to keep the music playing. No matter what happens,
keep the music playing. I’m also a proud father.
My kids are my greatest assets and I have to protect them. There are lots of threats and
risks associated with them, even vulnerabilities. As a security guy,
I have to protect the information that I’m tasked with holding from threats,
risks, and vulnerabilities. As a security professional,
fires will come up. You have to find a way to keep
things moving, either escalating to the right team or escalating up
the chain to find a resolution. So, having not been formally
trained in security, I am tasked with teaching
myself new things daily. New threats arrive,
new things need to be protected, and security is constantly changing. I teach myself through online learning. I subscribe to and read to lots of
journals related to security knowledge, and I’m also taking some
security courses online as well. I think the most challenging
part about an entry-level role in security is not knowing
what you don’t know. When I first got involved in security,
I was really winging it, but the one thing that I did was always
reach out to my team for support. Getting stuck is a part of the process,
we could always lean on our team and others for additional support or
to help us get unstuck.

Hello, and welcome to the course! I’m Dion, a Program Manager at Google. I’ve worked in security for
the past five years in areas ranging from risk management
to insider threat detection. I’ll be your first
instructor in this course. As a security analyst, you’ll help
protect the assets of the organization you work for, including tangible, or
physical, assets such as software and network devices, as well as
intangible assets, like PII, copyrights, and intellectual property. Imagine if this kind of sensitive
information were to be exposed by a threat actor! It would be devastating
to the reputation and financial stability of the organization
and the people the organization serves. In previous courses, we discussed
a variety of topics that are relevant to the security profession, including: core security concepts;
frameworks and controls; threats, risks, and
vulnerabilities; networks; incident detection and response;
and programming basics. Now it’s time to put all of these core
security concepts to practical use. In this course, we’ll further
explore how to protect assets and communicate incidents. Then, we’ll discuss when and how to escalate incidents to protect
an organization’s assets and data. We’ll also cover how to communicate
effectively to influence stakeholders’ decisions related to security. After that, Emily, your instructor for the
second part of this course will introduce some reliable resources that will help
you engage with the security community after you complete this
certificate program. And finally, we’ll cover how to find,
prepare for, and apply for security jobs. This will include discussions about
how to create a compelling resume and tips to help you throughout
the interview process. When I started my first
security-based role, I was excited to be hired at Google
to protect information and devices. I was also happy to be a part of a broader
team that I could learn from and reach out to for support. My team helped me grow my expertise, and I’m proud of my contribution
to our projects. By the end of this course,
you’ll have had multiple opportunities to refine your understanding of key
security concepts, create a resume, build confidence in your
interview skills, and even participate in an artificial
intelligence, or AI, generated interview. The security profession is
such an amazing field, and I’m looking forward to you joining it! I have one question for you:
Are you ready to get started?

Event and incident detection


Video: Welcome to module 1

This course section dives into the world of security:

  • Developing a security mindset: Learn what it means to prioritize security and how to apply it for organizational protection.
  • Incident escalation: Explore the proper procedures for addressing data breaches promptly and effectively.
  • Data sensitivity: Gain insight into the critical nature of the data you’ll be safeguarding.
  • Focus: The upcoming videos will specifically guide you on building a security mindset and utilizing it to shield organizations and their people.

In essence, this section equips you with the foundational knowledge and tools to become a vigilant security advocate.

Welcome to the first
section of the course! In the next several videos, we’ll discuss what it means
to have a security mindset, and how you’ll use
that mindset to protect an organization’s
assets and data. Then, we’ll explore
the process of incident escalation in
the event of a breach. Finally, we’ll share information to better
help you understand the sensitive nature of the data that you’ll
work to protect. Coming up, we’ll focus on how to develop a
security mindset then use that mindset to
protect organizations and the people they serve.

Video: Security as a mindset

Developing a Security Mindset: Your Compass in the Cybersecurity World

This section emphasizes the importance of a security mindset, a crucial tool for any aspiring cybersecurity professional.

Key takeaways:

  • Understanding the Landscape: Having a security mindset involves recognizing what you’re protecting (assets) and who/what you’re protecting it from (threats, risks, vulnerabilities).
  • Constant Vigilance: It’s not just about identifying threats, but actively seeking out potential breaches and vulnerabilities in systems, applications, and data.
  • Staying Informed: Continuous learning is key. Keep yourself updated about the latest security threats and vulnerabilities to stay ahead of attackers.
  • Everyday Vigilance: Security is an ongoing battle, not a one-time event. Approach every action with a security lens, considering its potential impact.
  • Prepared for Anything: Even seemingly insignificant actions like clicking a link can have security implications. Prepare for worst-case scenarios.
  • Protecting All Levels: Your security mindset applies to all assets, from low-level guest Wi-Fi to high-value intellectual property.
  • Prioritizing Response: Not all incidents are created equal. Learn to prioritize and respond effectively based on the nature of the threat.
  • Stand Out from the Crowd: A strong security mindset sets you apart in the job market. Highlight it in interviews and throughout your career.

Remember:

  • Developing a security mindset is a continuous journey, not a destination.
  • This section lays the foundation for further exploration of incident detection and response in the following videos.

Bonus tip: Imagine a knight constantly scanning the horizon for enemies. That’s the essence of a security mindset!

Developing a Security Mindset: Your Compass in the Cybersecurity World

Introduction

Welcome to the world of cybersecurity! In this vast and ever-changing landscape, one of the most valuable tools you can possess is a security mindset. It’s your internal compass, guiding you in identifying and mitigating threats, protecting valuable assets, and keeping your organization safe.

What is a Security Mindset?

Imagine a knight in shining armor, constantly vigilant against approaching enemies. That’s the essence of a security mindset. It’s a proactive approach to security, where you’re not just reacting to threats, but actively seeking them out and taking steps to prevent them from causing harm.

Key Pillars of a Security Mindset:

  • Understanding the Landscape: The first step is to understand what you’re protecting. This includes identifying your organization’s critical assets, such as data, systems, and applications. You also need to be aware of the potential threats, risks, and vulnerabilities that could exploit these assets.
  • Constant Vigilance: Don’t be like a passive guard dozing off at their post. Be an active detective, constantly looking for suspicious activity and potential breaches. This includes questioning every click, every email, and every access request.
  • Staying Informed: The world of cybersecurity is constantly evolving, with new threats emerging every day. Make it a habit to stay updated on the latest threats and vulnerabilities by reading security blogs, attending conferences, and taking online courses.
  • Everyday Vigilance: Security isn’t just a one-time task; it’s an ongoing process. Integrate security into your daily routine, considering the potential security implications of every action you take.
  • Prepared for Anything: Always be prepared for the worst-case scenario. This means having a plan for incident response and knowing how to effectively contain and mitigate any security breaches that may occur.
  • Protecting All Levels: Don’t underestimate the importance of protecting even low-level assets. A seemingly insignificant breach in your guest Wi-Fi network could be a stepping stone for attackers to gain access to more critical systems.
  • Prioritizing Response: Not all incidents are created equal. Learn to prioritize your response based on the severity of the threat and the potential impact on your organization.

Benefits of a Strong Security Mindset:

  • Reduced Risk of Cyberattacks: By proactively identifying and mitigating threats, you can significantly reduce the risk of cyberattacks and data breaches.
  • Faster Incident Response: A security mindset prepares you to respond quickly and effectively to any security incidents that may occur.
  • Improved Security Posture: By constantly thinking about security, you can improve your organization’s overall security posture and make it more resilient against cyberattacks.
  • Career Advantage: A strong security mindset is a valuable asset in any cybersecurity career. It can help you stand out from the crowd and make you a more attractive candidate to potential employers.

Developing Your Security Mindset:

Building a strong security mindset takes time and effort. Here are some tips to get you started:

  • Start small: Don’t try to change everything overnight. Begin by incorporating small security practices into your daily routine, such as using strong passwords and being cautious about clicking on links in emails.
  • Educate yourself: There are many resources available to help you learn more about cybersecurity. Take online courses, read security blogs, and attend industry conferences.
  • Practice, practice, practice: The more you practice thinking about security, the more natural it will become. Try to identify potential security risks in everyday situations, such as when you’re using public Wi-Fi or downloading a new app.
  • Find a mentor: Having a mentor who can provide guidance and support can be invaluable in developing your security mindset. Look for someone with experience in the cybersecurity field who can answer your questions and offer advice.

Conclusion

Developing a security mindset is an essential step for anyone who wants to be successful in the cybersecurity field. By following the tips in this tutorial, you can start building your own internal compass and become a more vigilant defender against cyber threats.

Remember, cybersecurity is a team effort. Share your knowledge and insights with others, and help create a more secure world for everyone.

Additional Resources:

Let’s take a little
time to discuss a concept that would help you throughout your security career: having a security mindset. In previous courses, we discussed
various threats, risks, and vulnerabilities and
how they can impact organizational operations
and the people served by those organizations. These concepts are
key considerations when thinking about having
a security mindset. You’ll have to recognize not
only what you’re defending, but what or who you’re
defending against. For example, it’s important to recognize the types
of assets that are essential to maintaining an organization’s
business functions, along with types of threats, risks, and vulnerabilities that can negatively
impact those assets. And that’s what having a security
mindset is all about. A security mindset
is the ability to evaluate risk and constantly seek out and identify the potential or actual
breach of a system, application, or data. Earlier in the program, we discussed threats, risks, and vulnerabilities
that are posed by social engineering
attacks, such as phishing. These attacks are
designed to compromise an organization’s assets to help the threat actor or actors gain access to sensitive information. Using our security mindset can help prevent these
types of attacks. It’s important that
we’re constantly staying up-to-date with the kinds of attacks
that are happening. To do this, it’s good to develop
a habit of seeking out information regarding the latest security threats
or vulnerabilities. As you do this, new ideas for protecting company
data may come to mind. Security is an
everyday objective for every security
team in the industry. So having a security
mindset helps analysts defend against the constant
pressure from attackers. That mindset can make
you think: “Every click of the mouse has the potential
to lead to a security breach.” That level of scrutiny as
a security professional helps you prepare for the worst-case scenario,
even if it doesn’t happen. Entry-level analysts can help
protect low-level assets, such as an organization’s
guest WiFi network, and high-importance assets, such
as intellectual property, trade secrets, PII, and
even financial information. Your security mindset
allows you to protect all levels of assets. However, if an
incident does occur, that doesn’t mean you respond to all incidents in the same way. So we’ll discuss incident
prioritization a little later in the course. Having a strong security mindset can help set you apart from other candidates as you prepare to enter the
security profession. It may even be a good idea to reference that foundation
in future job interviews. We’ll discuss
interview preparation in detail, later in the course. Coming up, we’ll focus on incident detection
in greater detail.

Reading: Data and asset classification

Reading

Practice Quiz: Test your knowledge: Event and incident detection

What does a security mindset enable a security analyst to do when protecting their organization? Select two answers. 

Which type of asset would have the least impact on an organization if it were compromised?

How can security analysts cultivate a security mindset?

Which of the following examples describes the use of a security mindset? Select two answers.

Your impact on data protection


Video: Detect and protect without neglect

Summary: Importance of Collaboration and Data Protection in Security

Key points:

  • Impact of security incidents: Compromised data leads to financial losses, legal penalties, and loss of trust.
  • Collaboration essential: Security isn’t a solo act. Diverse teams across the organization share security interests (financial data, user credentials, vendor security, employee PII).
  • Protecting customer data: A top priority. Organizations handle sensitive information (credit cards, SSN, emails etc.) and must earn customer trust.
  • Security mindset: Understanding data importance for strong security. Careful handling and attention to detail are crucial to prevent breaches.
  • Security events vs incidents: Events not leading to breaches aren’t incidents. Be safe, not sorry.
  • No issue too small/big: Report anomalies, like unauthorized app installs or suspicious code execution, regardless of perceived severity.
  • Responsibility and impact: Your decisions affect the company, customers, and colleagues. Choose wisely, what you do matters!

Overall: This emphasizes the collective effort needed in security, the critical nature of data protection, and the individual responsibility in safeguarding sensitive information.

Importance of Collaboration and Data Protection in Security: A Teamwork for Fortress-Level Defense

Introduction

Welcome to the heart of the cybersecurity domain! In this crucial area, protecting sensitive data and maintaining organizational security thrives not on solo heroes, but on tight-knit collaboration and diligent data protection. This tutorial delves into the “why” and “how” of these two pillars, equipping you with the knowledge and mindset to be a valuable player in the security team orchestra.

Collaboration: Security’s Synergistic Symphony

Imagine a team of musicians, each mastering their instrument (financial data protection, user authentication, vendor security, employee PII safeguarding). Though skilled individually, their true magic lies in the harmonious ensemble.

Similarly, security flourishes through collaboration. Diverse teams across the organization share a vested interest in robust security:

  • Finance team: Shielding sensitive financial data and ensuring regulatory compliance.
  • IT team: Protecting user credentials and maintaining secure network infrastructure.
  • Procurement team: Vetting third-party vendors for robust security practices.
  • HR team: Safeguarding employee PII and promoting security awareness.

By combining expertise, perspectives, and resources, these teams weave a stronger security tapestry, protecting every corner of the organization.

Data Protection: The Crown Jewels of Security

At the heart of this collaborative effort lies the paramount importance of data protection. Think of data as the crown jewels of your organization, entrusted to your care. This includes:

  • Customer data: Credit card numbers, Social Security numbers, emails, usernames, passwords – the lifeblood of customer trust.
  • Internal data: Intellectual property, trade secrets, financial records – the very fabric of your organization’s operations.

Protecting this sensitive information demands a relentless focus on detail and a proactive approach. Every decision, every action, must be weighed against its potential impact on data security.

Building Your Security Mindset: Vigilance and Responsibility

Developing a strong security mindset is key to excelling in this role. This means:

  • Understanding the gravity of data breaches: Financial losses, legal repercussions, and reputational damage are just the tip of the iceberg.
  • Handling sensitive data with meticulous care: Every click, every email, every access request deserves scrutiny.
  • Being the “eyes and ears” of security: Noticing anomalies, like unauthorized app installations or suspicious code execution, and promptly reporting them.

Remember, there are no “small” issues in security. Even seemingly insignificant breaches can be stepping stones for attackers.

Collaboration in Action: Real-World Scenarios

Let’s see how collaboration and data protection play out in practice:

  • Scenario 1: An employee installs an unauthorized app on their work device. The IT team, in collaboration with the security team, investigates the app’s potential vulnerabilities and takes necessary action to mitigate any risks.
  • Scenario 2: A suspicious log entry indicates malicious code execution. The security team immediately alerts the network operations team, who swiftly isolates the affected system and launches an investigation to contain the damage.

Conclusion: You Are the Hero, Together

As a security professional, you are not just a cog in the machine; you are a vital member of a formidable team. Your vigilance, your commitment to collaboration, and your unwavering focus on data protection contribute to an impenetrable fortress around your organization’s most valuable assets.

Remember, what you do matters. Every action, every decision, ripples across the organization, impacting not just the company, but also its customers and countless colleagues. So, stand tall, collaborate effectively, and protect the data entrusted to you with unwavering dedication. Together, you can build a security posture that stands strong against any threat.

Additional Resources:

Let’s build a safer digital world, one vigilant team at a time!

Welcome back! In
earlier courses, we discussed the impact that security incidents can have on the critical data and
assets of an organization. If data and assets
are compromised, it can lead to financial
pains for an organization. It can even lead to regulatory
fines and the loss of credibility with customers or other businesses in
the same industry. This is why your
role in protecting company data and
assets is so valuable. Collaboration is
an exciting part about working in security. There are so many
individuals across an organization that are interested in various
functions of security. No security professional
can do this alone. Some team members are focused on protecting sensitive
financial data, others work on protecting
usernames and passwords, some are more focused
on protecting third-party vendor security, and others may be concerned with
protecting employees’ PII. These stakeholders
and others have an interest in the role the
security team plays for keeping the organization,
and the people it serves, safe from
malicious attacks. It’s important to recognize
that the assets and data you protect affect multiple
levels of your organization. One of the most
important concerns for an organization is the
protection of customer data. Customers trust that an
organization they engage with will protect their
data at all times. This means credit card numbers, Social Security numbers, emails, usernames, passwords,
and so much more. It’s important to keep this in mind when taking on
a security role. Understanding the importance of the data you’re protecting is a big part of having a
strong security mindset. As a security professional, it’s important to handle sensitive data with
care while being mindful of the little details to ensure that private data is
protected from breaches. When a security event
results in a data breach, it is categorized as
a security incident. However, if the event is resolved without
resulting in a breach, it’s not considered an incident. It’s better to be
safe when it comes to taking a job in the
security profession. That means paying attention to details and raising your
issues to your supervisor. For example, a
seemingly small issue, like an employee
installing an app on their work device without
getting permission from the help desk should be
escalated to a supervisor. This is because some apps
have vulnerabilities that can pose a threat to the
security of the organization. An example of a bigger issue is noticing that a log may have malicious code executed in it. Malicious code can lead
to operational downtime, severe financial consequences, or the loss of critical
high-level assets. The point is that there are no issues that are
too small or too big. If you’re not sure of the potential impact of an incident, it’s always best
to be cautious and report events to the
appropriate team members. Each day on the job as
a security professional comes with a level
of responsibility to help protect the organization
and the people it serves. The decisions you make not
only affect the company, but also its customers and countless team members
across the organization. Remember, what you do matters!

Reading: Disaster recovery and business continuity

Reading

Reading: Juliana’s story: Asset protection

Reading

Practice Quiz: Test your knowledge: Your impact on data protection

A security analyst notices that an employee has installed an app on their work device without getting permission from the help desk. The log indicates that potentially malicious code might have been executed on the host. Which of these security events should the security analyst escalate to a supervisor?

Which are types of data and assets that stakeholders are most interested in protecting? Select two answers.

Fill in the blank: When a security event results in a data breach, it is categorized as a _____.

Which of the following are examples of the potential impact of a security incident involving malicious code? Select three answers.

Review: Protect assets and communicate incidents


Video: Wrap-up

This section wraps up what you’ve learned so far about an entry-level security analyst’s role:

Key Takeaways:

  • Security Mindset: Crucial for proactive threat detection and incident prevention.
  • Incidents vs. Events: Not all anomalies are incidents; learn to differentiate and prioritize.
  • Incident Escalation: Understand the process for effectively addressing security concerns.
  • Data Sensitivity: Recognize the critical nature of the data you protect and its impact on various stakeholders.
  • Teamwork: Every security role contributes to the organization’s smooth operation.

Motivation: Emphasizes the value of your work and the positive impact you make as a security team member.

Coming Up: The next section dives deeper into the process of escalating security incidents.

Overall: This serves as a recap and sets the stage for further learning about incident escalation in the next section.

You’ve had an opportunity to learn
more about the important role an entry-level analyst plays in protecting
the data and assets of an organization. Let’s quickly review what we covered. We started off by discussing the
importance of having a security mindset, including how it supports
incident detection. Then, we examined the relationship
between incidents and events, and further explored the incident
escalation process. We ended our discussion by exploring the
sensitive nature of the data that you’re protecting and the amount of people counting on you to
play your part in protecting that data. Understanding how valuable you are as
a member of the security team can help you put the work you do into perspective. Every role in security matters. Each individual contributes to making
a company’s operations flow smoothly. I hope you enjoyed our
discussion as much as I did! Are you ready to continue your
journey into the security world? Coming up, we’ll discuss the importance
of escalating security incidents.

Reading: Glossary terms from module 1

Terms and definitions from Course 8, Module 1

Quiz: Module 1 challenge

Fill in the blank: A security mindset is the _____.

As a security analyst, you are responsible for protecting an organization’s low-level assets and high-importance assets. Which of the following is considered a low-level asset?

Fill in the blank: A security mindset helps a security analyst _____.

Which of the following are examples of private data? Select two answers.

Fill in the blank: One of the most important concerns for most organizations is the protection of _____. 

Fill in the blank: The decisions a security analyst makes can affect the organization that the analyst works for and other team members across the organization. These decisions also affect ______.

A security analyst notices that an employee has installed an app on their work computer without getting permission from the IT service desk. The security analyst also notices that antivirus software recorded a potentially malicious execution on the same computer. Which of these security events should the security analyst escalate to their supervisor?

Fill in the blank: When a security event results in a data breach, it is categorized as a _____.

Which of the following are examples of sensitive customer data that most organizations prioritize? Select two answers.

Fill in the blank: ____ can occur if an organization’s data and essential assets are compromised in a way that disrupts its business operations.