blog pribadi saya yang digunakan untuk mencatat hal-hal yang saya pelajari. semoga bisa bermanfaat juga buat yang membacanya.
terima kasih
Cari Blog Ini
Day 1 learning Google Cybersecurity at Coursera
This is my study notes. just for my personal notes and learn.
Program Overview
- Core security concepts
- Security domains
- Network Security
- Computing basics
- Assets, threats, and vulnerability
- Incident detection and response
- Python
- Find and apply for jobs
By completing the eight courses in this certificate program,
you'll prepare for entry-level jobs in cybersecurity,
such as cybersecurity analyst, security analyst,
and security operations center (SOC) analyst.
No prior experience in cybersecurity is required to complete this program.
Throughout the program, you will have multiple opportunities to develop your cybersecurity knowledge and skills. You will explore concepts and scenarios to learn what an entry-level cybersecurity analyst must know and be able to do to thrive in the cybersecurity profession.
Google Cybersecurity Certificate courses
The Google Cybersecurity Certificate has eight courses that focus and build upon core concepts and skills related to the daily work of cybersecurity professionals, including foundational cybersecurity models and frameworks that are used to mitigate risk; protecting networks and data; using programming to automate tasks; identifying and responding to security incidents; and communicating and collaborating with stakeholders. Additionally, you will apply what you’ve learned in each course by completing portfolio projects that can be used to showcase your understanding of essential cybersecurity concepts to potential employers. The courses of the program are as follows:
Organizations must prepare for the storm by ensuring they
have the tools to mitigate and
quickly respond to outside threats.
The objective is to minimize risk and potential damage.
definitions:
Cybersecurity, or security, is the practice
of ensuring confidentiality, integrity,
and availability of information
by protecting networks, devices,
people, and data from
unauthorized access or criminal exploitation
Benefits of security :
- Protects against external dan internal threats
- Meets regulatory compliance
- Maintains and improves business productivity
- Reduces expenses
- Maintans brand trust
Security analysts are responsible for
monitoring and protecting information and systems.
Responsibilites of a security analyst :
- Protecting computer and network systems
- Installing prevention software
- Conducting periodic security audits.
A day in the life as a entry- level security professional?
Um, it can change day to day, but there's two basic parts to it.
There's the operation side, which is responding to detections and
doing investigations.
And then there's the project side where you're working with other teams to build
new detections or improve the current detections.
The difference between this entry- level cybersecurity analyst and
an entry-level cybersecurity engineer is pretty much that the analyst
is more focused on operations and the engineer,
while they can do operations, they also build the, the detections and
they do more project focused work
.
A playbook is a list of how to go through a certain detection, and
what the analyst needs to look at in order to investigate those incidents.
cybersecurity (also known as security) is the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.
Key cybersecurity terms and concepts
There are many terms and concepts that are important for security professionals to know. Being familiar with them can help you better identify the threats that can harm organizations and people alike. A security analyst or cybersecurity analyst focuses on monitoring networks for breaches. They also help develop strategies to secure an organization and research information technology (IT) security trends to remain alert and informed about potential threats. Additionally, an analyst works to prevent incidents. In order for analysts to effectively do these types of tasks, they need to develop knowledge of the following key concepts.
Compliance is the process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches.
Security frameworks are guidelines used for building plans to help mitigate risks and threats to data and privacy.
Security controls are safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture.
Security posture is an organization’s ability to manage its defense of critical assets and data and react to change. A strong security posture leads to lower risk for the organization.
A threat actor, or malicious attacker, is any person or group who presents a security risk. This risk can relate to computers, applications, networks, and data.
An internal threat can be a current or former employee, an external vendor, or a trusted partner who poses a security risk. At times, an internal threat is accidental. For example, an employee who accidentally clicks on a malicious email link would be considered an accidental threat. Other times, the internal threat actor intentionally engages in risky activities, such as unauthorized data access.
Network security is the practice of keeping an organization's network infrastructure secure from unauthorized access. This includes data, services, systems, and devices that are stored in an organization’s network.
Cloud security is the process of ensuring that assets stored in the cloud are properly configured, or set up correctly, and access to those assets is limited to authorized users. The cloud is a network made up of a collection of servers or computers that store resources and data in remote physical locations known as data centers that can be accessed via the internet. Cloud security is a growing subfield of cybersecurity that specifically focuses on the protection of data, applications, and infrastructure in the cloud.
Programming is a process that can be used to create a specific set of instructions for a computer to execute tasks. These tasks can include:
Automation of repetitive tasks (e.g., searching a list of malicious domains)
Reviewing web traffic
Alerting suspicious activity
Key takeaways
Understanding key technical terms and concepts used in the security field will help prepare you for your role as a security analyst. Knowing these terms can help you identify common threats, risks, and vulnerabilities. To explore a variety of cybersecurity terms, visit the National Institute of Standards and Technology glossary. Or use your browser to search for high-quality, reliable cybersecurity glossaries from research institutes or governmental authorities. Glossaries are available in multiple languages.
Security analyst transferable skills :
- Communication
- Collaboration
- Analysis
- Problem Solving
Security analyst technical skills :
- Programming languages
- Security information and event management (SIEM) tools
HOW TO FIX : ERROR:gpu_init.cc(426) Passthrough is not supported, GL is disabled in VS Code Python Selenium ChromeDriver Pytest have you ever experienced an error like the one below when using pytest, python selenium chromedriver? [14184:2436:0319/060520.198:ERROR:gpu_init.cc(440)] Passthrough is not supported, GL is disabled, ANGLE is [7108:12512:0319/060620.351:ERROR:device_event_log_impl.cc(214)] [06:06:20.350] USB: usb_device_handle_win.cc:1049 Failed to read descriptor from node connection: A device attached to the system is not functioning. (0x1F) [7108:12512:0319/060620.356:ERROR:device_event_log_impl.cc(214)] [06:06:20.356] USB: usb_device_handle_win.cc:1049 Failed to read descriptor from node connection: A device attached to the system is not functioning. (0x1F) [7108:12512:0319/060620.357:ERROR:device_event_log_impl.cc(214)] [06:06:20.357] USB: usb_device_handle_win.cc:1049 Failed to read descriptor from node connection: A device attached to the system is not functioning....
About the course curriculum PCAP: Programming Essentials in Python (short form: Python Essentials ) is a two-course series that covers all the basics of programming in Python, as well as general computer programming concepts and techniques, and the object-oriented approach. The Python Essentials course series is divided into two parts: Python Essentials 1 (PE1): BASICS , consisting of four modules; Python Essentials 2 (PE2): INTERMEDIATE , consisting of four modules. Each student has access to hands-on practice materials , labs , quizzes , and tests to learn how to utilize the skills and knowledge gained on the course and interact with some real-life programming tasks and situations . Students who complete the course will be able to accomplish coding tasks related to the basics of programming in the Python language, and to understand the fundamental notions and techniques used in object-oriented programming. Furthermore, they will be ready...
Python Essentials 1: Module 1 Introduction to Python and computer programming In this module, you will learn about: the fundamentals of computer programming, i.e., how the computer works, how the program is executed, how the programming language is defined and constructed; the difference between compilation and interpretation what Python is, how it is positioned among other programming languages, and what distinguishes the different versions of Python. How does a computer program work? This course aims to show you what the Python language is and what it is used for. Let's start from the absolute basics. A program makes a computer usable. Without a program, a computer, even the most powerful one, is nothing more than an object. Similarly, without a player, a piano is nothing more than a wooden box. Computers are able to perform very complex tasks, but this ability is not innate. A computer's nature is quite different. It can execute only extremely simple operations. For exampl...
Komentar
Posting Komentar