Protect data and communicate incidents -Get started with the course
Introduction to Course 8
()
Course 8 overview
Dion: My personal career journey
()
Helpful resources and tips
Protect data and communicate incidents -Event and incident detection
Welcome to module 1
()
Security as a mindset
()
Data and asset classification
Protect data and communicate incidents -Your impact on data protection
Detect and protect without neglect
()
Disaster recovery and business continuity
Juliana's story: Asset protection
Protect data and communicate incidents -Review: Protect assets and communicate incidents
Wrap-up
()
Glossary terms from module 1
Escalate incidents-Escalation in cybersecurity
Welcome to module 2
()
The importance of escalation
()
Escalate with a purpose
Escalate incidents-To escalate or not to escalate
Prepare to escalate through security recognition
()
Recognize roles and responsibilities during escalation
Escalate incidents-Timing is everything
From simple activity to major data breach
()
When and how to escalate a security incident
()
Escalation timing
Juliana's story: Attention to detail
Escalate incidents-Review: Escalate incidents
Wrap-up
()
Glossary terms from module 2
Communicate effectively to influence stakeholders-Understand your stakeholders
Welcome to module 3
()
Stakeholders in cybersecurity
()
The purpose and impact of stakeholders
Communicate effectively to influence stakeholders-Communicate for impact
Clear and concise communication
()
Building blocks of cybersecurity communications
()
Communicate effectively with stakeholders
Communicate effectively to influence stakeholders-Visual communication using a dashboard
Visual storytelling in cybersecurity
()
Create visual dashboards for impactful cybersecurity communications
How to create a visual dashboard
()
Juliana’s story: Effective communication
Communicate effectively to influence stakeholders-Review: Communicate effectively to influence stakeholders
Wrap-up
()
Glossary terms from module 3
Engage with the cybersecurity community-Reliable sources go a long way
Welcome to module 4
()
Helpful cybersecurity resources
()
Strategies for engaging with the cybersecurity community
Victoria: Continue your learning journey
()
Activity Exemplar: Explore cybersecurity organizations
Engage with the cybersecurity community-Build your cybersecurity network
Engage with the cybersecurity community in a meaningful way
()
Connect with other cybersecurity professionals
Sarah: Network in the cybersecurity community
()
Engage with the cybersecurity community-Review: Engage with the cybersecurity community
Wrap-up
()
Glossary terms from module 4
Find and apply for cybersecurity jobs-Find and prepare for a job in cybersecurity
Welcome to module 5
()
Find cybersecurity jobs
()
Create a resume
()
Tips for finding and applying for a job
Portfolio Activity Exemplar: Create or update a resume
Garvey: Cover letter tips
()
Find and apply for cybersecurity jobs-The cybersecurity job interview process
Explore the interview process
()
The interview process
Garvey: Technical interview tips
()
Prepare for technical interviews
Conduct pre-interview research
()
Build rapport with interviewers
()
Find and apply for cybersecurity jobs-Answer interview questions
Use strategies to answer interview questions
()
Apply the STAR method during interviews
Activity Exemplar: Use the STAR method to answer interview questions
Prepare for interviews
Ask the interviewer questions
()
Karan: Interview tips from a hiring manager
()
Prepare for interviews with Interview Warmup
Find and apply for cybersecurity jobs-Develop an elevator pitch
Develop an elevator pitch
()
Learn more about developing an elevator pitch
Activity Exemplar: Draft an elevator pitch
Tips for interviewing remotely
Emily: Overcome imposter syndrome
()
Find and apply for cybersecurity jobs-Review: Find and apply for cybersecurity jobs
Wrap-up
()
Glossary terms from module 5
Course wrap-up
()
Course 8 glossary
Find and apply for cybersecurity jobs-Certificate wrap-up
Recap of the Google Cybersecurity Certificate program
()
Congratulations on completing the Google Cybersecurity Certificate program!
()
Showcase your work
Claim your Google Cybersecurity Certificate badge!
Google Cybersecurity Certificate glossary