Work
Work
Hello and welcome to the Google Career Certificate focused on cybersecurity. I'm so excited
that you're here! My name is Toni, and I am a Security Engineering Manager at Google. I'll
be your instructor for the first course of this certificate program. By starting this course,
you've already taken a big step towards building new skills that will help you in your career.
Cybersecurity may seem daunting at first, but you'd be surprised by the different backgrounds
many of us have. I worked as an intelligence analyst before I got my first job in the security
industry, and I'm excited to be your instructor as you begin your journey into security. The
demand for security professionals is growing at an incredible rate. By 2030, the U.S. Bureau
of Labor Statistics expects security roles to grow by more than 30%, which is higher than the
average growth rate for other occupations. Global access to the internet is expanding. Every
day, more people and organizations are adopting new digital technologies. Having a diverse
community of security professionals with unique backgrounds, perspectives, and experiences
is essential for protecting and serving different markets. Working in security has allowed me
to work with people from all around the world. Working with people who have diverse
backgrounds ensures that our teams get to ask lots of questions and come up with more
creative solutions. The main objective in security is to protect organizations and people. This
line of work allows you to support and interact with people across the globe. There are many
openings for entry-level security analysts, and employers are struggling to find enough
candidates with the right expertise. This program is designed to give you the knowledge and
skills you need to start or advance in the security profession. No matter your current skill
level, by the time you finish this certificate program, you'll be prepared to find a security-
related job or expand your career in security. You may be wondering, what do security
professionals actually do? Have you ever had to update your password online to include a
number or a special symbol? If so, then you're already familiar with basic security measures,
like password management. And if you've ever received a notification from a service
provider about stolen data or a software hack, then you have first-hand experience with the
impact of a security breach. If you've ever asked yourself how organizations safeguard data,
then you already have two important traits that are necessary to thrive in this industry:
curiosity and excitement. Security analysts help minimize risks to organizations and people.
Analysts work to proactively guard against incidents while continuously monitoring systems
and networks. And, if an incident does occur, they investigate and report their findings. They
are always asking questions and looking for solutions. One of the best things about the
security industry is the many paths and career options it exposes you to. Each option involves
a unique set of skills and responsibilities. No matter what your background is, you'll probably
find that you already have some relevant experience. If you enjoy collaborating with and
helping others, solving puzzles, and are motivated by challenges, then this is the career for
you. For example, my background as an intelligence analyst had nothing to do with
cybersecurity. However, having strong critical thinking skills and communication skills
provided a solid foundation for my success when I decided to pursue a career in security. If
you're not sure what direction you want to take in the security industry, that's okay. This
program will give you an overview of many different types of available jobs. It will also let
you explore certain specialized skill sets to help you figure out where you want to take your
career. The Google Career Certificates are designed by industry professionals with decades of
experience here at Google. You'll have a different expert from Google guide you through
each course in the certificate. We'll share our knowledge in videos, provide practice
opportunities with hands-on activities, and take you through real scenarios that you might
encounter on the job. Throughout this program, you'll gain hands-on practice with detecting
and responding to attacks, monitoring and protecting networks, investigating incidents, and
writing code to automate tasks. The program is made up of several courses that are designed
to help you land an entry-level job. You'll learn about topics like: core security concepts;
security domains; network security; computing basics, including Linux and SQL; along with
understanding assets, threats, and vulnerabilities. Our goal is to help you reach your goal of
joining the security industry. You'll learn about incident detection and response, as well as
how to use programming languages, like Python, to accomplish common security tasks.
You'll also gain valuable job search strategies that will benefit you as you begin to find and
apply for jobs in the security profession. Completing this Google Career Certificate will help
you develop skills and learn how to use tools to prepare you for a job in a fast-growing, high-
demand field. The certificate is designed to prepare you for a job in 3-6 months if you work
on the certificate part-time. Once you graduate, you can connect with over 200 employers
who are interested in hiring Google Career Certificate graduates, like you. Whether you're
looking to switch jobs, start a new career, or level up your skills, this Google Career
Certificate can open doors to new job opportunities. You don't need prior experience or
knowledge in the security field because this certificate program will begin with the basics. I'll
be by your side throughout this first course, making sure that you're learning the foundational
knowledge needed to succeed in the field. This program is also flexible. You can complete all
of the courses in this certificate on your own terms and at your own pace, online. We've
gathered some amazing instructors to support you on your journey, and they'd like to
introduce themselves now: Hi! My name is Ashley, and I'm a Customer Engineering
Enablement Lead for Security Operations Sales at Google. I'll take you through security
domains, frameworks and controls, as well as common security threats, risks, and
vulnerabilities. You'll also be introduced to common tools used by security analysts. I can't
wait to get started! Hi there! My name is Chris, and I'm the Chief Information Security
Officer for Google Fiber. I'm excited to talk to you about the structure of a network, network
protocols, common network attacks, and how to secure a network. Hi there! My name is Kim,
and I'm a Technical Program Manager at Google. I will guide you through foundational
computing skills that support the work of a security analyst. We'll also learn about operating
systems, the Linux command line, and SQL. Hi! My name is Da'Queshia, and I'm a Security
Engineer at Google. Together we'll explore protecting organizational assets through a variety
of security controls and develop a deeper understanding of risks and vulnerabilities. Hi! My
name is Dave, and I'm a Principal Security Strategist at Google. In our time together, we'll
learn about detecting and responding to security incidents. You'll also have the chance to
monitor and analyze network activity using powerful security tools. Hello! I'm Angel, and I'm
a Security Engineer at Google. We'll explore foundational Python programming concepts to
help you automate common security tasks. Hello! I'm Dion. I'm a Program Manager at
Google. I'm your instructor for the first portion of the final course of the program. There,
we'll discuss how to escalate incidents and communicate with stakeholders. And my name is
Emily. I'm a Program Manager at Google. I'll guide you through the final portion of the
program and share ways that you can engage with the security community and prepare for
your upcoming job search. And, as you already know, I'll guide you through the first course
of this program. This is such a great time to grow your career in the field of security. Sound
exciting? Let's get started!
Congratulations on taking this first step to build your skills for a career in cybersecurity.
Enjoy the journey!
Course 1 overview
Hello, and welcome to Foundations of Cybersecurity, the first course in the Google
Cybersecurity Certificate. You’ve begun an exciting journey!
In this course, you will learn the primary job responsibilities and core skills of those who
work in the field of cybersecurity. You will explore the eight Certified Information Systems
Security Professional (CISSP) security domains, various security frameworks and controls, as
well as a foundational security model called the confidentiality, integrity, and availability
(CIA) triad. You will also be introduced to some common tools used by security analysts that
help protect organizations and people alike.
Certificate program progress
The Google Cybersecurity Certificate program has eight courses. Foundations of
Cybersecurity is the first course.
1. Foundations of Cybersecurity
Explore the cybersecurity profession, including significant events that led to the
development of the cybersecurity field and its continued importance to organizational
operations. Learn about entry-level cybersecurity roles and responsibilities.
2. Play It Safe: Manage Security Risks
Identify how cybersecurity professionals use frameworks and controls to protect
business operations, and explore common cybersecurity tools.
3. Connect and Protect: Networks and Network Security
Gain an understanding of network-level vulnerabilities and how to secure networks.
4. Tools of the Trade: Linux and SQL
Explore foundational computing skills, including communicating with the Linux
operating system through the command line and querying databases with SQL.
5. Assets, Threats, and Vulnerabilities
Learn about the importance of security controls and developing a threat actor mindset
to protect and defend an organization’s assets from various threats, risks, and
vulnerabilities.
6. Sound the Alarm: Detection and Response
Understand the incident response lifecycle and practice using tools to detect and
respond to cybersecurity incidents.
7. Automate Cybersecurity Tasks with Python
Explore the Python programming language and write code to automate cybersecurity
tasks.
8. Put It to Work: Prepare for Cybersecurity Jobs
Learn about incident classification, escalation, and ways to communicate with
stakeholders. This course closes out the program with tips on how to engage with the
cybersecurity community and prepare for your job search.
Course 1 content
Each course of this certificate program is broken into modules. You can complete courses at
your own pace, but the module breakdowns are designed to help you finish the entire Google
Cybersecurity Certificate in about six months.
What’s to come? Here’s a quick overview of the skills you’ll learn in each module of this
course.
What to expect
Each course offers many types of learning opportunities:
Videos led by Google instructors teach new concepts, introduce the use of relevant
tools, offer career support, and provide inspirational personal stories.
Readings build on the topics discussed in the videos, introduce related concepts,
share useful resources, and describe case studies.
Discussion prompts explore course topics for better understanding and allow you to
chat and exchange ideas with other learners in the discussion forums
Self-review activities and labs give you hands-on practice in applying the skills you
are learning and allow you to assess your own work by comparing it to a completed
example.
Interactive plug-ins encourage you to practice specific tasks and help you integrate
knowledge you have gained in the course.
In-video quizzes help you check your comprehension as you progress through each
video.
Practice quizzes allow you to check your understanding of key concepts and provide
valuable feedback.
Graded quizzes demonstrate your understanding of the main concepts of a course.
You must score 80% or higher on each graded quiz to obtain a certificate, and you can
take a graded quiz multiple times to achieve a passing score.
When you encounter useful links in this course, bookmark them so you can refer to the
information later for study or review.
Understand and follow the Coursera Code of Conduct to ensure that the learning community
remains a welcoming, friendly, and supportive place for all members.
START
Hi again! Now that you have some idea of what to expect from the program as a whole, let's
discuss more about what you'll learn in this course. This course will introduce you to the
world of security and how it's used to protect business operations, users, and devices, so you
can contribute to the creation of a safer internet for all. In this section, we'll cover
foundational security concepts. First, we'll define security. Then, we'll explore common job
responsibilities of security analysts. Building on that, we'll cover core skills a security analyst
may have. Finally, we'll discuss the value of security for protecting organizations and people.
Later on, we'll cover eight security domains. Then, we'll cover common security frameworks
and controls. Finally, we'll wrap up the course by discussing common tools and programming
languages that entry-level security analysts may use. Coming up, we'll go over some
resources that will allow you to get the most out of this program. I'm really excited for you to
start this journey--let's begin!
INTRODUCTION
Imagine that you're preparing for a storm. You've received notification that a storm is
coming. You prepare by gathering the tools and materials you'll need to stay safe. You make
sure your windows and doors are secure. You assemble a first aid kit, tools, food and water.
You're prepared. The storm hits and there are powerful winds and heavy rain. The storm is
using its force to try and breach your home. You notice some water leaks and begin patching
them quickly in order to minimize any risk or potential damage. Handling a security incident
is no different. Organizations must prepare for the storm by ensuring they have the tools to
mitigate and quickly respond to outside threats. The objective is to minimize risk and
potential damage. As a security analyst, you'll work to protect your organization and the
people it serves from a variety of risks and outside threats. And if a threat does get through,
you and your team will provide a solution to remedy the situation. To help you better
understand what this means, we'll define security and discuss the roles of security
professionals in organizations. Let's start with some definitions:
Cybersecurity, or security, is the practice of ensuring confidentiality, integrity, and
availability of information by protecting networks, devices, people, and data from
unauthorized access or criminal exploitation. For example, requiring complex passwords to
access sites and services improves confidentiality by making it much more difficult for a
threat actor to compromise them.
A threat actor is any person or group who presents a security risk.
Now that you know the definition of security, let's discuss what security teams do for an
organization.
Security protects against external and internal threats. An external threat is someone outside
of the organization trying to gain access to private information, networks or devices. An
internal threat comes from current or former employees, external vendors, or trusted partners.
Often these internal threats are accidental, such as an employee clicking on a compromised
link in an email. Other times, the internal actor intentionally engages in activities such as
unauthorized data access or abusing systems for personal use. Experienced security
professionals will help organizations mitigate or reduce the impact of threats like these.
Security teams also ensure an organization meets regulatory compliance, or laws and
guidelines, that require the implementation of specific security standards. Ensuring that
organizations are in compliance may allow them to avoid fines and audits, while also
upholding their ethical obligation to protect users. Security teams also maintain and improve
business productivity. By establishing a plan for business continuity, security teams allow
people to do their jobs, even in the case of something like a data breach. Being security
conscious can also reduce expenses associated with risks, such as recovering from data loss
or operational downtime, and potentially avoiding fines. The last benefit of security that we'll
discuss is maintaining brand trust. If services or customer data are compromised, this can
lower trust in the organization, damage the brand, and hurt the business in the long term. Loss
of customer trust may also lead to less revenue for the business. Now, let's go over some
common security-based roles. After completing this certificate program, here are some job
titles you may want to search for:
Security analyst or specialist,
Cybersecurity analyst or specialist,
Security operation center or SOC analyst,
Information security analyst.
You'll also learn more about the responsibilities associated with some of these job titles later
in the program. As you may now realize, the field of security includes many topics and
concepts and every activity you complete in this program moves you one step closer to a new
job. Let's keep learning together.
PATHWAY
Hi, I'm Toni, I'm a Security Engineering Manager. Our teams protect Google and its users
from serious threats. Usually government-backed attackers, coordinated influence operations
and serious cybercrime threat actors. I grew up as an army brat. My dad was in the military
and we moved around a lot. I've always had an interest in security sort of generally. I got
really hooked on international relations when I was in high school. I did a lot of Model
United Nations. And that really sort of brought these two things together for me, the way that
security works in the world. I come from a big family. I knew I was going to need financial
assistance to go to college. And the Department of Defense provides a lot of educational
opportunities that are tied to service. So this was a natural fit for me. I knew I was interested
in this area and this was going to provide a career path into something I was passionate about.
I started as an intelligence analyst, but not focused on cybersecurity. I worked
counterinsurgency for a number of years and geopolitical intelligence issues. Eventually, as I
looked and saw that the way that cybersecurity was starting to have an impact both in our
daily lives and in that world of international relations, I got more and more drawn to it.
Transitioning into cybersecurity was a huge shift for me. I came in without a solid technical
background, had to learn a lot of that on the job and through self-paced learning in different
types of courses, I needed to learn programming languages like Python and SQL, two of the
things that we cover in this certificate, I needed to learn a whole new language about the
vocabulary of threats and the different components and how those manifest technically. One
of the things that I had to figure out very early in this journey is what kind of learner I was. I
work best with a structured learning style. So turning to a lot of these online courses and
resources that took this material and structured it sort of from first principles through
application resonated very well for me. A lot of this was also learned on the job by co-
workers who were willing to share and invest time in helping me understand this. I asked a
lot of questions and I still do. Most of cybersecurity work is going to be learned on the job in
the specific environment that you're protecting. So you have to work well with your
teammates in order to be able to build that knowledge base. My advice would be to stay
curious and keep learning, especially focusing on your technical skills and growing those
throughout your career. It's really easy to get imposter syndrome in cybersecurity because it's
so broad and mastery of all these different areas is a lifetime's work. And sometimes that
imposter syndrome can shut us down and make it feel like, why bother trying to keep
growing. I'm never going to be able to master this instead of motivating us. So keep learning,
push through that fear. The efforts always going to be rewarded.
Security analysts are responsible for monitoring and protecting information and systems.
Now, we'll discuss three primary responsibilities of a security analyst, starting with protecting
computer and network systems.
Security analysts also proactively work to prevent threats from happening in the first place.
One way they do this is by working with information technology, or IT, teams to install
prevention software for the purposes of identifying risks and vulnerabilities. Analysts may
also be involved in software and hardware development. They'll often work with
development teams to support product security by setting up appropriate processes and
systems to meet the organization's data protection needs. The last task we'll discuss is
conducting periodic security audits.
A security audit is a review of an organization's security records, activities, and other related
documents. For example, an analyst may examine in-house security issues, such as making
sure that confidential information, like individual computer passwords, isn't available to all
employees. Phew, that was a lot to cover! But hopefully you have a general idea of what
entry-level security analysts do on a day-to-day basis. Security analysts are an important part
of any organization. Their daily tasks protect small businesses, large companies, nonprofit
organizations, and government agencies. They also help to ensure that the people served by
those organizations remain safe.
Once you're in security, there's so many different fields you can dive into. Whether it's
through the blue team (protecting the user) or the red team, which is just, you know, poking
holes in other people's defenses and letting them know where they're going wrong. A day in
the life as a entry- level security professional?
Um, it can change day to day, but there's two basic parts to it. There's the operation side,
which is responding to detections and doing investigations. And then there's the project side
where you're working with other teams to build new detections or improve the current
detections. The difference between this entry- level cybersecurity analyst and an entry-level
cybersecurity engineer is pretty much that the analyst is more focused on operations and the
engineer, while they can do operations, they also build the, the detections and they do more
project focused work.
My favorite task is probably the operations side doing investigations because we can
sometimes get something like this actor did such and such on this day. And we're supposed to
then dive into what they've been doing, what they've been working on to figure out if there's
any suspicious activity or if it was just a false positive.
One of the biggest ways I've made an impact as an entry-level cybersecurity professional is
actually working on the playbooks that, um, our team uses.
A playbook is a list of how to go through a certain detection, and what the analyst needs to
look at in order to investigate those incidents. I was really proud of those, those playbooks
that I've made so far because a lot of my teammates have even said how helpful they've been
to them. If you love solving problems, if you love protecting user data, being at the front lines
of a lot of headlines, then this is definitely the role for you.
Key takeaways
Understanding key technical terms and concepts used in the security field will help prepare
you for your role as a security analyst. Knowing these terms can help you identify common
threats, risks, and vulnerabilities. To explore a variety of cybersecurity terms, visit the
National Institute of Standards and Technology glossary. Or use your browser to search for
high-quality, reliable cybersecurity glossaries from research institutes or governmental
authorities. Glossaries are available in multiple languages.
Communication is a transferable skill for a security analyst. They will often need to describe
certain threats, risks, or vulnerabilities to people who may not have a technical background.
For example, security analysts may be tasked with interpreting and communicating policies
and procedures to other employees. Or analysts may be asked to report findings to their
supervisors, so the appropriate actions can be taken to secure the organization.
Another transferable skill is collaboration. Security analysts often work in teams with
engineers, digital forensic investigators, and program managers. For example, if you are
working to roll out a new security feature, you will likely have a project manager, an
engineer, and an ethical hacker on your team.
Security analysts also need to be able to analyze complex scenarios that they may encounter.
For example, a security analyst may need to make recommendations about how different
tools can support efficiency and safeguard an organization's internal network.
The last transferable skill that we'll discuss is problem-solving. Identifying a security problem
and then diagnosing it and providing solutions is a necessary skill to keep business operations
safe. Understanding threat actors and identifying trends can provide insight on how to handle
future threats.
Okay, now that we've covered some important transferable skills, let's discuss some technical
skills that security analysts need to develop. A basic understanding of programming
languages is an important skill to develop because security analysts can use programming to
automate tasks and identify error messages. Like learning any other language, learning a
programming language may seem challenging at first.
However, this certificate program assumes no prior programming experience, so we'll start at
the very beginning and provide several opportunities for hands-on practice with languages
like Python and SQL.
Another important technical skill is knowing how to use security information and event
management, or SIEM, tools. Security professionals use SIEM tools to identify and analyze
security threats, risks, and vulnerabilities. For example, a SIEM tool may alert you that an
unknown user has accessed the system. In the event of an unknown user accessing the
system, you may use computer forensics to investigate the incident.
Now, let's discuss computer forensics. Similar to an investigator and a forensic scientist
working in the criminal justice system, digital forensic investigators will attempt to identify,
analyze, and preserve criminal evidence within networks, computers, and electronic devices.
Keep in mind that you may already have some of the core skills we've discussed. And if you
don't have the technical skills, that's okay! This program is designed to support you in
learning those skills. For example, over the past seven years working in cybersecurity, I've
learned that security analysts need to have intellectual curiosity and the motivation to keep
learning in order to succeed. Personally, I dedicate time on a regular basis towards learning
more Python and SQL skills in order to meet the demands of the projects I'm working on.
You'll get to learn about Python and SQL later in this program. As you continue this journey,
you'll build the knowledge and skills you need to enter the security field.
TRANSFERABLE SKILLS
You have probably developed many transferable skills through life experiences; some of
those skills will help you thrive as a cybersecurity professional. These include:
Communication: As a cybersecurity analyst, you will need to communicate and
collaborate with others. Understanding others’ questions or concerns and
communicating information clearly to individuals with technical and non-technical
knowledge will help you mitigate security issues quickly.
Problem-solving: One of your main tasks as a cybersecurity analyst will be to
proactively identify and solve problems. You can do this by recognizing attack
patterns, then determining the most efficient solution to minimize risk. Don't be afraid
to take risks, and try new things. Also, understand that it's rare to find a perfect
solution to a problem. You’ll likely need to compromise.
Time management: Having a heightened sense of urgency and prioritizing tasks
appropriately is essential in the cybersecurity field. So, effective time management
will help you minimize potential damage and risk to critical assets and data.
Additionally, it will be important to prioritize tasks and stay focused on the most
urgent issue.
Growth mindset: This is an evolving industry, so an important transferable skill is a
willingness to learn. Technology moves fast, and that's a great thing! It doesn't mean
you will need to learn it all, but it does mean that you’ll need to continue to learn
throughout your career. Fortunately, you will be able to apply much of what you learn
in this program to your ongoing professional development.
Diverse perspectives: The only way to go far is together. By having respect for each
other and encouraging diverse perspectives and mutual respect, you’ll undoubtedly
find multiple and better solutions to security problems.
TECHNICAL SKILLS
There are many technical skills that will help you be successful in the cybersecurity field.
You’ll learn and practice these skills as you progress through the certificate program. Some
of the tools and concepts you’ll need to use and be able to understand include:
Programming languages: By understanding how to use programming languages,
cybersecurity analysts can automate tasks that would otherwise be very time
consuming. Examples of tasks that programming can be used for include searching
data to identify potential threats or organizing and analyzing information to identify
patterns related to security issues.
Security information and event management (SIEM) tools: SIEM tools collect and
analyze log data, or records of events such as unusual login behavior, and support
analysts’ ability to monitor critical activities in an organization. This helps
cybersecurity professionals identify and analyze potential security threats, risks, and
vulnerabilities more efficiently.
Intrusion detection systems (IDSs): Cybersecurity analysts use IDSs to monitor
system activity and alerts for possible intrusions. It’s important to become familiar
with IDSs because they’re a key tool that every organization uses to protect assets and
data. For example, you might use an IDS to monitor networks for signs of malicious
activity, like unauthorized access to a network.
Threat landscape knowledge: Being aware of current trends related to threat actors,
malware, or threat methodologies is vital. This knowledge allows security teams to
build stronger defenses against threat actor tactics and techniques. By staying up to
date on attack trends and patterns, security professionals are better able to recognize
when new types of threats emerge such as a new ransomware variant.
Incident response: Cybersecurity analysts need to be able to follow established
policies and procedures to respond to incidents appropriately. For example, a security
analyst might receive an alert about a possible malware attack, then follow the
organization’s outlined procedures to start the incident response process. This could
involve conducting an investigation to identify the root issue and establishing ways to
remediate it.
COMPTIA SECURITY+
In addition to gaining skills that will help you succeed as a cybersecurity professional, the
Google Cybersecurity Certificate helps prepare you for the CompTIA Security+ exam, the
industry leading certification for cybersecurity roles. You’ll earn a dual credential when you
complete both, which can be shared with potential employers. After completing all eight
courses in the Google Cybersecurity Certificate, you will unlock a 30% discount for the
CompTIA Security+ exam and additional practice materials.
KEY TAKEAWAYS
Understanding the benefits of core transferable and technical skills can help prepare you to
successfully enter the cybersecurity workforce. Throughout this program, you’ll have
multiple opportunities to develop these and other key cybersecurity analyst skills.
WRAP-UP
Congratulations on completing the first section of this course! Let's quickly review what
we've covered so far, before moving on. We defined security and introduced the benefits of
implementing security in an organization. Then, we discussed different job responsibilities,
such as managing threats and installing prevention software. We also introduced some
important core skills, like collaboration and computer forensics. We finished by discussing
the value of security and how it supports critical business functions. I hope you've gained a
greater understanding of security. If you feel like you need a refresher before moving on, you
can always go back and review any content you're unsure about. By learning the basics, you
are laying the foundation for the rest of your security career. Coming up, we'll explore some
well-known attacks that shaped the security industry. I'm excited to continue this journey
with you!
WELCOME TO MODULE 2
Welcome back! When it comes to security, there is so much to learn, and I'm thrilled to be
part of your career journey. This is such an exciting time to be learning about security! When
I learned about international hacks that impacted both private companies and government
organizations, I was inspired to want to work in security because I realized how dynamic and
important this field is. One reason there are so many jobs in the security field today, is
because of attacks that happened in the 1980s and 1990s. Decades later, security
professionals are still actively working to protect organizations and people from variations of
these early computer attacks. In this section of the course, we'll discuss viruses and malware,
and introduce the concept of social engineering. Then, we'll discuss how the digital age
ushered in a new era of threat actors. Knowing the evolution of each attack is key to
protecting against future attacks. Lastly, we'll provide an overview of eight security domains.
Next up, we'll travel back in time, to explore some of the viruses, data breaches, and malware
attacks that have helped shape the industry as we know it today.
A computer virus is malicious code written to interfere with computer operations and cause
damage to data and software. The virus attaches itself to programs or documents on a
computer, then spreads and infects one or more computers in a network. Today, viruses are
more commonly referred to as malware, which is software designed to harm devices or
networks. Two examples of early malware attacks that we'll cover are the Brain virus and the
Morris worm. They were created by malware developers to accomplish specific tasks.
However, the developers underestimated the impact their malware would have and the
amount of infected computers there would be. Let's take a closer look at these attacks and
discuss how they helped shape security as we know it today.
In 1986, the Alvi brothers created the Brain virus, although the intention of the virus was to
track illegal copies of medical software and prevent pirated licenses, what the virus actually
did was unexpected. Once a person used a pirated copy of the software, the virus-infected
that computer. Then, any disk that was inserted into the computer was also infected. The
virus spread to a new computer every time someone used one of the infected disks.
Undetected, the virus spread globally within a couple of months.
Although the intention was not to destroy data or hardware, the virus slowed down
productivity and significantly impacted business operations.
The Brain virus fundamentally altered the computing industry, emphasizing the need for a
plan to maintain security and productivity. As a security analyst, you will follow and
maintain strategies put in place to ensure your organization has a plan to keep their data and
people safe.
Another influential computer attack was the Morris worm. In 1988, Robert Morris developed
a program to assess the size of the internet. The program crawled the web and installed itself
onto other computers to tally the number of computers that were connected to the internet.
Sounds simple, right? The program, however, failed to keep track of the computers it had
already compromised and continued to re-install itself until the computers ran out of memory
and crashed. About 6,000 computers were affected, representing 10% of the internet at the
time. This attack cost millions of dollars in damages due to business disruptions and the
efforts required to remove the worm. After the Morris worm, Computer Emergency Response
Teams, known as CERTs®, were established to respond to computer security incidents.
CERTs still exist today, but their place in the security industry has expanded to include more
responsibilities. Later in this program, you'll learn more about the core functions of these
security teams and gain hands-on practice with detection and response tools. Early attacks
played a key role in shaping the current security industry. And coming up, we'll discuss how
attacks evolved in the digital age.
In the year 2000, Onel De Guzman created the LoveLetter malware to steal internet login
credentials. This attack spread rapidly and took advantage of people who had not developed a
healthy suspicion for unsolicited emails. Users received an email with the subject line, "I
Love You." Each email contained an attachment labeled, "Love Letter For You."
When the attachment was opened, the malware scanned a user's address book. Then, it
automatically sent itself to each person on the list and installed a program to collect user
information and passwords. Recipients would think they were receiving an email from a
friend, but it was actually malware.
The LoveLetter ended up infecting 45 million computers globally and is believed to have
caused over $10 billion dollars in damages. The LoveLetter attack is the first example of
social engineering. Social engineering is a manipulation technique that exploits human error
to gain private information, access, or valuables.
After the LoveLetter, attackers understood the power of social engineering. The number of
social engineering attacks is increasing with every new social media application that allows
public access to people's data. Many people are now prioritizing convenience over privacy.
The trade-off of this evolving shift is that these tools may lead to increased vulnerability, if
people do not use them appropriately.
Specifically, phishing through the emails they receive. Phishing is the use of digital
communications to trick people into revealing sensitive data or deploying malicious software.
Now, let's discuss the Equifax breach. In 2017, attackers successfully infiltrated the credit
reporting agency, Equifax. This resulted in one of the largest known data breaches of
sensitive information. Over 143 million customer records were stolen, and the breach affected
approximately 40% of all Americans. The records included personally identifiable
information including social security numbers, birth dates, driver's license numbers, home
addresses, and credit card numbers. From a security standpoint, the breach occurred due to
multiple failures on Equifax's part. It wasn't just one vulnerability that the attackers took
advantage of, there were several.
The company failed to take the actions needed to fix multiple known vulnerabilities in the
months leading up to the data breach. In the end, Equifax settled with the U.S. government
and paid over $575 million dollars to resolve customer complaints and cover required fines.
While there have been other data breaches before and after the Equifax breach, the large
settlement with the U.S. government alerted companies to the financial impact of a breach
and the need to implement preventative measures.
These are just a couple of well-known incidents that have shaped the security industry.
Knowing about them will help you in your security career. Understanding different types of
malware and social engineering attacks will allow you to communicate about security risks
during future job interviews.
As a future security professional, constantly adapting and educating yourself on threat actors'
tactics and techniques will be a part of your job. By noticing similar trends, patterns, and
methodologies, you may be able to identify a potential breach and limit future damage.
Finally, understanding how security affects people's lives is a good reminder of why the work
you will do is so important!
PHISHING
Phishing is the use of digital communications to trick people into revealing sensitive data or
deploying malicious software. Some of the most common types of phishing attacks today
include:
Business Email Compromise (BEC): A threat actor sends an email message that
seems to be from a known source to make a seemingly legitimate request for
information, in order to obtain a financial advantage.
Spear phishing: A malicious email attack that targets a specific user or group of
users. The email seems to originate from a trusted source.
Whaling: A form of spear phishing. Threat actors target company executives to gain
access to sensitive data.
Vishing: The exploitation of electronic voice communication to obtain sensitive
information or to impersonate a known source.
Smishing: The use of text messages to trick users, in order to obtain sensitive
information or to impersonate a known source.
MALWARE
Malware is software designed to harm devices or networks. There are many types of
malware. The primary purpose of malware is to obtain money, or in some cases, an
intelligence advantage that can be used against a person, an organization, or a territory.
Some of the most common types of malware attacks today include:
Viruses: Malicious code written to interfere with computer operations and cause
damage to data and software. A virus needs to be initiated by a user (i.e., a threat
actor), who transmits the virus via a malicious attachment or file download. When
someone opens the malicious attachment or download, the virus hides itself in other
files in the now infected system. When the infected files are opened, it allows the
virus to insert its own code to damage and/or destroy data in the system.
Worms: Malware that can duplicate and spread itself across systems on its own. In
contrast to a virus, a worm does not need to be downloaded by a user. Instead, it self-
replicates and spreads from an already infected computer to other devices on the same
network.
Ransomware: A malicious attack where threat actors encrypt an organization's data
and demand payment to restore access.
Spyware: Malware that’s used to gather and sell information without consent.
Spyware can be used to access devices. This allows threat actors to collect personal
data, such as private emails, texts, voice and image recordings, and locations.
SOCIAL ENGINEERING
Social engineering is a manipulation technique that exploits human error to gain private
information, access, or valuables. Human error is usually a result of trusting someone without
question. It’s the mission of a threat actor, acting as a social engineer, to create an
environment of false trust and lies to exploit as many people as possible. Some of the most
common types of social engineering attacks today include:
Social media phishing: A threat actor collects detailed information about their target
from social media sites. Then, they initiate an attack.
Watering hole attack: A threat actor attacks a website frequently visited by a
specific group of users.
USB baiting: A threat actor strategically leaves a malware USB stick for an
employee to find and install, to unknowingly infect a network.
Physical social engineering: A threat actor impersonates an employee, customer, or
vendor to obtain unauthorized access to a physical location.
In this video, we're going to cover the first four: security and risk management, asset security,
security architecture and engineering, and communication and network security
The second domain is asset security. This domain focuses on securing digital and physical
assets. It's also related to the storage, maintenance, retention, and destruction of data. When
working with this domain, security analysts may be tasked with making sure that old
equipment is properly disposed of and destroyed, including any type of confidential
information.
The third domain is security architecture and engineering. This domain focuses on optimizing
data security by ensuring effective tools, systems, and processes are in place. As a security
analyst, you may be tasked with configuring a firewall.
A firewall is a device used to monitor and filter incoming and outgoing computer network
traffic. Setting up a firewall correctly helps prevent attacks that could affect
productivity.
The fourth security domain is communication and network security. This domain focuses on
managing and securing physical networks and wireless communications. As a security
analyst, you may be asked to analyze user behavior within your organization. Imagine
discovering that users are connecting to unsecured wireless hotspots. This could leave the
organization and its employees vulnerable to attacks. To ensure communications are secure,
you would create a network policy to prevent and mitigate exposure. Maintaining an
organization's security is a team effort, and there are many moving parts.
As an entry-level analyst, you will continue to develop your skills by learning how to
mitigate risks to keep people and data safe. You don't need to be an expert in all domains.
But, having a basic understanding of them will aid you in your journey as a security
professional. You're doing great! We have just introduced the first four security domains, and
in the next video, we'll discuss four more! See you soon!
Let's move into the fifth domain: identity and access management. Identity and access
management focuses on keeping data secure, by ensuring users follow established policies to
control and manage physical assets, like office spaces, and logical assets, such as networks
and applications. Validating the identities of employees and documenting access roles are
essential to maintaining the organization's physical and digital security. For example, as a
security analyst, you may be tasked with setting up employees' keycard access to buildings.
The sixth domain is security assessment and testing. This domain focuses on conducting
security control testing, collecting and analyzing data, and conducting security audits to
monitor for risks, threats, and vulnerabilities. Security analysts may conduct regular audits of
user permissions, to make sure that users have the correct level of access. For example,
access to payroll information is often limited to certain employees, so analysts may be asked
to regularly audit permissions to ensure that no unauthorized person can view employee
salaries.
The seventh domain is security operations. This domain focuses on conducting investigations
and implementing preventative measures. Imagine that you, as a security analyst, receive an
alert that an unknown device has been connected to your internal network. You would need
to follow the organization's policies and procedures to quickly stop the potential threat.
The final, eighth domain is software development security. This domain focuses on using
secure coding practices, which are a set of recommended guidelines that are used to create
secure applications and services. A security analyst may work with software development
teams to ensure security practices are incorporated into the software development life-cycle.
If, for example, one of your partner teams is creating a new mobile app, then you may be
asked to advise on the password policies or ensure that any user data is properly secured and
managed. That ends our introduction to CISSP's eight security domains. Challenge yourself
to better understand each of these domains and how they affect the overall security of an
organization. While they may still be a bit unclear to you this early in the program, these
domains will be discussed in greater detail in the next course. See you there!
ATTACK TYPES
1. Password Attack: A password attack is an attempt to access password-secured
devices, systems, networks, or data. Some forms of password attacks that you’ll learn
about later in the certificate program are:
Brute force
Rainbow table
Password attacks fall under the communication and network security domain.
3. Physical Attack: A physical attack is a security incident that affects not only digital
but also physical environments where the incident is deployed. Some forms of
physical attacks are:
Malicious USB cable
Malicious flash drive
Card cloning and skimming
Physical attacks fall under the asset security domain.
KEY TAKEAWAYS
The eight CISSP security domains can help an organization and its security team fortify
against and prepare for a data breach. Data breaches range from simple to complex and fall
under one or more domains. Note that the methods of attack discussed are only a few of
many. These and other types of attacks will be discussed throughout the certificate program.
PRO TIP: If you cannot find a term in the NIST glossary, enter the appropriate search term
(e.g., “cybersecurity birthday attack”) into your preferred search engine to locate the
definition in another reliable source such as a .edu or .gov site.
UNDERSTAND ATTACKERS
Previously, you were introduced to the concept of threat actors. As a reminder, a threat actor
is any person or group who presents a security risk. In this reading, you’ll learn about
different types of threat actors. You will also learn about their motivations, intentions, and
how they’ve influenced the security industry.
2. Insider Threats: Insider threats abuse their authorized access to obtain data that may
harm an organization. Their intentions and motivations can include:
Sabotage
Corruption
Espionage
Unauthorized data access or leaks
3. Hacktivists: Hacktivists are threat actors that are driven by a political agenda. They
abuse digital technology to accomplish their goals, which may include:
Demonstrations
Propaganda
Social change campaigns
Fame
HACKER TYPES
A hacker is any person who uses computers to gain access to computer systems, networks, or
data. They can be beginner or advanced technology professionals who use their skills for a
variety of reasons. There are three main categories of hackers:
Authorized hackers are also called ethical hackers. They follow a code of ethics
and adhere to the law to conduct organizational risk evaluations. They are motivated
to safeguard people and organizations from malicious threat actors.
Semi-authorized hackers are considered researchers. They search for
vulnerabilities but don’t take advantage of the vulnerabilities they find.
Unauthorized hackers are also called unethical hackers. They are malicious threat
actors who do not follow or respect the law. Their goal is to collect and sell
confidential data for financial gain.
Note: There are multiple hacker types that fall into one or more of these three categories.
New and unskilled threat actors have various goals, including:
To learn and enhance their hacking skills
To seek revenge
To exploit security weaknesses by using existing malware, programming
scripts, and other tactics
Other types of hackers are not motivated by any particular agenda other than completing the
job they were contracted to do. These types of hackers can be considered unethical or ethical
hackers. They have been known to work on both illegal and legal tasks for pay.
There are also hackers who consider themselves vigilantes. Their main goal is to protect the
world from unethical hackers.
KEY TAKEAWAYS
Threat actors are defined by their malicious intent and hackers are defined by their technical
skills and motivations. Understanding their motivations and intentions will help you be better
prepared to protect your organization and the people it serves from malicious attacks carried
out by some of these individuals and groups.
WRAP-UP
This concludes our brief introduction to some of the most influential security attacks
throughout history and CISSP's eight security domains. Let's review what we've discussed.
First, we covered viruses, including the Brain virus and the Morris worm, and discussed how
these early forms of malware shaped the security industry. We also discussed how many
attacks today are variants of these early examples. Understanding previous attacks is critical
for security professionals who are working to protect organizations and people from possible
future variants. We also discussed social engineering and threat actor motives by learning
about the LoveLetter attack and the Equifax data breach. These incidents showed the
widespread impacts and associated costs of more recent security breaches in the digital age.
Finally, we introduced CISSP's eight security domains and how they can be used to
categorize different areas of focus within the security profession. I hope you're feeling
confident about your foundational security knowledge! Learning the history of security can
allow you to better understand the current industry. CISSP's eight security domains provide a
way to organize the work of security professionals. Remember, every security professional is
essential. Your unique point of view, professional background, and knowledge are valuable.
So, the diversity you bring to the field will further improve the security industry as you work
to keep organizations and people safe.
But as the days go by, unexpected problems arise. The weather has been unpredictable and
pests have been aggressively trying to infiltrate your garden. You start implementing better
ways to safeguard your garden by installing a surveillance camera, building a fence, and
covering your plants with a canopy to keep your garden healthy and growing. Now that you
have a better idea about the threats to your garden and how to keep your plants safe, you
establish better policies and procedures to continuously monitor and safeguard your garden.
In this way, security resembles a garden. It's an evolving industry that will challenge you to
make continuous improvements to policies and procedures that help protect your organization
and the people it serves.
To that end, we'll introduce security frameworks and controls and explain why they're
important. We'll also cover core components and specific examples of frameworks and
controls, including the Confidentiality, Integrity, and Availability Triad, or CIA Triad. We'll
end with the discussion about the ethics of security and share a few notable ethical concerns
in the security field. Evolving security practices may seem a little abstract, but many of us use
them every day.
For example, I use security keys, which are a type of security control, as a second form of
authentication to access my accounts. The keys ensure that only I can access my accounts,
even if a password has been compromised. By improving confidentiality, they also assure me
that the integrity of my accounts is intact. Having processes and procedures in place to
organize security efforts and make informed decisions is important for any organization. I'm
so excited to get started, and I hope you are too!
INTRODUCTION TO SECURITY FRAMEWORKS AND CONTROLS
Imagine you're working as a security analyst and receive multiple alerts about suspicious
activity on the network. You realize that you'll need to implement additional security
measures to keep these alerts from becoming serious incidents. But where do you start? As an
analyst, you'll start by identifying your organization's critical assets and risks. Then you'll
implement the necessary frameworks and controls.
In this video, we'll discuss how security professionals use frameworks to continuously
identify and manage risk. We'll also cover how to use security controls to manage or reduce
specific risks.
Security frameworks are guidelines used for building plans to help mitigate risks and threats
to data and privacy. Security frameworks provide a structured approach to implementing a
security lifecycle. The security lifecycle is a constantly evolving set of policies and standards
that define how an organization manages risks, follows established guidelines, and meets
regulatory compliance, or laws. There are several security frameworks that may be used to
manage different types of organizational and regulatory compliance risks. The purpose of
security frameworks include protecting personally identifiable information, known as PII,
securing financial information, identifying security weaknesses, managing organizational
risks, and aligning security with business goals. Frameworks have four core components and
understanding them will allow you to better manage potential risks.
The first core component is identifying and documenting security goals. For example, an
organization may have a goal to align with the E.U.'s General Data Protection Regulation,
also known as GDPR. GDPR is a data protection law established to grant European citizens
more control over their personal data. A security analyst may be asked to identify and
document areas where an organization is out of compliance with GDPR.
The second core component is setting guidelines to achieve security goals. For example,
when implementing guidelines to achieve GDPR compliance, your organization may need to
develop new policies for how to handle data requests from individual users.
The third core component of security frameworks is implementing strong security processes.
In the case of GDPR, a security analyst working for a social media company may help design
procedures to ensure the organization complies with verified user data requests. An example
of this type of request is when a user attempts to update or delete their profile information.
The last core component of security frameworks is monitoring and communicating results.
As an example, you may monitor your organization's internal network and report a potential
security issue affecting GDPR to your manager or regulatory compliance officer.
Now that we've introduced the four core components of security frameworks, let's tie them all
together. Frameworks allow analysts to work alongside other members of the security team to
document, implement, and use the policies and procedures that have been created. It's
essential for an entry-level analyst to understand this process because it directly affects the
work they do and how they collaborate with others.
Next, we'll discuss security controls. Security controls are safeguards designed to reduce
specific security risks. For example, your company may have a guideline that requires all
employees to complete a privacy training to reduce the risk of data breaches. As a security
analyst, you may use a software tool to automatically assign and track which employees have
completed this training. Security frameworks and controls are vital to managing security for
all types of organizations and ensuring that everyone is doing their part to maintain a low
level of risk. Understanding their purpose and how they are used allows analysts to support
an organization's security goals and protect the people it serves.
In the following videos, we'll discuss some well-known frameworks and principles that
analysts need to be aware of to minimize risk and protect data and users.
SECURE DESIGN
Hi, welcome back! Previously, we discussed frameworks and controls in general. In this
video, you'll learn about specific frameworks and controls that organizations can voluntarily
use to minimize risks to their data and to protect users. Let's get started!
The CIA triad is a foundational model that helps inform how organizations consider risk
when setting up systems and security policies. CIA stands for confidentiality, integrity, and
availability.
Confidentiality means that only authorized users can access specific assets or data. For
example, strict access controls that define who should and should not have access to data,
must be put in place to ensure confidential data remains safe.
Integrity means the data is correct, authentic, and reliable. To maintain integrity, security
professionals can use a form of data protection like encryption to safeguard data from being
tampered with.
Availability means data is accessible to those who are authorized to access it. Let's define a
term that came up during our discussion of the CIA triad: asset.
It carries more risk and therefore requires tighter security controls in comparison to a website
that shares publicly available news content. As you may remember, earlier in the course, we
discussed frameworks and controls in general. Now, we'll discuss a specific framework
developed by the U.S.-based National Institute of Standards and Technology: the
Cybersecurity Framework, also referred to as the NIST CSF.
Some of the most dangerous threat actors to consider are disgruntled employees. They are the
most dangerous because they often have access to sensitive information and know where to
find it. In order to reduce this type of risk, security professionals would use the principle of
availability, as well as organizational guidelines based on frameworks to ensure staff
members can only access the data they need to perform their jobs.
Threat actors originate from all across the globe, and a diverse workforce of security
professionals helps organizations identify attackers' intentions. A variety of perspectives can
assist organizations in understanding and mitigating the impact of malicious activity. That
concludes our introduction to the CIA triad and NIST CSF framework, which are used to
develop processes to secure organizations and the people they serve. You may be asked in an
interview if you know about security frameworks and principles. Or you may be asked to
explain how they're used to secure organizational assets. In either case, throughout this
program, you'll have multiple opportunities to learn more about them and apply what we've
discussed to real-world situations. Coming up, we'll discuss the ethics of security. See you
soon!
Note: Specifications and guidelines can change depending on the type of organization you
work for.
In addition to the NIST CSF and NIST RMF, there are several other controls, frameworks,
and compliance standards that are important for security professionals to be familiar with to
help keep organizations and the people they serve safe.
Organizations that store patient data have a legal obligation to inform patients of a breach
because if patients' Protected Health Information (PHI) is exposed, it can lead to identity
theft and insurance fraud. PHI relates to the past, present, or future physical or mental health
or condition of an individual, whether it’s a plan of care or payments for care. Along with
understanding HIPAA as a law, security professionals also need to be familiar with the
Health Information Trust Alliance (HITRUST®), which is a security framework and
assurance program that helps institutions meet HIPAA compliance.
They are used to assess an organization’s financial compliance and levels of risk. They also
cover confidentiality, privacy, integrity, availability, security, and overall data safety. Control
failures in these areas can lead to fraud.
PRO TIP: There are a number of regulations that are frequently revised. You are encouraged
to keep up-to-date with changes and explore more frameworks, controls, and compliance.
Two suggestions to research: the Gramm-Leach-Bliley Act and the Sarbanes-Oxley Act.
KEY TAKEAWAYS
In this reading you learned more about controls, frameworks, and compliance. You also
learned how they work together to help organizations maintain a low level of risk. As a
security analyst, it’s important to stay up-to-date on common frameworks, controls, and
compliance regulations and be aware of changes to the cybersecurity landscape to help ensure
the safety of both organizations and people.
First, you might see a government regulator become more interested in understanding the
practices around how a company is handling data.
Secondly, consumers, customers, businesses may actually begin to directly inquire of the
company how they're handling data. And this may become part of the customer relationship
and increasingly important if that data is very sensitive.
And third, the last consequence is legal action. And it's not uncommon for us to see victims
of cybersecurity incidents now suing companies for mishandling their data. You can keep up
to date with compliance, regulation and laws around PII by consulting the relevant website in
the jurisdiction that you have a question for. Many government websites now post the laws,
regulations, and compliance requirements for data that's being handled.
The regulations and laws that govern how PII can be handled are very complex, all over the
world, countries, states, counties are regulating it at different levels. It's important to
understand and to be aware that these laws exist. However, if you need to ask a question
about a specific law, it's important to seek advice from legal counsel for that particular
jurisdiction. It may be very different than the jurisdiction that you're in.
ETHICS IN CYBERSECURITY
In security, new technologies present new challenges. For every new security incident or risk,
the right or wrong decision isn't always clear. For example, imagine that you're working as an
entry-level security analyst and you have received a high risk alert. You investigate the alert
and discover data has been transferred without authorization. You work diligently to identify
who made the transfer and discover it is one of your friends from work. What do you do?
Ethically, as a security professional, your job is to remain unbiased and maintain security and
confidentiality. While it's normal to want to protect a friend, regardless of who the user in
question may be, your responsibility and obligation is to adhere to the policies and protocols
you've been trained to follow. In many cases, security teams are entrusted with greater access
to data and information than other employees. Security professionals must respect that
privilege and act ethically at all times. Security ethics are guidelines for making appropriate
decisions as a security professional. As another example, if you as an analyst have the ability
to grant yourself access to payroll data and can give yourself a raise, just because you have
access to do so, does that mean you should? The answer is no.
You should never abuse the access you've been granted and entrusted with. Let's discuss
ethical principles that may raise questions as you navigate solutions for mitigating risks.
These are confidentiality, privacy protections, and laws.
Let's begin with the first ethical principle, confidentiality. Earlier we discussed confidentiality
as part of the CIA triad. Now let's discuss how confidentiality can be applied to ethics. As a
security professional, you'll encounter proprietary or private information, such as PII. It's
your ethical duty to keep that information confidential and safe. For example, you may want
to help out a coworker by providing computer system access outside of properly documented
channels. However, this ethical violation can result in serious consequences, including
reprimands, the loss of your professional reputation, and legal repercussions for both you and
your friend.
The second ethical principle to consider is privacy protections. Privacy protection means
safeguarding personal information from unauthorized use. For example, imagine you receive
a personal email after hours from your manager requesting a colleague's home phone number.
Your manager explains that they can't access the employee database at the moment, but they
need to discuss an urgent matter with that person. As a security analyst, your role is to follow
the policies and procedures of your company, which in this example, state that employee
information is stored in a secure database and should never be accessed or shared in any other
format. So, accessing and sharing the employee's personal information would be unethical. In
situations like this, it can be difficult to know what to do. So, the best response is to adhere to
the policies and procedures set by your organization.
A third important ethical principle we must discuss is the law. Laws are rules that are
recognized by a community and enforced by a governing entity. For example, consider a staff
member at a hospital who has been trained to handle PII, and SPII for compliance. The staff
member has files with confidential data that should never be left unsupervised, but the staff
member is late for a meeting. Instead of locking the files in a designated area, the files are left
on the staff member's desk, unsupervised. Upon the employee's return, the files are missing.
The staff member has just violated multiple compliance regulations, and their actions were
unethical and illegal, since their negligence has likely resulted in the loss of private patient
and hospital data.
As you enter the security field, remember that technology is constantly evolving, and so are
attackers' tactics and techniques. Because of this, security professionals must continue to
think critically about how to respond to attacks. Having a strong sense of ethics can guide
your decisions to ensure that the proper processes and procedures are followed to mitigate
these continually evolving risks.
Organizations typically do not counterattack because the above scenarios and parameters are
hard to measure. There is a lot of uncertainty dictating what is and is not lawful, and at times
negative outcomes are very difficult to control. Counterattack actions generally lead to a
worse outcome, especially when you are not an experienced professional in the field. To
learn more about specific scenarios and ethical concerns from an international perspective,
review updates provided in the Tallinn Manual online.
KEY TAKEAWAYS
As a future security professional, ethics will play a large role in your daily work.
Understanding ethics and laws will help you make the correct choices if and when you
encounter a security threat or an incident that results in a breach.
Examples of unethical behavior are usually honestly just slight laziness, people taking
shortcuts and not really thinking about the consequences of their actions. So, certainly when
people share passwords to systems or give out private information, or look into systems for
their own personal information or purposes about people they know or about celebrities. One
of the most difficult situations that I ever faced in my technology career related to ethics was
shortly after 9/11, my boss's boss's boss came to me with a bunch of keywords that were
clearly related to the attack in New York and asked me to query the database that I
administered that had everybody's text messages in it for the entire telecommunications
company without anything in writing and without a court order. I was in a very
uncomfortable position to tell someone that much senior than me that I wasn't comfortable
doing that. I suggested that he bring something in writing to me to do that and he found
someone else who did it for him. When you're faced with one of these difficult decisions, it's
good to think about what would be the consequences of your decision.
My encouragement to those of you out here taking this program is that the rewards that you
get from helping to protect your company or your users or your organization from cyber
criminals is really great. We get to be the good guys and help protect our industry and our
customers from cyber attacks and cyber criminals. That's rewarding.
And finally, we discussed security ethics, including common ethical issues to consider, such
as confidentiality, privacy protections, and laws. You're almost there, only one more section
to go in this course. Coming up, you'll learn about common tools and programming
languages used by security analysts to protect organizational operations. Hope you're as
excited as I am to keep going!
WELCOME TO MODULE 4
Welcome to the final section of this course! Here, we'll be introducing tools and
programming languages that are commonly used in the security field. They are essential for
monitoring security in an organization because they enhance efficiency by automating tasks.
Although we're only introducing these concepts and tools at this point, later in the program,
you'll have opportunities to use them in a variety of hands-on activities.
In the following videos, you'll learn about security information and event management, or
SIEM, tools. You'll also be introduced to other tools such as playbooks and network protocol
analyzers. Then, you'll learn about the Linux operating system and security-related tasks that
are initiated through programming languages, such as SQL and Python.
For me, SQL is one of the most useful tools. It allows me to explore all the different data
sources we collect, and it allows my team to analyze the data for trends. Take your time
going through the videos and if you need to, re-watch them. Also know that these tools will
be discussed in much more detail, and you will be able to practice them firsthand, later in the
certificate program. While every organization has their own set of tools and training materials
that you'll learn to use on the job, this program will provide you with foundational knowledge
that will help you succeed in the security industry. Let's get started!
Completed Exemplar
To review the exemplar for this course item, click the following link and select Use
Template.
Link to exemplar:
Professional statement exemplar
OR
If you don’t have a Google account, you can download the exemplar directly from the
following attachment.
Assessment of Exemplar
Compare the exemplar to your completed activity. Review your work using each of the
criteria in the exemplar. What did you do well? Where can you improve? Use your answers
to these questions to revise your project as needed and guide you as you continue to progress
through the certificate program.
Note: The exemplar represents one possible way to complete the activity. Yours will likely
differ in certain ways. What’s important is that your activity explains your strengths, values,
and interest in the cybersecurity profession.
Wrap-up
That completes the introduction to security tools and programming languages!
In this section of the course, we covered SIEM tools such as Splunk and Chronicle.
We also discussed how SIEM tools are used by security analysts to complete
different tasks.
Then, we discussed other tools such as playbooks and
network protocol analyzers, also called packet sniffers.
Finally, we introduced the Linux operating system and the programming languages
SQL and Python.
Remember, the tools we discussed take time to understand completely.
But having a basic understanding of these tools can help you
get a job in the security field and progress in your career!
Glossary terms from module 4
Terms and definitions from Course 1, Module 4
Antivirus software: A software program used to prevent, detect, and eliminate malware and
viruses
Database: An organized collection of information or data
Data point: A specific piece of information
Intrusion detection system (IDS): An application that monitors system activity and alerts on
possible intrusions
Linux: An open-source operating system
Log: A record of events that occur within an organization’s systems
Network protocol analyzer (packet sniffer): A tool designed to capture and analyze data
traffic within a network
Order of volatility: A sequence outlining the order of data that must be preserved from first
to last
Programming: A process that can be used to create a specific set of instructions for a
computer to execute tasks
Protecting and preserving evidence: The process of properly working with fragile and
volatile digital evidence
Security information and event management (SIEM): An application that collects and
analyzes log data to monitor critical activities in an organization
SQL (Structured Query Language): A query language used to create, interact with, and
request information from a database
Course wrap-up
Congratulations on completing the first course!
We've come so far and covered so
much about a really exciting industry.
I find cybersecurity to be exciting because it's dynamic.
There are always new puzzles to solve, and
the work of protecting our users is worthwhile.
Before we move on, let's take a moment to
celebrate and reflect on what we've covered.
First, we introduced core security concepts,
including what security is and why it matters.
We also discussed what
an entry-level security analyst
does and some skills related to the role.
Then, we transitioned to eight security domains,
which include security and risk management,
asset security, and security operations.
Next, we highlighted security frameworks and controls.
Specifically, the CIA triad model
and the NIST Cybersecurity Framework.
Finally, we explored common tools and
programming languages used by
security analysts, such as SIEMs,
playbooks, SQL, and Python.
I hope you're proud of the work you've done so far.
No matter what direction
you take in the security industry,
everything you've learned lays
the foundation for the next phase of your career.
And, as you move through this program,
you'll have the chance to develop your skills further.
In the next course, we'll provide more details about
several of the topics introduced in this course.
Hi, I'm Ashley, and I will be guiding you
through the next course of this certificate program.
We'll discuss security domains and
business operations in greater detail.
I'm so glad I was able to
be here for the beginning of your journey.
You're off to a great start.
I'm excited for you to reach
your goal of joining the security industry!
Congratulations on completing the first course! We've come so far and covered so much
about a really exciting industry. I find cybersecurity to be exciting because it's dynamic.
There are always new puzzles to solve, and : Added to Selection. Press [CTRL + S] to save as
a note
en