Google Cybersecurity Certificate - COURSE 1 NOTES
Google Cybersecurity Certificate - COURSE 1 NOTES
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
4/14/24
MODULE 1
What do we do?
- Protect organizations and people (password mgmt, stolen data, hacks)
- Safeguard data
- Monitor systems and networks
- Investigate breaches and report findings
- Write code to automate tasks
BENEFITS OF SECURITY:
- Protects against external and internal threats
- Meets regulatory compliance
- Maintains and improves business productivity
- Reduces expenses
- Maintains brand trust
PII - Personally Identifiable Information - any information used to infer an individual’s identity (eg. full
name, DOB, phone #, physical address, email address, IP address)
SPII - Sensitive Personally Identifiable Information - Stricter handling guidelines (eg. SS#, medical
records, financial records, biometrics)
IDENTITY THEFT - Stealing personal information to commit fraud while impersonating the victim.
Install Detection Software - Security professionals collaborate with IT teams to deploy an application
that helps identify risks and vulnerabilities
----
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
MODULE 2
BRAIN VIRUS (1986) - Made to track illegal copies of medical software. Physical disks. If a disk was
inserted into the computer it installs a virus. Spread globally and slowed productivity.
MORRIS WORM (1988) - Created to assess the size of the internet. It installed on computers that
were connected, but it kept re-installing until computers ran out of memory and crashed. Affected
6,000 computers (10% of the Internet at the time)
CERTs - Computer Emergency Responses Teams (created in response to Morris Worm)
With the growth of high-speed internet, web-connected computers expanded exponentially. Viruses
didn’t need physical disks anymore and could spread more easily and much quicker.
LOVE LETTER MALWARE (2000) - Stole network login credentials. Sent an email with the subject, “I
Love You” and a Love Letter attachment. Upon downloading and opening the attachment, it scanned
the user’s address books and sent emails to all users listed. It also installed an application (viurus) on
each computer which collected login information. Infected 45 million users and created $10 billion in
damages.
EQUIFAX BREACH (2017) - 1 of the largest known breaches in history. 143+ million customers were
affected. 40% of all Americans. (PII/SPII). $500+ million in fines from the US Govt.
PHISHING TYPES:
BEC - Business Email Compromise. From a “known” source for seemingly “legitimate”
requests for info. For financial data.
Spear Phishing - Targets a specific user or group
Whale Phising - Form of Spear Ph. Targets executives.
Vishing - Exploitation of electronic voice communication
Smishing - Uses text messages to trick users
HACKER TYPES:
Ethical Hackers (Authorized) - Code of ethics…often internal and directed
Semi-authorized - Researchers
Unauthorized - Malicious threat actors
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(4/15/24)
MODULE 3
(eg. If your organization is under attack. 1) Identify your organization’s critical assets and risks.
2) Implement necessary frameworks and controls.)
SECURITY FRAMEWORKS - Guidelines used for building plans to help mitigate risk and threats to
data & privacy.
SECURITY CONTROLS - Safeguards designed to reduce specific security risks. (eg. create an
application that confirms user have watched a privacy video…track their progress.)
CIA TRIAD
Foundational model that helps inform how organizations consider risk when setting up systems &
security policies.
NIST CSF - NIST Cybersecurity Framework. “A voluntary framework that consists of standards,
guidelines, and best practices to manage cybersecurity risk.” A baseline to manage short & long-term
risk.
ETHICS IN CYBERSECURITY
INTERNATIONAL STANCE: ICJ (Int’l Court of Justice) says you may counter-attack IF:
1) The counter only affects the attacking party
2) The counter is a direct communication asking the threat actor to stop
3) The counter does not escalate the situation
4) The counter’s effects can be reversed
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(4/15/24)
MODULE 4
CYBERSECURITY TOOLS
LOG - record of events that occur within an organization’s system (eg. A record of employee logins or
web access.
SIEM Tools have different “Dashboards” that visually organize data into categories.
PROGRAMMING - Used to create a specific set of instructions for a computer to execute tasks.
(repetitive tasks, high degree of accuracy and efficiency) “automation”
LINUX - open-source operating system. Command line interface (text based). NOT a
programming language.
SQL - (“sequel”) STRUCTURED QUERY LANGUAGE - a programming language used to
create, interact with, and request info from a database (an organized collection of information or data)
PYTHON - Used to automate tasks that are repetitive and time-consuming and that require a
high level of detail and accuracy.
OPERATING SYSTEM - interface between computer hardware and the user. (eg. Linux, MacOS,
Windows)
WEB VULNERABILITY - a unique flaw in a web application that a threat actor could exploit by using
malicious code or behavior to allow unauthorized access, data theft, and malware deployment.
ANTIVIRUS SOFTWARE - A software program to prevent, detect, and eliminate malware. Scans the
device’s memory for the presence of malware.
INTRUSION DETECTION SYSTEM (IDS) - Application that monitors system activity and alerts of
possible intrusions. Scans small network packets.
ENCRYPTION - Make data unreadable and difficult to decode for an unauthorized user. For
confidentiality of privacy data.
PENETRATION TESTING (PEN testing) - a simulated attack that helps identify vulnerabilities in
systems, networks, websites, applications, and processes. A thorough risk assessment.
CYBERSECURITY PORTFOLIO
Used to demonstrate your security education, skills, and knowledge. Share with potential
employers. More in-depth than a resume.
Hosts: your Documents folder. Google Drive. Dropbox. Google Sites. Git repository.
PORTFOLIO PROJECTS:
---
MUSIC -> CYBERSECURITY
Pros:
- Creative
- Think outside the box
- See evolving patterns
- Jazz “improvisation”
- Music is another language
- Music technology (cognitive experiences)