Google

Assets, Threats, and Vulnerabilities

United States

The Non-degree in Assets, Threats, and Vulnerabilities at Google is a program for international students taught in English.

Introduction

Google is a multinational technology company, founded in 1998 by Larry Page and Sergey Brin while they were PhD students at Stanford University. Initially focused on developing a powerful search engine, Google has since expanded its reach into various fields including advertising, cloud computing, artificial intelligence, and hardware. As a public company and a subsidiary of Alphabet Inc., Google is distinguished for its innovative products and services such as Google Search, Google Maps, YouTube, and Android. It is renowned for its mission to organize the world’s information and make it universally accessible and useful.

About the Program

This is the fifth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the fourth Google Cybersecurity Certificate course. In this course, you will explore the concepts of assets, threats, and vulnerabilities. First, you'll build an understanding of how assets are classified. Next, you will become familiar with common threats and vulnerabilities, and the security controls used by organizations to protect valuable information and mitigate risk. You will develop an attacker mindset by practicing the threat modeling process, and you'll learn tactics for staying ahead of security breaches. Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs. Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Learn effective data handling processes. - Discuss the role of encryption and hashing in securing assets. - Describe how to effectively use authentication and authorization. - Explain how common vulnerability exposures are identified by MITRE. - Analyze an attack surface to find risks and vulnerabilities. - Identify threats, such as social engineering, malware, and web-based exploits. - Summarize the threat modeling process.

About the University

Google, established in 1998 by Larry Page and Sergey Brin, began as a research project aimed at improving internet search functionality. Today, it is one of the largest technology companies in the world, offering a wide range of digital products and services that have transformed industries like advertising, mobile operating systems, and cloud computing. Google is recognized for its commitment to innovation, user-focused design, and its impact on everyday life through products like Gmail, Google Chrome, and the Google Assistant. Known for its open, collaborative work culture, Google continues to lead the way in artificial intelligence, data science, and digital transformation.

Fees

Create a free account to view complete fee information

Create Free Account
Already have an account? Sign in
Application Fee
0 USD
Tuition Fee
49

Entry Requirements

Create a free account to view entry requirements and apply to this program

Create Free Account
Already have an account? Sign in

All students from all countries are eligible to apply to this program.

Admissions Process

Create a free account to view the full admissions process

Create Free Account
Already have an account? Sign in
  1. 1
    Step 1 Choose programs
  2. 2
    Step 2 Apply online
  3. 3
    Step 3 Enroll
Preparing documents

You can start your application now and send the application documents during your application. Some documents you can send later if you don’t have them right away. See document and eligibility requirements

Required documents

• Curriculum Vitae

• English Language Certificate

• Personal Statement

• Your Highest Academic Transcript (in English)

• Your Photograph

• Your Graduation Certificate (in English)

• Your Passport Copy

Application process

• Applying Online is simple in just a few steps. Learn more about the application process

• The first steps are to choose the programs, pay the application fee and upload the application documents.

• Once submitted to Global Admissions, we will review your application within 2-3 days and proceed to the university or ask you for further clarification

• After it has been processed to the university you will receive your unique application ID from each university.

• The university may contact you directly for further questions.

• We will then follow up each week with the university for updates. As soon as there is any update we will let you know. If you have made other plans, decide to withdraw / change address at any time please let us know.

• After you have been accepted you will receive your admissions letter electronically and asked to pay the non-refundable deposit to the university.

• Once you have paid the deposit the university will issue you the admissions letter and visa form to your home country.

Google Reviews

Be the first to review this school Write review Write review
Edit Program

Similar Programs

Show More Similar Programs →

Related Blog Posts

Show More Blog Posts →
Register Now