course 8 – PUT IT TO WORK: PREPARE FOR CYBERSECURITY JOBS

Module 4: Engage with The Cybersecurity Community 

GOOGLE ADVANCED DATA ANALYTICS PROFESSIONAL CERTIFICATE

Complete Coursera Study Guide

INTRODUCTION – Engage with The Cybersecurity Community

In this comprehensive overview, participants will delve into the final stages of the cybersecurity curriculum, focusing on strategies to remain at the forefront of evolving industry trends. The module guides learners on the importance of continuous learning and staying informed about the latest developments in cybersecurity. It explores avenues for active engagement within the security community, emphasizing the significance of networking, knowledge-sharing, and collaboration with fellow professionals. By providing insights into proactive approaches for ongoing education and community involvement, this module equips participants with the tools to thrive in the ever-changing landscape of cybersecurity. The practical guidance offered ensures that learners not only grasp theoretical concepts but also cultivate a mindset of adaptability and perpetual learning, crucial for success in the dynamic field of cybersecurity.

Learning Objectives

  • Identify reliable sources within the security community.
  • Use reliable sources to remain current on the latest security threats, risks, vulnerabilities, and tools.
  • Determine opportunities to become engaged with the security community.
  • Determine ways to establish and advance a career in security, by engaging with the security community.

TEST YOUR KNOWLEDGE: BUILD YOUR CYBERSECURITY NETWORK

1. Which of the following methods can be used to build your cybersecurity network? Select three answers.

  • Join cybersecurity associations. (CORRECT)
  • Attend cybersecurity conferences. (CORRECT)
  • Research the latest threats and vulnerabilities.
  • Connect with security professionals using social media. (CORRECT)

Connecting with security professionals using social media, attending cybersecurity conferences, and joining cybersecurity associations are methods that can be used to build your cybersecurity network.

2. Fill in the blank: A security professional can sign up for _____ to keep up with key trends and topics in the industry.

  • Linux training courses
  • engineering mailing lists
  • healthcare magazines
  • security mailing lists (CORRECT)

A security professional can sign up for security mailing lists to keep up with key trends and topics in the industry.

3. Which of the following strategies can an aspiring security analyst use to connect with security professionals? Select two answers.

  • Leverage professional social media sites such as LinkedIn®. (CORRECT)
  • Subscribe to security mailing lists.
  • Join security associations. (CORRECT)
  • Create a newsletter.

Aspiring security analysts can connect with other security professionals by leveraging professional social media sites such as LinkedIn® and joining security associations.

4. How can engaging with the security community help newcomers establish a security career? Select two answers.

  • By focusing on improving technical skills
  • By connecting with other security professionals (CORRECT)
  • By staying informed about the latest security news (CORRECT)
  • By engaging in unethical security activities

Engaging with the security community helps newcomers establish a security career by staying informed about the latest security news and connecting with other security professionals.

WEEKLY CHALLENGE 4

1. Fill in the blank: The OWASP is a standard awareness document that lists the top _____most critical security risks to web applications.

  • 50
  • 20
  • 10 (CORRECT)
  • 5

2. Fill in the blank:  ____ is a security website that covers security news and investigations into cyber attacks.

  • Security from Kreb’s Point of View
  • Krebs on Security (CORRECT)
  • Security Investigation by Krebs
  • The Washington Post Security Guide

3. Continuing your security education demonstrates your willingness to remain current on what’s happening in the security industry. Which of the following sites provides news, analysis, and research on various security topics?

  • CSO Online (CORRECT)
  • Krebs Knows Security
  • Krebs, the Security Research Expert
  • Cybershield Chronicles

4. Fill in the blank: Although many security websites and blogs provide different relevant security tips, _____ specifically provides information on analytics and application security, mobile and cloud security, and the Internet of Things (IoT).

  • Dark Reading (CORRECT)
  • Krebs on Security
  • CSO Online
  • Kreb’s Cloud Security Blog

5. Which of the following is a great way to connect with other security professionals in the industry?

  • Staying away from social media
  • Asking friends and family members who are not in the security industry
  • Utilizing your technical security terms as much as possible
  • Finding them on social media (CORRECT)

6. Fill in the blank: _____ is a great way to connect with security professionals on social media.

  • Responding to unfamiliar messages
  • Reading and commenting on the social media posts of leaders in the security industry (CORRECT)
  • Reading CISO posts on social media
  • Attempting to hack a security team member and resolving that hack in a timely fashion

7. Which of the following is a good first step to finding a CISO to follow on social media?

  • Send multiple messages to a company on their social media page and ask how to contact their CISO directly
  • Conduct an internet search for the name of the CISO of an organization (CORRECT)
  • Ask friends in the e-commerce industry about which CISOs to follow
  • Conduct a background check on CISOs in your area

8. On social networks like LinkedIn®, you can find security professionals by searching for “cybersecurity analysts” or a similar search term. After this search, what is the best way to filter through those search results?

  • Filter for people who talk about # (hashtag) product engineering
  • Filter for people who talk about # (hashtag) cybersecurity (CORRECT)
  • Filter for people who talk about # (hashtag) social media
  • Filter for people who talk about # (hashtag) Python

9. Fill in the blank: _____ is a great way to connect with security professionals without using social media.

  • Cold calling security teams from different companies
  • Contacting a CISO directly via email
  • Joining different security associations (CORRECT)
  • Doing an internet search for entry-level security analysts in your area

10. What is the best search term to use to find a security organization to join?

  • “Top CISOs in my area”
  • “Industry associations”
  • “Incident response teams”
  • “Cybersecurity industry associations” (CORRECT)

11. You are being interviewed for a cybersecurity analyst role with a mid-level organization. During the interview, the hiring manager asks you what resources you believe are most valuable for staying up-to-date on the most critical security risks to web applications. Which of the following resources would you suggest?

  • Krebs Explains Security
  • Risk Management for Security Geeks
  • OWASP (CORRECT)
  • CSO Online

12. Which security website covers security news and investigations into cyber attacks?

  • Security Investigation by Krebs
  • Krebs on Security (CORRECT)
  • Online CISO
  • Kreb’s Security Perspective

13. Which site do many CISOs in the security industry review for security tips and ideas?

  • The CSO Security Expert Digest
  • The Security CISO Online
  • CSO Online (CORRECT)
  • CSO Tips for Beginners

14. You’ve recently completed the Google Cybersecurity Certificate and decide it’s time to connect with other security professionals. Which of the following is a great way to connect with security professionals?

  • Searching for them on social media (CORRECT)
  • Staying away from social media
  • Calling different organizations and asking to speak with their security teams
  • Asking friends and family members who are not in the security industry to connect you with people they know

15. Which of the following is a good way to use social media to connect with security professionals? Select two answers.

  • Follow leaders in the security industry on social media (CORRECT)
  • Read and comment on social media posts of leaders in the security industry (CORRECT)
  • Send messages to a security supervisor until they agree to be your mentor
  • Respond to messages of people on social media that you’re unfamiliar with, as long as their profile says they’re in the security industry

16. Fill in the blank: The first step to finding a CISO to follow on social media is to conduct a(n) _____ for the name of the CISO of an organization.

  • cross-reference check
  • background check
  • internet search (CORRECT)
  • external security audit

17. What is a good way to find other security analysts in the industry to follow on social media?

  • Search for security engineers on LinkedIn®
  • Put out a social media post that asks all security analysts to follow you
  • Cold call various security teams until someone agrees to connect with you on social media
  • Search for cybersecurity analysts on LinkedIn® (CORRECT)

18. What is a great way to connect with security professionals or find mentors in the security industry without using social media?

  • Search for CISOs on LinkedIn®
  • Attend a social media training seminar
  • Join different security associations (CORRECT)
  • Do an internet search for entry-level security analysts in your area

19. Fill in the blank: Selecting a security association that _____ will help ensure you find the one that best fits your needs.

  • is within a five-mile radius of your home
  • has excellent online reviews
  • aligns with your professional goals (CORRECT)
  • is dedicated to senior-level analysts

20. Fill in the blank: A great way to find other security analysts to connect with on LinkedIn® is to set your filter to locate _____ that focus on security-related topics that interest you.

  • human resources professionals
  • courses
  • events (CORRECT)
  • products

21. Fill in the blank: _____ provides news, analysis, and research on various security and risk management topics.

  • Who Knows Security?
  • Krebs Explains Security
  • Risk Management for Security Geeks
  • CSO Online (CORRECT)

22. On social networks like LinkedIn®, you can find security professionals by searching for “cybersecurity analysts” or a similar search term. After this search, what is the best way to filter through those search results?

  • Filter for people who talk about # (hashtag) Python
  • Filter for people who talk about # (hashtag) social media
  • Filter for people who talk about # (hashtag) product engineering
  • Filter for people who talk about # (hashtag) cybersecurity (CORRECT)

23. Fill in the blank: When determining a security association to join, it’s important to _____.

  • select one that is geared towards advanced security professionals
  • join one that is closest to where you live, so you’re able to attend in person
  • select one that aligns with your professional goals (CORRECT)
  • ask the CISO of the most recent organization you applied to for suggestions

24. Fill in the blank: The _____ is a standard awareness document that lists the top 10 most critical security risks to web applications.

  • Wall Street Journal
  • OWASP (CORRECT)
  • Programming for Security Protection
  • Red Teaming Blog

25. Fill in the blank: _____ for the name of the CISO of an organization is a good first step to finding a CISO to follow on social media.

  • Conducting an internet search (CORRECT)
  • Checking an organization’s blog
  • Asking friends or family members
  • Asking social media friends

26. Fill in the blank: _____ is a great way to connect to other security professionals in the industry.

  • Networking on social media (CORRECT)
  • Asking friends and family members who are not in the security industry for introductions
  • Knocking door-to-door
  • Staying away from social media

CONCLUSION – Engage with The Cybersecurity Community

In conclusion, the journey through this comprehensive cybersecurity program has equipped participants with a robust foundation in various aspects of cybersecurity. From understanding the fundamentals of networks and operating systems to mastering incident response and engaging with the cybersecurity community, learners have gained a diverse skill set essential for a successful career in cybersecurity.

The emphasis on hands-on experience, practical tools, and real-world scenarios ensures that participants are not only knowledgeable in theory but also capable of applying their skills in practical, industry-relevant situations. As participants conclude this program, they are well-prepared to navigate the complex and ever-evolving landscape of cybersecurity, armed with the expertise needed to address emerging threats and contribute effectively to the security of digital ecosystems.