COURSE 1: FOUNDATIONS OF CYBERSECURITY

Module 1: Welcome to The Exciting World of Cybersecurity

GOOGLE CYBERSECURITY PROFESSIONAL CERTIFICATE

Coursera Study Guide

INTRODUCTION – Welcome to The Exciting World of Cybersecurity

Embark on an exciting journey into the dynamic realm of cybersecurity! This introductory phase will immerse you in the multifaceted landscape of cybersecurity, primary responsibilities of an entry-level security analyst, offering a comprehensive exploration of the field. Gain valuable insights into the diverse job responsibilities shoulder by cybersecurity professionals, providing a foundational understanding of the pivotal roles they play in safeguarding digital landscapes. Delve into the intricacies of cybersecurity, discovering the crucial skills and knowledge that form the bedrock of this ever-evolving field. This initial step sets the stage for your immersive exploration, offering a glimpse into the exciting challenges and opportunities that await you in the cybersecurity domain.

Learning Objectives

  • Explain how this certificate program will help prepare learners for a career in security
  • Define the field of security
  • Explore the job responsibilities of an entry-level security analyst
  • Recognize core skills and knowledge needed to become a security analyst
  • Describe how security analysts protect networks and information

PRACTICE QUIZ: TEST YOUR KNOWLEDGE: INTRODUCTION TO CYBERSECURITY

1. Fill in the blank: Cybersecurity is the practice of ensuring ______ by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.

  • customer trust, increased revenue, and advancement
  • confidentiality, integrity, and availability of information (CORRECT)
  • continuity, infrastructure, and attainment of business goals
  • compliance, instructions, and accuracy

Cybersecurity is the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.

2. What are the primary responsibilities of an entry-level security analyst? Select three answers.

  • Create compliance laws
  • Protect information (CORRECT)
  • Search for weaknesses (CORRECT)
  • Monitor systems (CORRECT)

The primary responsibilities of an entry-level security analyst are as follows: Monitor systems, protect information, and search for weaknesses.

3. Fill in the blank: Performing _______ enables security professionals to review an organization’s security records, activities, and related documents.

  • security audits (CORRECT)
  • software developments
  • ethical hacking penetration tests

Correct: Performing security audits enables security professionals to review an organization’s security records, activities, and related documents.

4. In what ways do security teams bring value to an organization? Select two answers.

  • Reducing business productivity
  • Increasing operational expenses
  • Protecting against external and internal threats (CORRECT)
  • Achieving regulatory compliance (CORRECT)

Achieving regulatory compliance and protecting against external and internal threats are ways that security teams bring value to an organization.

5. Fill in the blank: Cybersecurity is the practice of ensuring ___. Select three answers.

  • vulnerability
  • availability of information (CORRECT)
  • integrity (CORRECT)
  • confidentiality (CORRECT)

Confidentiality, integrity, and availability of information are ensured through the effective practice of security. This involves protecting networks, devices, people, and data from unauthorized access or criminal exploitation.

TEST YOUR KNOWLEDGE: CORE SKILLS FOR CYBERSECURITY PROFESSIONALS

1. Which of the following proficiencies are transferable skills, likely to be applicable in almost any field? Select three answers.

  • Programming
  • Analysis (CORRECT)
  • Written and verbal communication (CORRECT)
  • Problem-solving (CORRECT)

Analysis, problem-solving, and written and verbal communication skills are transferable entry-level security analyst skills.

2. Which of the following proficiencies are technical skills that are needed to become an entry-level security analyst? Select two answers.

  • Regulation writing
  • Collaboration
  • Programming (CORRECT)
  • Data analysis (CORRECT)

Programming and data analysis are technical skills, which are needed to become an entry-level security analyst.

3. Fill in the blank: ______ identify, analyze, and preserve criminal evidence within networks, computers, and electronic devices.

  • Ethical hackers
  • Digital forensic investigators (CORRECT)
  • Security operations center analysts
  • Business intelligence professionals

Digital forensic investigators identify, analyze, and preserve criminal evidence within networks, computers, and electronic devices.

4. What are examples of sensitive personally identifiable information (SPII) that cybersecurity professionals need to protect? Select two answers.

  • Last names
  • Email addresses
  • Bank account numbers (CORRECT)
  • Medical records (CORRECT)

Medical records and bank account numbers are examples of sensitive personally identifiable information. SPII is a specific type of PII that requires stricter protections because it can be significantly more damaging to individuals if it is stolen.

5. What are some core skills entry-level security analysts need to develop? Select three answers.

  • Engineering
  • Problem-solving (CORRECT)
  • Programming (CORRECT)
  • Communication (CORRECT)

Some core skills entry-level analysts need to develop are programming, communication, and problem-solving skills.

MODULE 1 CHALLENGE

1. Fill in the blank: The purpose of ______ is to protect networks, devices, people, and data from unauthorized access or criminal exploitation.

  • planning
  • cybersecurity (CORRECT)
  • business continuity
  • change-management

Correct!

2. Which of the following tasks are typically responsibilities of entry-level security analysts? Select all that apply.

  • Examining in-house security issues (CORRECT)
  • Installing prevention software (CORRECT)
  • Creating organizational policies
  • Protecting computer and network systems (CORRECT)

Correct!

3. Someone outside of an organization attempts to gain access to its private information. What type of threat does this scenario describe?

  • External (CORRECT)
  • Accidental
  • Internal
  • Ethical

Correct!

4. Fill in the blank: Identity theft is the act of stealing _______ to commit fraud while impersonating a victim.

  • hardware
  • personal information (CORRECT)
  • business records
  • trade secrets

Correct!

5. What are some key benefits associated with an organization meeting regulatory compliance? Select two answers.

  • Recruiting employees
  • Upholding ethical obligations (CORRECT)
  • Identifying trends
  • Avoiding fines (CORRECT)

Correct!

6. Which of the following proficiencies are examples of technical skills? Select two answers.

  • Applying computer forensics (CORRECT)
  • Communicating with employees
  • Automating tasks with programming (CORRECT)
  • Prioritizing collaboration

Correct!

7. Fill in the blank: Security information and event _____   (SIEM) tools enable security professionals to identify and analyze threats, risks, and vulnerabilities.

  • mitigation
  • management (CORRECT)
  • monitoring
  • maturity

Correct!

8. A security professional receives an alert about an unknown user accessing a system within their organization. They attempt to identify, analyze, and preserve the associated criminal evidence. What security task does this scenario describe?

  • Programming with code
  • Resolving error messages
  • Computer forensics (CORRECT)
  • Software upgrades

Correct!

9. Which of the following statements accurately describe personally identifiable information (PII) and sensitive personally identifiable information (SPII)? Select all that apply.

  • Pll is any information used to infer an individual’s identity. (CORRECT)
  • An example of SPII is someone’s biometric data. (CORRECT)
  • Only SPII is vulnerable to identity theft.
  • An example of PII is someone’s phone number. (CORRECT)

Correct!

10. Fill in the blank: Cybersecurity aims to protect networks, devices, people, and data from ______ or unauthorized access.

  • changing business priorities
  • criminal exploitation (CORRECT)
  • poor financial management
  • market shifts

Correct!

11. A security professional collaborates with information technology teams to deploy an application that helps identify risks and vulnerabilities. What does this scenario describe?

  • Conducting a security audit
  • Upgrading network capacity
  • Installing detection software (CORRECT)
  • Ethical hacking

Correct!

12. An employee receives an email that they believe to be legitimate. They click on a compromised link within the email. What type of internal threat does this scenario describe?

  • Accidental (CORRECT)
  • Abusive
  • Operational
  • Intentional

Correct!

13. What is identity theft?

  • Failing to maintain and secure user, customer, and vendor data
  • A data breach that affects an entire organization
  • Trying to gain access to an organization’s private networks
  • Stealing personal information to commit fraud while impersonating a victim (CORRECT)

Correct!

14. Fill in the blank: An organization that is in regulatory compliance is likely to ____ fines.

  • rectify
  • encounter
  • avoid (CORRECT)
  • incur

Correct!

15. Fill in the blank: Security information and _____ management (SIEM) tools enable security professionals to identify and analyze threats, risks, and vulnerabilities.

  • event (CORRECT)
  • enterprise
  • employer
  • emergency

Correct!

16. A security professional investigates an alert about an unknown user accessing a system within their organization. What is the purpose of computer forensics in this situation?

  • Identify, analyze, and preserve criminal evidence (CORRECT)
  • Make upgrades to network security
  • Implement tools that help detect an incident
  • Establish new security frameworks, controls, and regulations for the business

Correct!

17. An individual has their personal information stolen. They discover that someone is using that information to impersonate them and commit fraud. What does this scenario describe?

  • Secured customer data
  • Data breach
  • Identity theft (CORRECT)
  • Network infiltration

Correct!

18. What do security professionals typically do with SIEM tools?

  • Identify threat actors and their locations
  • Educate others about potential security threats, risks, and vulnerabilities
  • Identify and analyze security threats, risks, and vulnerabilities (CORRECT)
  • Locate and preserve criminal evidence

Correct!

19. Fill in the blank: Cybersecurity aims to protect networks, devices, people, and data from ______ or criminal exploitation.

  • market shifts
  • changing business priorities
  • poor financial management
  • unauthorized access (CORRECT)

Correct!

20. Which of the following entities may be an internal threat to an organization? Select three answers.

  • Customers
  • Vendors (CORRECT)
  • Trusted partners (CORRECT)
  • Employees (CORRECT)

Correct!

21. An individual is in their first job as an entry-level security professional. They apply the problem-solving proficiencies that they learned in past roles to their current security career. What does this scenario describe?

  • Taking on-the-job training
  • Understanding business standards
  • Using transferable skills (CORRECT)
  • Having expertise with a specific procedure

Correct!