DION: Hello, and
welcome to the course. I am Dion, a program
manager at Google. I've worked in security
for the past five years in areas ranging
from risk management to insider threat detection. I'll be your first
instructor in this course. As a security
analyst, you will help protect the assets of
the organization you work for, including
tangible or physical assets, such as software
and network devices, as well as intangible
assets like PII, copyrights, and intellectual property. Imagine if this kind of
sensitive information were to be exposed
by a threat actor. It would be devastating
to the reputation and financial stability of the
organization and the people the organization serves. In previous courses,
we discussed a variety of topics that are
relevant to the security profession, including core
security concepts, frameworks and controls, threats, risks,
and vulnerabilities, networks, incident detection and response,
and programming basics. Now it's time to put all of
these core security concepts to practical use. In this course,
we'll further explore how to protect assets and
communicate incidents. Then we'll discuss when
and how to escalate incidents to protect an
organization's assets and data. We'll also cover how to
communicate effectively to influence stakeholders'
decisions related to security. After that, Emily,
your instructor for the second part
of this course, will introduce some
reliable resources that will help you engage
with the security community after you complete the
certificate program. And finally, we'll cover how
to find, prepare for, and apply for security jobs. This will include
discussions about how to create a compelling
resume and tips to help you throughout the
interview process. When I started my first
security-based role, I was excited to be hired at
Google to protect information and devices. I was also happy to be
a part of a broader team that I could learn from and
reach out to for support. My team helped me
grow my expertise, and I'm proud of my
contribution to our projects. By the end of this
course, you'll have had multiple opportunities
to refine your understanding of key security concepts,
create a resume, build confidence in
your interview skills, and even participate in
an Artificial Intelligence or AI-generated interview. The security profession
is such an amazing field, and I'm looking forward
to you joining it. I have one question for you. Are you ready to get started? Welcome to the first
section of the course. In the next several
videos, we'll discuss what it means to
have a security mindset and how you'll use that mindset
to protect an organization's assets and data. Then we'll explore the
process of incident escalation in the event of a breach. Finally, we'll share
information to better help you understand the
sensitive nature of the data that you'll work to protect. Coming up, we'll focus on how
to develop a security mindset, then use that mindset
to protect organizations and the people they serve. Let's take a little time
to discuss a concept that will help you throughout
your security career, having a security mindset. In previous courses,
we discussed various threats, risks,
and vulnerabilities and how they can impact
organizational operations and the people served
by those organizations. These concepts are
key considerations when thinking about
having a security mindset. You'll have to
recognize not only what you're defending
but what or who you're defending against. For example, it's important to
recognize the types of assets that are essential to
maintaining an organization's business functions along
with types of threats, risks, and vulnerabilities that can
negatively impact those assets. And that's what having a
security mindset is all about. A security mindset
is the ability to evaluate risk and constantly
seek out and identify the potential or actual breach
of a system, application, or data. Earlier in the program, we
discussed threats, risks, and vulnerabilities that are
posed by social engineering attacks, such as phishing. These attacks are designed to
compromise an organization's assets to help the threat
actor or actors gain access to sensitive information. Using our security
mindset can help prevent these types of attacks. It's important that we're
constantly staying up to date with the kinds of attacks
that are happening. To do this, it's good to
develop a habit of seeking out information regarding
the latest security trends or vulnerabilities. As you do this, new ideas
for protecting company data may come to mind. Security is an everyday
objective for every security team in the industry. So having a security
mindset helps analysts defend against
the constant pressure from attackers. That mindset can make you
think every click of the mouse has the potential to lead
to a security breach. That level of scrutiny as
a security professional helps you prepare for
the worst-case scenario, even if it doesn't happen. Entry-level analysts
can help protect low level assets, such
as an organization's guest Wi-Fi network, and
high importance assets, such as intellectual
property, trade secrets, PII, and even financial information. Your security mindset
allows you to protect all levels of assets. However, if an
incident does occur, that doesn't mean you respond to
all incidents in the same way. So we'll discuss
incident prioritization a little later in the course. Having a strong security
mindset can help set you apart from
other candidates as you prepare to enter
the security profession. It may even be a good idea
to reference that foundation in future job interviews. We'll discuss
interview preparation in detail later in the course. Coming up, we'll focus
on incident detection in greater detail. Welcome back. In earlier courses, we
discussed the impact that security incidents can
have on the critical data and assets of an organization. If data and assets
are compromised, it can lead to financial
pains for an organization. It can even lead to
regulatory fines and the loss of credibility with
customers or other businesses in the same industry. This is why your role in
protecting company data and assets is so valuable. Collaboration is an exciting
part about working in security. There are so many individuals
across an organization that are interested in
various functions of security. No security professional
can do this alone. Some team members are
focused on protecting sensitive financial data. Others work on protecting
usernames and passwords. Some are more focused on
protecting third-party vendor security. And others may be concerned
with protecting employees' PII. These stakeholders and
others have an interest in the role the
security team plays for keeping the
organization and the people it serves safe from
malicious attacks. It's important to recognize that
the assets and data you protect affect multiple levels
of your organization. One of the most important
concerns for an organization is the protection
of customer data. Customers trust that an
organization they engage with will protect their
data at all times. This means credit card numbers,
Social Security numbers, emails, usernames,
passwords, and so much more. It's important to
keep this in mind when taking on a security role. Understanding the importance
of the data you're protecting is a big part of having a
strong security mindset. As a security professional,
it's important to handle sensitive data with
care while being mindful of the little details
to ensure that private data is protected from breaches. When a security event
results in a data breach, it is categorized as
a security incident. However, if the
event is resolved without resulting
in a breach, it's not considered an incident. It's better to be
safe when it comes to taking a job in the
security profession. That means paying
attention to details and raising your issues
to your supervisor. For example, a
seemingly small issue like an employee installing
an app on their work device without getting permission
from the help desk should be escalated
to a supervisor. This is because some
apps have vulnerabilities that can pose a threat to the
security of the organization. An example of a bigger
issue is noticing that a log may have malicious
code executed in it. Malicious code can lead
to operational downtime, severe financial
consequences, or the loss of critical high-level assets. The point is that there
are no issues that are too small or too big. If you're not sure of
the potential impact of an incident, it's always
best to be cautious and report events to the
appropriate team members. Each day on the job as
a security professional comes with a level
of responsibility to help protect the organization
and the people it serves. The decisions you make not
only affect the company but also its customers
and countless team members across the organization. Remember, what you do matters. You've had an
opportunity to learn more about the important role an
entry level analyst plays in protecting the data and
assets of an organization. Let's quickly review
what we covered. We started off by
discussing the importance of having a security
mindset, including how it supports incident detection. Then we examined the
relationship between incidents and events and further explored
the incident escalation process. We ended our discussion by
exploring the sensitive nature of the data that
you're protecting and the amount of
people counting on you to play your part
in protecting that data. Understanding how valuable you
are as a member of the security team can help you put the
work you do into perspective. Every role in security matters. Each individual contributes to
making a company's operations flow smoothly. I hope you enjoyed our
discussion as much as I did. Are you ready to continue
your journey into the security world? Coming up, we'll discuss
the importance of escalating security incidents. I'm excited that you
could join me today. Previously, you learned about
the importance of various asset types. You also learned
about the relationship between incidents and events. Now we'll focus on escalating
those incidents and events to the right people. Protecting the data and
assets of an organization is the primary goal
of a security team. The decisions you
make everyday are important for
helping the security team achieve that goal. Recognizing when and how to
escalate security incidents is crucial. It helps ensure simple issues
don't become larger problems for an organization. Escalation is a term you should
familiarize yourself with. It's likely to resurface often
as you continue your journey into the security profession. In the following videos, we'll
discuss incident escalation from an entry-level
analyst perspective. Then we'll explore various
incident classification types and the impact
security incidents can have on business operations. Finally, we'll share
some general guidelines for escalating incidents. Coming up, we'll start by
focusing on incident escalation and how it can be used to
prevent a seemingly small issue from becoming a bigger problem. Let's get started. Security analysts are hired
to protect company assets and data, including
knowing when and how to escalate security incidents. In this video, we'll define
security incident escalation and discuss your role
in making decisions that help protect your
organization's data and assets. So what is incident escalation? And why is it so important
for security professionals? Incident escalation is
a process of identifying a potential security
incident, triaging it, and, if appropriate, handing it
off to a more experienced team member. It's important to also recognize
that not every incident needs to be escalated. In this video, we'll cover
what types of incidents should be escalated. As an entry-level
analyst, it's unlikely that you'll be responding
to security incidents independently. However, it's important that
how to evaluate and escalate incidents to the
right individual or team when necessary. Let's discuss the essential
skills needed to properly escalate security incidents. There are two
essential skills that will help you identify
security incidents that need to be escalated,
attention to detail and an ability to follow an
organization's escalation guidelines or processes. Attention to detail
will help you quickly identify when something
doesn't seem right within the organization's
network or systems. Following your company's
escalation guidelines or processes will help you
know how to properly escalate the issue you've identified. Larger organization security
teams have many levels, and each level or
member of that team plays a major role in protecting
the company's assets and data. However, smaller and
medium-size companies have only one or two
people responsible for the organization's security. For now, we'll focus on the
roles in bigger organizations. From the Chief Information
Security Officer, also known as the CISO,
to the engineering team, public relations team,
and even the legal team, every member of the
security team matters. Each team member's role
depends on the nature and scope of the incident. These roles are highlighted
within a company's escalation process. Even the smallest
security incident can become a much larger
issue if not addressed. And that's where you come in. Imagine you're working at
your desk and notice what appears to be a minor
incident, but you decide to take a break before
addressing or escalating it. This decision could
have major consequences. If a small issue goes
unescalated for too long, it has the potential to
become a larger problem that costs the company money,
exposes sensitive customer data, or damages the
company's reputation. However, with a high level
of attention to detail and an ability to follow your
organization's escalation guidelines and
processes, it may be possible to avoid exposing
the business and its customers to harmful incidents. As an entry-level analyst,
you play an important role. You help the security
team identify issues within the network
and systems and help make sure the right
person on the team is alerted when incidents occur. Think about an assembly line. Would the final step in the
line be negatively impacted if the first step were done
incorrectly or not at all? Of course it would. Every decision you make helps
the entire security team protect an organization's
assets and data. Knowing when and how to
escalate security incidents is one of many
important decisions you'll need to make
on a daily basis. Later in this course, we'll
discuss the various levels of security incidents. Knowing those levels
will help you determine the level of urgency needed
to escalate different incident types. Previously, we defined what it
means to escalate an incident. We also discussed the skills
needed to properly escalate incidents when the time comes. In this video, we're going
to cover a few incident classification types
to be aware of-- malware infection, unauthorized
access, and improper usage. A malware infection
is the incident type that occurs when malicious
software designed to disrupt a system
infiltrates an organization's computers or network. As discussed in a
previous course, malware infections can
come in many forms. Some are simple, and others
are a bit more complex. One example is a
phishing attempt. These are relatively
simple malware infections. Another example is
a ransomware attack, which is considered
much more complex. Malware infections can
cause a system's network to run at unusually low speeds. Attackers can even
prevent an organization from viewing critical data
unless the organization pays the attacker ransom
to unlock the data. This incident type is especially
impactful to an organization because of the amount
of sensitive data stored on an organization's
network and computers. Escalating malware infections
is an important aspect of protecting the organization
that you work for. But wait. There's more. The second incident type we'll
discuss is unauthorized access. This is an incident type that
occurs when an individual gains digital or physical access
to a system or application without permission. As you may recall,
earlier in the program, we discussed brute
force attacks, which use trial and error to
compromise passwords, login credentials, and
encryption keys. These attacks are often
used to help attackers gain unauthorized access
to organization systems or applications. All unauthorized
access incidents are important to escalate. However, the urgency
of that escalation depends on how critical that
system is to the organization's business operations. We'll explore this idea in more
detail later in this course. The third incident we'll
discuss is improper usage. This is an incident
type that occurs when an employee
of an organization violates the organization's
acceptable use policies. This one can be a
bit complicated. There are instances
when improper usage is unintentional. For example, an
employee may attempt to access software
licenses for personal use or even use a company's
system to access a friend's or co-worker's data. Maybe the employee wasn't
aware of the policy they were violating. Or maybe the policy
wasn't properly defined and communicated to employees. But there are other times
where improper usage is an intentional act. So how do you know if an
improper usage incident is accidental or intentional? That can be a difficult
decision to make. That's why improper usage
incidents should always be escalated to a supervisor. As a member of an
organization's security team, it's likely that you'll
encounter a variety of incident types while on the job. So it's important to
know what they are and how to escalate them. So far, we've discussed
different incident types and the importance of
escalating those incidents to the right person. But what happens if an incident
goes unescalated for too long? In this video, we'll discuss
the potential impact that even the smallest incident can
have on an organization if it goes unnoticed. Are you ready? Great. Now let's take a journey into
the life of an organization's security team. It's been a quiet day
for the security team. Suddenly, you notice
there's been unusual log activity in an app
that was recently banned from the organization. You make a note to
mention this activity during the next meeting
with your supervisor. But you forget and
never mention it. Following this same
scenario, let's fast forward to a week later. You and your supervisor
are meeting again. But now the supervisor
indicates that a data breach has occurred. This breach has impacted
one of the manufacturing sites for the organization. Now all operations at
the manufacturing site have been put on hold. This causes the company to
lose money and precious time. Days later, the security team
discovers that the data breach began with suspicious activity
in the app that was recently banned from the organization. What we've learned
from this scenario is that a simple incident can
lead to a much larger issue if not escalated properly. Incident criticality is
also important to note here. Initially, an incident
can be escalated with a medium level
of criticality if the analyst doesn't
have enough information to determine the
amount of damage done to the organization. Once an experienced incident
handler reviews the incident, the incident may be
increased or decreased to a high or low
criticality level. Every security
incident you encounter is important to an
organization, but some incidents are certainly more
urgent than others. So what's the best way
to determine the urgency of a security incident? It really depends on
the asset or assets that the incident affects. For example, if an employee
forgets their login password for their work computer, a
low-level security incident may be prompted if they have
repeated failed login attempts. This incident needs
to be addressed, but the impact of this
incident is likely minimal. In other instances, assets are
critical to an organization's business operations, such as a
manufacturing plant or database that stores PII. These types of assets
need to be protected with a high level of urgency. The impact of an attacker
gaining unauthorized access to a manufacturing
application or PII is far greater than
a forgotten password because the attacker
could interfere with the manufacturing processes
or expose private customer data. I hope this video has
helped you understand the importance of knowing the
relationship between assets and security incidents. Later in this course, we'll
share some new concepts related to escalation timing and
why your role in that process matters. We've shared quite a bit about
the importance of your role when it comes to
escalating incidents. We've even discussed
a few incident types that you may encounter. But what are the
actual steps you need to take to properly
escalate that incident? The answer to that
question actually depends on the organization
you're working for. There is no set standard or
process for incident escalation that all organizations use. Every security team
has their own processes and procedures when it
comes to handling incidents. In this video, we're going
to discuss general guidelines for incident escalation and
how to apply them on the job. Let's get started. Each organization
has its own process for handling security incidents. That process is known as
an escalation policy, which is a set of actions that outline
who should be notified when an incident alert occurs
and how that incident should be handled. Ideally, the escalation process
would go smoothly every time. But in a workplace,
challenges to that process can happen unexpectedly. For example, what if
your immediate supervisor is out of office? If an incident occurs
that day, it still needs to be
escalated to someone. This is one example
of why understanding your organization's escalation
policy is important. You don't need to memorize
your organization's escalation policy, but it is wise
to save or bookmark it on your work device. This way, you'll always have
access to it when you need it. Following an organization's
escalation policy is essential because
the actions you take help protect the
organization and the people it serves from malicious actors. The escalation policy
for an organization can be an extensive document. So it's up to you
to pay attention to the small details
within the escalation policy of your organization. Attention to detail
can make the difference between escalating an incident
to the right or wrong person. It can also help
you prioritize which incidents need to be escalated
with more or less urgency. Every organization handles
incident escalation differently. But analysts need to
ensure that incidents are handled correctly. Great work expanding
your security mindset. Now you've had an opportunity to
learn about the essential role you'll be playing by
escalating incidents. Let's review what we've covered
in this section of the course. We started off by defining
incident escalation and discussing
useful traits needed to properly escalate incidents. We also explored a few
incident classification types and their potential
impacts on organization. From there, we discussed
how small security incidents can become bigger problems
if not properly addressed. Finally, we covered
some general guidelines for the actual process
of incident escalation. This process varies depending on
the organization you work for. But one thing should
always remain the same, your attention to detail. Understanding how each incident
affects the data and assets of an organization
is really important because the decisions you make
can affect the entire security team and organization. Are you ready to continue
your security journey? Coming up, we'll
discuss stakeholders and how to communicate
effectively with them. We've covered so much
in previous courses, from the foundations of security
to a basic understanding of networks, and programming
languages like SQL and Python. These concepts
are core knowledge when preparing for a role
in the security profession. But how does this information
help you on a day-to-day basis? And to whom do you
communicate this information? In this course, we'll
start by discussing who stakeholders are. Then we'll identify their
roles in relation to security. Finally, we'll share effective
communication strategies for relaying key
information to stakeholders. But before we can communicate
with stakeholders, we have to understand who they
are and why they are important. So let's get started. Let's discuss the hierarchy
within an organization. It goes from you, the analyst,
to management, all the way up to executives. Hierarchy is a great way
to understand stakeholders. A stakeholder is defined as
an individual or group that has an interest in the
decisions or activities of an organization. This is important for your
role as an entry-level analyst because the decisions
made on a day-to-day basis by stakeholders will
impact how you do your job. Let's focus on
stakeholders who have an interest in the daily
choices analysts make. After all, you may be asked
to communicate your findings to them. So let's learn a little
bit more about who they are and the roles they play
in regards to security. Security threats, risks,
and vulnerabilities can affect an entire
company's operations. From financial implications
to the loss of customer data and trust, the impact
of security incidents are limitless. Each stakeholder
has a responsibility to provide inputs on
the various decisions and activities of
the security team and how to best protect
the organization. There are many stakeholders
that pay close attention to the security of critical
organizational assets and data. We're going to focus on
five of those stakeholders-- risk managers; the Chief
Executive Officer, also known as a CEO; the Chief Financial
Officer, also known as a CFO; the Chief Information
Security Officer, or CISO; and operations managers. Let's discuss each of these
stakeholders in more detail. Risk managers are important
to an organization because they help identify
risks and manage the response to security incidents. They also notify
the legal department regarding regulatory issues
that need to be addressed. Additionally, risk managers
inform the organization's public relations
team in case there is a need to publish public
communications regarding an incident. Next is the Chief Executive
Officer, also known as a CEO. This is the highest ranking
person in an organization. CEOs are responsible for
financial and managerial decisions. They also have an obligation
to report to shareholders and manage the
operations of a company. So naturally, security is
a top priority for the CEO. Now let's discuss
the Chief Financial Officer, known as a CFO. CFOs are senior executives
responsible for managing the financial
operations of a company. They are concerned
about security from a financial standpoint
because of the potential cost of an incident to the business. They are also interested
in the costs associated with tools and strategies
that are necessary to combat security incidents. Another stakeholder with
an interest in security is the Chief Information
Security Officer, or CISO. CISOs are high-level executives
responsible for developing an organization's
security architecture and conducting risk
analysis and system audits. They're also tasked with
creating security and business continuity plans. Last, we have
operations managers. Operations managers oversee
security professionals to help identify and
safeguard an organization from security threats. These individuals
often work directly with analysts as the
first line of defense when it comes to protecting the
company from threats, risks, and vulnerabilities. They are also
generally responsible for the daily maintenance
of security operations. As an entry-level analyst
at a large organization, it's unlikely that you'll
communicate directly with the risk manager,
CEO, CFO, or the CISO. However, the operations
manager will likely ask you to create
communications to share with those individuals. Coming up, we'll focus a
bit more on stakeholders and how to effectively
communicate with them. Welcome back. Previously, we
discussed stakeholders and the important
security roles they play within an organization. Now let's explore the role
you play in communicating with those stakeholders. The information that's
communicated to stakeholders is sensitive. For example, if
you send an email to stakeholders about a
recent security breach, it's important to be mindful
of what you communicate and who you communicate to. Different stakeholders
may need to be informed about different issues. As a result, your
communications with them need to be clear,
concise, and focused. Security is a
detail-driven profession, so it's essential that you
stay mindful of the details when sending your
communications. Stakeholders are
very busy people. Your communication
should be precise, avoid unnecessary
technical terms, and have a clear purpose. You don't want them to have to
guess the reason for your email or why it matters to them. To help with this,
ask your manager or immediate
supervisors questions to find out what the
stakeholders you communicate with need to know. As you may recall,
earlier, we discussed what it means to have
a security mindset. A part of that mindset
means asking questions about the assets and
data you're protecting. For example, you could ask,
what's the most important data to protect on a daily basis? Or what security tool
has been most important or useful to protect
our data and assets? Having a security mindset
also means understanding what matters most
to stakeholders so you know what information
to share with them. Effective communication
involves relaying only the information that is
most relevant to stakeholders. Staying informed
about security issues helps stakeholders do their
jobs more effectively. Your role in communicating
with stakeholders is to help them obtain
that information. This is yet another example
of how essential your role is within a security team. Coming up, we'll
discuss the information that is most important to
communicate with stakeholders. Previously, we discussed
communicating information that is important to stakeholders. It's essential
that communications are specific and
clear so stakeholders understand what's
happening and what actions may need to be taken. In this video, we'll
go into more detail about how to create precise
and clear communications. Creating security communications
to share with stakeholders is similar to telling
a great story. Stories typically have a
beginning, middle, and end. Somewhere in that
story, there is some sort of conflict and
an eventual resolution. This concept is also true
when telling security stories to stakeholders. The security story details
what the security challenge is, how it impacts
the organization, and possible solutions
to the issue. The security story
also includes data related to the challenge, its
impact, and proposed solutions. This data could be in
the form of reports that summarize key findings
or a list of issues that may need immediate attention. Let's use the following
scenario as an example. You've been monitoring
system logs and notice possible malicious code
execution in the logs that could lead to the exposure of
sensitive user information. Now you need to communicate what
is happening to a stakeholder, in this case, your
immediate supervisor. The first step is to
detail the issue-- potential malicious
code execution found while monitoring the logs. The next step is to refer to
the organization's incident response playbook and mention
the suggested guidance from the playbook regarding
malicious code found in system logs. This shows your
supervisor that you've been paying attention to the
procedures already established by the team. The final piece of your story is
to provide a possible solution to the issue. In this scenario, you may not
be the final decision-maker regarding what action is taken. But you've explained to the
stakeholder what has happened and a possible solution
to the problem. You can communicate the story we
just discussed in various ways. Send an email, share a
document, or even communicate through the use of a
visual representation. You can also use
incident management or ticketing systems. Many organizations have incident
management or ticketing systems that follow the steps outlined
in their security playbooks. Some scenarios are
better expressed by using visual elements. Visuals are used to
convey key details in the form of graphs,
charts, videos, or other visual effects. This allows stakeholders to
view a pictorial representation of what is being explained. Visual dashboards can help
you tell a full security story to stakeholders. Later in this course,
you'll have an opportunity to learn how to use
Google Sheets to create a visual security story. That's going to be fun. A security
professional who knows how to tell a compelling
and concise security story can help stakeholders make
decisions about the best ways to respond to an incident. Ideally, you want
to be someone that makes stakeholders' jobs easier,
and communicating effectively will certainly help you do that. Coming up, we'll
continue our discussion about communicating
with stakeholders. The ability to communicate
threats, risks, vulnerabilities, or incidents,
and possible solutions is a valuable skill for
security professionals. In this video, we'll focus
on various communication strategies that can help
you engage with and convey key ideas to stakeholders. Let's start with visuals. The use of visuals to
tell a security story can help you communicate
impactful data and metrics. Charts and graphs are
particularly helpful for this. They can be used to
compare data points or show small parts
of a larger issue. Using relevant and
detailed graphics can help you develop the story
you want to tell stakeholders so they can make
decisions that will help protect the organization. While visuals are
a compelling way to capture the attention
of your stakeholders, some issues are best explained
in an email or even a phone call. Be mindful of the sensitive
information contained in these types of
communications. For security purposes, it's
important to communicate sensitive information with care. Be sure to follow the procedures
outlined in your organization's playbooks, and always
make sure to send emails to the right email
recipient as it could create a risk if the wrong person
receives confidential security information. One challenging
thing about emails is the potentially long
wait time for a response. Stakeholders have
many responsibilities. This means they may
sometimes miss an email or fail to respond
in a timely manner. In these instances, a simple
phone call or instant message may be a better option. My experience in
security has taught me that sometimes a simple
instant message or a call can help move a
situation forward. Direct communication
is often better than waiting days or weeks
for an email response to an issue that requires
immediate attention. When appropriate,
take the initiative to follow-up with a stakeholder
if they haven't responded to an email in a timely manner. It sounds simple,
but a friendly call can often prevent a major
issue from occurring. It's important to stand out
in the security profession, especially if you don't
have previous experience in the industry. Visual representations,
emails, and phone calls are great ways to showcase
your written and verbal communication skills. The visual aspect
shows your ability to put metrics and data
together in an impactful way. If you don't receive a timely
response from a stakeholder, following up shows initiative. In this video, we're going
to have a bit of fun. We'll create a visual
security story. Here's the scenario. The operations manager, one of
the stakeholders we previously discussed, has been informed
that the chief information security officer, also
known as the CISO, wants to know how many
employees are often clicking on phishing emails. The goal is to identify
which five departments click on those emails most often. An investigation reveals that
the five departments that most frequently click
on phishing emails are human resources, customer
service, global security, media relations, and
professional development. Based on this information,
the security team can create a visual
representation of the data to share with the operations
manager and the CISO. Those stakeholders
and the security team can then work
together to determine how to address the issue. There are many different
platforms available that can be used to create and
share visual stories of data. Apache OpenOffice is a free
open-source office suite that allows users to
create spreadsheets and other visual
representations. Another new course
option is Google Sheets. Today, we'll enter our
data into Google Sheets. Then we'll create a
bar chart visualization to develop the data story. If you don't have
a Google account, you'll need to create one. Let's start by demonstrating
how to create an account. First, go to google.com,
and click on Sign In. Click Create Account and
select For My Personal Use. Then complete each step to
create your personal account. Now that you've created
your Google account, it's time for us to begin
creating our Google Sheets bar chart visualization. Click the Dots menu in
the top-right corner. Click the Sheets icon. Click Blank to start
a new spreadsheet. Select cell A1. Type Department. Select cell B1. Type # of clicked
phishing emails. Select cell A2. Type Human Resources. Select cell B2. Type 30. Select cell A3. Type Customer Service. Select cell B3. Type 18. Select cell A4. Type Global Security. Select cell B4. Type 10. Select cell A5. Type Media Relations. Select cell B5. Type 40. Select cell A6. Type Professional Development. Select cell B6. Type 27. Then select the rows and
columns containing headers, department names, and data. Click Insert at the
top of the sheet. Select Chart in the
Chart Editor menu. Click Chart Type Dropdown menu. Scroll down to the
Bar Chart Options. Then select the first bar chart. In the chart editor
menu, click Customize. Then click on the Chart
& Axis Titles section. Now update the title to read
something like Clicked phishing emails by departments or another
title related to the data. Then click on the X icon at
the top of the chart editor to Close the Editor menu. Great job creating your
first visual security story. Creating visual stories of data
allows security team members to convey essential
information to stakeholders so issues can be communicated in
a meaningful and understandable way. These data stories can also help
promote a better understanding of issues that exist
within an organization and allow decision-makers
to determine how to address
security issues that put the organization at risk. You've had an opportunity to
learn about the important role stakeholders play and different
ways to communicate with them. Let's review what we covered. We started by defining
stakeholders and their roles in protecting an organization. We also explored the sensitive
nature of communications with stakeholders
and the importance of sharing that information
with care and confidentiality. Then we discussed
information that needs to be communicated
to stakeholders. After all, stakeholders
are extremely busy, so we only want to share
relevant information that they need to be aware of. We ended our discussion
by introducing various communication
strategies, including emails, phone
calls, and visual dashboards. Understanding who
the stakeholders are within your organization and
how to communicate with them will help you throughout
your career as a security professional. Be intentional
about the strategies you use to communicate. Remove unnecessary details
from your communications, and be specific and precise
when relaying information to stakeholders. Stakeholders are
depending on you as a storyteller to
tell them the security story or the potential issues
and solutions in a way that makes sense. The communication
strategies we discussed will help you stand
out as someone who has a combination of
technical and transferable skills. Coming up, your instructor
for the final sections of this course, Emily,
will discuss a few ways to engage with the
security community and how to find and apply for
jobs in the security field. EMILY: Welcome back. I'm Emily, and I've been
working in security education at Google for nearly nine years. My team works closely with our
remarkable security experts to craft innovative and
engaging educational solutions for our workforce to keep
security at the forefront. I'll be your instructor for
the remainder of the course to discuss important
career-related topics, such as how to engage with
the security community, find jobs in the security
field, create a resume, and navigate the
interview process. We're approaching the end
of the certificate program. What an incredible
journey it's been so far. We've discussed a lot up
to this point, including incident detection and
escalation and the roles that stakeholders play in
protecting an organization. We've also explored
the sensitive nature of the communications
we share and strategies for conveying critical
information to stakeholders. But does the learning stop
now that we're approaching the end of the program? Absolutely not. In the following videos, we'll
identify reliable security resources you can use to stay
up to date on security news and trends. Then we'll share some
ways to become involved with the security community. We'll end with a
discussion about how to establish and advance
a career in security. Coming up, we'll highlight
some great resources to help you stay current
on what's happening in the security industry. As we approach the
end of our program, it's important to start
thinking about ways to engage with the security community. As the industry evolves,
it's essential to stay up to date on the latest
security trends and news. Let's discuss a few
good resources for you to review periodically. What excites me about
the security profession is the constant evolution
of the industry. Take the OWASP Top
10, for example. Earlier in the program,
we discussed the fact that this is a globally
recognized standard awareness document that lists the top
10 most critical security risks to web applications. This list is updated
every three to four years. So it's a great example of the
evolving nature of the field. Continuing your
security education beyond this certificate
program will help you stand out
to hiring managers and could give you an extra
edge over other candidates because it shows
your willingness to remain current on what's
happening in the industry. A few well-known
security websites and blogs to get you started are
CSO Online, Krebs on Security, and Dark Reading. The CSO Online site provides
news, analysis, and research on various security and
risk management topics. Many CISOs view this
site for tips and ideas. It would be great for you
to review this publication every now and then. Krebs on Security is an
in-depth security blog created by former "Washington
Post" reporter Brian Krebs. This blog covers security
news and investigations into various cyber attacks. Accessing the Krebs
blog is a good way to stay up to date on the latest
security news and happenings around the world. Dark Reading is
a popular website for security professionals. This site provides information
about various security topics, like analytics and
application security, mobile and cloud
security, as well as the Internet of Things, IoT. Security is a constantly
evolving industry. As professionals in security,
we must evolve with it by seeking out new information. Be sure to explore a
few of the websites and blogs we discussed
in this video to stay up to date with what's
happening in the industry. Coming up, we'll discuss
how to become engaged with the security
community and ways to establish and advance
your career and security. Bye for now. Earlier, we discussed
the importance of staying up to date on
security trends and news. In this video,
we're going to share ways to establish and advance
your career and security by connecting with people who
are already in the industry. Social media is a great way
to connect to other security professionals in the industry. However, it's important to
be mindful of the information you share on your
social media page and when responding to messages
from people you don't know. With that in mind, let's
discuss ways to effectively use social media to establish or
advance your security career. One way to use social
media is to follow or read the posts of leaders in
the security industry. Chief information security
officers, for example, are great individuals to follow. They often post
interviews they've done in the security
space and share articles they've read or contributed to. Here's a question you
might be asking yourself. How can I find CISOs to
follow on social media? The best way would be to
conduct an internet search for the name of the CISO
of a popular organization or an organization you're
interested in working for. After you find their name, you
can simply go to a social media site to look them up. Ideally, you want
to use LinkedIn when following
security professionals. That's because the
LinkedIn platform focuses on connecting
professionals with other professionals in
the same or similar field. Another way to use social
media to establish or advance your career in the
security industry is to connect with other
security analysts currently employed in the field. On social networks
like LinkedIn, you can find security
professionals by searching for cybersecurity
analysts or a similar search term, then filtering for
people and people who talk about hashtag #cybersecurity. Once you've found
other professionals you'd like to connect with, you
can send a connection request with a brief comment,
such as, hi, I'd like to connect to learn more
about why you became interested in security and your
experiences as an analyst. Additionally, you
can set your filter to locate events and
groups that focus on security-related
topics that interest you. While social media
platforms like LinkedIn are excellent for connecting
with professionals, some people are more
comfortable with being active on social
media than others. For those of us who aren't
very active on social media, there are other ways to connect
with security professionals or find mentors in the industry. Joining different
security associations is a good way to
connect with others. There are many
associations out there. So you're going to have to
do a little bit of research to find the best ones for you. Here's a tip. In your internet
search engine, type cybersecurity
industry associations. This search term will
populate a variety of different associations. So be sure to select
ones that align with your professional goals. Now that we've discussed ways
to engage with the security community, consider
following a CISO on LinkedIn, connecting with other
analysts, or searching for cybersecurity
organizations to join. That's all for now. I'll meet you in the next video. Great job. Now you've had an opportunity
to learn about different ways to stay engaged with
the security community. Let's take a moment to
review what we've covered. First, we identified
reliable security resources. Then we discussed different
ways to engage with the security community. We also explored the
usefulness of social media to connect with other
security professionals and stay informed about
current topics of interest. Finally, we shared ways
to establish and advance a career in security,
including following a CISO on social
media or joining a professional organization. We've come a long
way in this journey. You should be proud
of your progress and how far you've come. I'm certainly proud of you. In the final section
of this course, we'll take the time to
prepare you for the job search and interviewing process. How exciting is that? Welcome back. We've covered so many
security-related topics in detail. Throughout this
program, we've discussed protecting organizational
assets and data and the tools and procedures
used to protect them. We've also explored how to
communicate with stakeholders, reliable sources to help you
stay up to date on security news and trends, and ways to
get involved with the security community to help
establish and advance your career in the field. Now we need to get
you prepared to find a job as an entry-level
security analyst. Security is a huge field with
countless job opportunities. By 2030, the US Bureau
of Labor statistics expects the number of security
roles to grow by more than 30%. But how can you find the
right opportunity for you? In the next several
videos, we'll discuss specific strategies
to help you find and apply for jobs in the
industry, including how to create your resume
and develop rapport with interviewers. We'll also cover how to use the
STAR method for interviewing and how to develop
an elevator pitch. | remember initially being
interested in my role because education is my passion. Researching the security field
and industry in preparation for my interviews cemented my
fascination for cybersecurity. I'll be honest, I had
taken a lot of what security does for granted. Now I feel incredibly
fortunate to be a part of this industry and
the exciting opportunities it offers. Now it's time to get you
ready to find security jobs. Let's get started. I hope you feel really proud
of how far you've come. You may remember that
earlier in this program, we discussed a few security
roles in the industry. Now we'll explore
three of those roles. We'll start with
security analyst. Security analyst is
typically an entry-level role that might interest
you as you prepare to enter the security field. The role generally focuses
on monitoring networks for security breaches,
developing strategies to help secure an organization,
and even researching IT security trends. In previous courses, we
discussed log monitoring and SIEM tools. Having a solid
foundational understanding of how to use those
tools will certainly be useful in this role. Another role that
might interest you is information security analyst. This role generally focuses on
creating plans and implementing security measures to protect
organizations, networks, and systems. Earlier in the
program, you learned about controls and
frameworks that can be used to develop
security plans and procedures, as well as how to
use SIEMs and packet sniffers to identify risks. That knowledge
will be beneficial when it comes to developing
plans and determining the best tools to strengthen an
organization's security posture. Finally, we'll explore
the security operations center analyst role. Security Operations
Center analyst, also known as a SOC
analyst, is another role you might find exciting. This role generally focuses on
ensuring security incidents are handled rapidly and efficiently
by following established policies and procedures. Earlier in this program, we
discussed security playbooks and how they are unique
to each organization. We also covered the
importance of being able to follow the
processes outlined in playbooks to respond to
security events or incidents. That knowledge
will certainly help you stand out as a potential
candidate for this role. There are many more job roles
that you may be interested in. A great way to find
more of these roles is to create an account
on various job sites and search for
cybersecurity positions. A few well-known job
sites in the United States and internationally are
ZipRecruiter, Indeed, and Monster Jobs. Each of these sites have
hundreds of open job listings with roles, responsibilities,
and skill set requirements posted under the job title. How exciting is
it that we're now discussing jobs and sites that
you can use to apply for them? It's important that you do
your research before applying to any position. Gather plenty of information
about the company, the job role, as well as required
and preferred skills. This will help prepare you
for a potential interview by knowing exactly what
the employer is looking for and how your skills align with
the employer's expectations. This will also help you align
your own values and passions with the organization's
mission and vision. But before you can apply
for a security job, it's important to create
a resume that will catch an employer's attention. Coming up, we'll discuss the
resume development process in detail. In this video, we'll
discuss how to create a resume that is tailored to
the job you're applying for. Note that a resume is
sometimes called a Curriculum Vitae, or CV for short. Remember that it's
OK if you don't have any cybersecurity experience. This certificate program has
covered key skills and concepts that employers are looking
for in an entry-level security analyst position. You can mention all
that you've learned in this program on
your resume, including programming languages
such as Python and SQL and Linux line-command. You can also share
your understanding of what it means
to have a security mindset, your knowledge
of standard frameworks and controls like the NIST
CSF and CIA triad model, as well as your familiarity
with how to use SIEM tools and packet sniffers. It's also possible that some
of your earlier job experiences allowed you to develop
knowledge and skills that are transferable
to a security role. These skills could include being
detail-oriented, collaborative, and having strong written and
verbal communication skills. Here's an example of a resume. You'll want to
start with your name at the top of the
resume followed by your professional title. Your title could be something
like security analyst or a title that matches the
position you're applying for. You'll also want to include at
least one way that employers or recruiters can contact you,
for example, an email address or phone number. After your name
and title, you'll provide a summary statement. This section should be brief,
just one or two sentences related to your strengths
and relevant skills. Make sure the statement
includes specific words from the Responsibility
section of the job description. You can include something
like this in your statement. "I am a motivated
security analyst seeking an entry-level
cybersecurity position to apply my skills in
network security, security policy, and organizational
risk management." Following your name
and summary statement is the Skills section. This is a bulleted
list of the skills you've learned in
this program that are related to the position. Employers usually like to
know about your previous work experience. In the Experience section,
you'll list your work history. Underneath each
job entry, provide a list of the skills and
responsibilities you performed. It's a good idea to
start each bullet with a verb and, if
possible, details that quantify an
accomplishment, for example, "Collaborated with a team of
six to develop training for more than 25 company employees." Try to highlight the security
or technology-related skills and knowledge that you have
based on your experiences in previous jobs and
this certificate program. The next section of the
resume lists your education and certifications. Start with the most
recent education you've completed, including
certifications, trade schools, online courses, or
college experience. Also include the names of
sites and organizations that issued your certifications
and schools you attended. List any subjects
you studied related to the job you're applying for. If you're currently enrolled
in school or a certification program but haven't
graduated, note, in progress. As you develop your resume,
keep a couple of things in mind. Make sure there are no
spelling or grammatical errors in your resume before sending
it to your potential employer. Also note that resumes are
typically about two pages long and list only your last 10 years
or less of work experience. Resumes can be created using
word processing applications like Google Docs or OpenOffice. However, you might find some
simple but professional resume templates online
to get you started. To find them, type, "free resume
template" or a similar search term into your internet browser. If you use a template,
be sure to replace all of the prefilled text
with your information and qualifications. There is so much to consider
when creating your resume. But what we covered today
will help you get started. Coming up, we'll explore
the interview process. After you've submitted your
resume to several job postings, you'll hopefully get an
opportunity for an interview. The interview process
usually starts with a short
prescreening phone call. It typically involves having
a 15-minute conversation with a hiring
manager or recruiter who will ask you some
questions to make sure that you are who your
resume says you are and that you meet the minimum
requirements for the job. Following the
prescreening, you could be invited to an
in-person interview, either on site or online. This could be a panel
interview with a few members of the team that you
would be working with or a one-on-one interview. Let's discuss some strategies
that can help prepare you for an interview. Review the job description
and your resume ahead of time. Practice speaking about
the experiences and skills that the employer
is looking for. Consider practicing
this with a friend by participating in
a mock interview. Your friend will act
as the interviewer, and you will answer their
questions as if you're meeting with the employer. It can also be helpful to
dress professionally and feel comfortable in the
clothes you choose to wear for the interview. Before the interview begins,
take a few deep breaths and remind yourself of all
the preparation you've done. If the interview is online
via video conference, prepare a location in your
home that is quiet, tidy, and professional. Also be sure to test your
video and audio settings and, if necessary, download the
video conference application specified by the interviewer. This will help ensure that you
correct any technical issues before the interview. Interviews usually include two
parts, a background interview and a technical interview. The background interview
will likely include questions about your education,
work experience, skills, and abilities. You might even be asked
some personal questions unrelated to the job posting. The interviewer is
trying to get to know you to determine if you'll
be a good match for the team and company culture. At the same time, you
want to ask questions to help you decide if the
team and company culture are a good match for you. The other portion
of the interview is the technical interview. This is when the
interviewer will ask you specific questions
about technical skills related to the role. You might be asked
how you would respond to a specific situation or to
explain a technical concept that's listed on your resume. Do your best to answer these
types of questions confidently and concisely based on
your current knowledge. It's OK to say that you don't
know the answer to a question or that you need a
moment to respond so you can think about your answer. Employers respect honesty. Just follow up
with an explanation of how you would
figure out the answer, either by researching it or
collaborating with the team. Even after you've completed
this certificate program, you'll still have access
to all of the content. So before the interview, go
back and review your notes, the glossary, and any
concepts that you might need to refresh your memory on. This can help you feel prepared
for the questions you'll be asked. Remember, you can
prepare for the interview by participating in
a mock interview, reviewing the job description,
and taking a few deep breaths before the interview begins. You've learned a
lot in this course and are ready to move ahead and
find a position as a security analyst. Coming up, we'll discuss how to
conduct pre-intervew research. Previously, we discussed
how to create a resume and what to expect
during an interview. In this video, we're going
to cover a few more things that you need to do to
prepare for the interview and that could
help set you apart as an excellent candidate
for the position. Before the interview, it's
important to do some research about the organization
you're interviewing with. Interviewers want
to know that you're a good match for their team and
that you value the things that are important to the company. It's just as important for
you to decide if the company matches your values. So make sure you know the
organization's mission and vision. Understand their core
values and company culture. This information is usually
easy to find, either in the job description or on the About page
of the organization's website. Think about why these values
and the company culture are also important to you. Then practice how you
will communicate this to potential employers. Remember that you will
not be the only applicant for the position. Consider what sets you
apart from other candidates, and be prepared to
emphasize those qualities during the interview. What about your skills,
experience, or work ethic make you the best match
for this position? How do your goals align to
the goals of the organization? You want the employer to
remember you after they've interviewed several candidates. So highlight things
that make you the best candidate for the role. You also want to think about
the employer's perspective. The organization
has needs that must be met by filling the position. They may have productivity
or compliance goals, or the team might be growing
because the company is expanding. Take some time to think
about what the interviewer is seeking in a candidate. Then prepare yourself
to state directly how you can meet the
employer's needs. The interviewer may
have reservations about hiring you because
of your lack of experience as a security analyst. If this comes up
in the interview, be prepared to address any
possible concerns by speaking about your strong work ethic. This could include an ability to
learn quickly based on feedback or to collaborate and
communicate with others. Also, you could discuss
having a security mindset or problem-solving
skills that you've developed from
personal life, work, or educational experiences. Learning about the
organization's culture and mission and
preparing to demonstrate how you can add value to
the team are essential. It's also a good idea
to write down questions that you can ask the interviewer
about the organization's past accomplishments
and future goals. This shows potential
employers that you've done your research and care
about the organization's success. Coming up, we'll discuss
how to build rapport with interviewers. In this video, we'll
explore a topic that can contribute
to your success during the interview process-- how to build rapport with
your potential employer. Rapport is a
friendly relationship in which the people involved
understand each other's ideas and communicate well
with each other. Building rapport begins with
the very first interaction you have with the company
staff by phone, email, or video conference. It's important to use
a professional tone in the email you
write expressing your interest in the job. But it's also important
to be polite and friendly. Expressing appreciation for
being considered and having the potential
opportunity to interview is one way to build rapport. When and if you have an
initial phone screen, you can use a friendly,
conversational tone of voice. To do this, try
smiling while you talk. And while it's true
that nobody can see you smile on a phone
call, smiling while you talk can make you sound friendlier. During the phone screening
and in-person interview, you can ease
interview nervousness by engaging actively in a way
that feels natural to you. That can mean simply saying,
hello, nice to meet you. You can even start a short,
friendly conversation by asking the interviewer
how their day is going. Or if the weekend just passed,
you might ask the interviewer, how was your weekend? Make eye contact when
you ask these questions during an in-person interview. Or be sure to look
directly into the camera during a video interview. This will show the
interviewer that you're engaged in the conversation. Oftentimes during
the second half of an interview,
the interviewer will ask if you have any
questions for them. As we discussed earlier,
it's important to have some questions prepared
to ask at this point. Here are some suggestions. You could ask, what is
the biggest challenge I might face coming
into this role, and how would I be expected
to meet that challenge? Or you might ask,
what would you say is the best part about
working for this company? Or what is a typical
day like for an analyst? Another great question
is, what is the potential for growth in this role? Asking questions
shows that you're engaged in the
conversation and are interested in the
company and the position. It also shows the employer
that you are confident and that you want to make
sure that their company is a good match for you before
you make a commitment. It's nice to send a
follow-up email a day or two after your
in-person interview. This is just a brief email
thanking the interviewer for the opportunity
to meet with them and learn more about
the organization. It's also a good idea to
mention something specific from your interview
in this email. It shows that you were actively
engaged in the conversation. Remember, the
employer is probably interviewing other candidates. So sending a
follow-up email will help set you apart and
remind the interviewer of your discussion. Building rapport with the
interviewer and other employees is an important skill
when interviewing for your first
security position. Writing friendly but
professional emails before and after the
interview and engaging in friendly conversation
during the interview can help set you apart as a
great candidate for the job. Welcome back. Preparing for job interviews
in the security field is such an exciting process. You've learned a lot through
this program that can help you stand out as a candidate. Let's discuss some
useful interview strategies to consider when
speaking to an employer. Your interviewer is going
to ask several questions when you meet. Carefully consider each
question before responding. Let's discuss the STAR
method, which can help you prepare for interviews. The STAR method is
a technique used to answer behavioral and
situational interview questions. Using this method is
a great way to help you understand each
interview question and provide a thoughtful
and thorough response. STAR stands for
Situation, Task, Action, Result. The STAR
method is typically used to answer open-ended
questions, such as, tell me about a time
when you encountered a challenge on the job. Let's go through an example
of how this question could be answered using the STAR method. The situation--
two people needed to stay home from
work due to illness, and I was the only person
available to assist customers. The task-- I needed
to answer phone calls from customers
while assisting shoppers in the store. The action-- I came up
with a strategy that allowed me to assist
customers as they entered the store while also ensuring
that customers who called were helped or
politely placed on hold until I was able
to address their needs. The result-- I managed the
in-store operations for the day without many mistakes, and
my manager complimented me during the next team meeting. Hopefully this example
highlights the benefits of answering open-ended
interview questions using the STAR method. But the STAR method
isn't the only strategy you can use during an interview. You can also answer
questions with confidence. One way to
demonstrate confidence is by admitting when you
don't know something. For example, if an
interviewer asks you to discuss a skill
that you don't have, it's OK to admit you
haven't learned it yet. However, the trick is
to confidently mention that, while you don't have
that particular skill, you're a quick learner and
eager to develop that skill. Treat it as an opportunity to
emphasize your ability to adapt and learn on the job,
which shows confidence. You know what else
shows confidence? Taking the time to
fully understand a problem or question to
provide the best solution or answer possible. When interviewing, don't be
afraid to ask the interviewer for a moment to think
about your answer. It shows that you're willing
to take the time needed to understand the question
and provide a response that is meaningful and relevant. We've discussed a
few strategies that can help you overcome the
nervousness you may feel about interviewing for a job. Coming up, we'll
continue to explore ways to prepare for interviews. In this video, we'll
take a little time to discuss additional
strategies you can use during a job interview. In past job interviews,
your potential employer may have asked, do you
have any questions for me? This type of question can
be an opportunity for you to show the
interviewer that you're prepared and ready to have
a meaningful conversation with them. A big part of
interview preparation is researching the company
before the interview because it will allow you to
ask questions that demonstrate you took the time to learn about
the organization and its needs. For example, if you discover
that the company suffered a major security
breach two years ago, don't be afraid to ask about it. One question you could
ask is, what do you think is the main reason
the company suffered a breach two years ago? And follow that
question up with, how could my role on
the security team help prevent a breach like
that in the future? These kinds of
questions show that you are passionate about
your career and that you want to help the company
strengthen its security posture. There are also some
general questions you can ask the
interviewer to determine if the job and the
organization itself are a good match for you. Here are some examples. What's the biggest challenge
for a new person in this role? In what ways can I contribute
to the success of the team and the organization? What qualities or
traits are most important for working
well with the team and other stakeholders? Questions like these can
help you develop rapport with the interviewer
and show that you're interested in learning
more about the role and the organizational culture. Interviewing for jobs can be
a really exciting process when you're prepared,
and asking questions is an essential part of
the interview process. Don't be afraid to ask potential
employers tough questions. This will help
them understand you as a thoughtful, curious person
who can add value to the team. Coming up, we'll discuss another
strategy-- the elevator pitch. Now let's discuss a concept
that can help you identify your strengths and allow you
to highlight those strengths to others-- an elevator pitch. An elevator pitch is a brief
summary of your experience, skills, and background. It's called an elevator
pitch because it should be short enough to
say in 60 seconds or less, which is the average amount of
time you might spend talking with someone on an elevator. Elevator pitches allow
you to demonstrate who you are to potential
employers in a very short time span. They can be used at job
fairs, career expos, and other networking situations,
like professional conferences and social media job
sites, such as LinkedIn. Now let's examine how to
create an elevator pitch. Your elevator pitch needs
to be short and persuasive. There's no need to list all
of your previous experiences and accomplishments. Instead, explain
who you are and why you care about being a
security professional, as well as the qualifications
and skills you have that are specifically related
to getting a job as a security analyst. For example, critical
thinking, problem solving, and the ability to build
collaborative relationships with others are
transferable skills that most organizations
are looking for. So highlight those in
your elevator pitch. You could also mention
technical skills you've learned in this
certificate program, such as using various
SIEM tools and programming languages like SQL and Python to
identify and respond to risks. Now we'll cover a few
things to avoid when delivering your elevator pitch. It's important to avoid rambling
or sharing irrelevant details during your elevator pitch. Potential employers only
want to know who you are and why they should consider
you for a security role. As you develop your
elevator pitch, you're going to want to
practice it several times. However, don't
practice it so much that you end up sounding
ingenuine or robotic when it's time to
share your pitch with a possible decision-maker. Instead, speak
naturally, like you're having a conversation, when
you give your elevator pitch. That will help keep people
engaged and interested in what you're saying. Another thing to avoid-- speaking too quickly. Because an elevator
page is fairly short, it can be easy to
rush through it. But that can cause people to
miss out on some key skills you have to offer simply
because you sped past them. One last tip-- search the
internet for elevator pitches to find examples that
may help you generate ideas for your own pitch. In essence, your
elevator pitch is a way to tell people why you
are an amazing candidate for a security position,
with great skills and a clear direction for what
you want to do in your career. While it's natural
to be nervous when speaking to potential
employers, just remember, take a deep breath,
gather your composure, and deliver your pitch with
confidence, conviction, and at a normal pace. You'll be just fine. You've done a great
job completing this section of the course. Let's take a moment to
review what we've covered. We started by discussing
how to find and apply for jobs in the security field. Then we explored how
to create your resume. Next, we shared some
strategies to develop rapport with interviewers. We also covered how
to use the STAR method to answer open-ended interview
questions thoughtfully. We finished by discussing how
to develop an elevator pitch. Hopefully this has
helped you feel confident as you begin to search and apply
for jobs in the security field. Good luck. Congratulations on
completing the final course of the certificate program. We covered a lot of information. So let's take a
moment to review. We started by discussing how to
protect assets and communicate incidents by developing
a security mindset. Then we covered when and
how to escalate incidents to the appropriate team
members to make sure that small issues don't
become big problems for an organization and
the people it serves. Next, we explored ways to
communicate effectively to influence stakeholders'
decisions related to security. This included
discussions about how to use visuals to convey
important information and sending emails,
making phone calls, or sending instant messages. After that, we shared some ways
to engage with the security community, including attending
conferences and connecting with other analysts
through a networking site. Then we moved on to
the final section of the course, which covered how
to find, prepare for, and apply for jobs. This included
discussions about how to create a compelling
resume and tips to help you navigate the interview process. It's been an absolute
pleasure guiding you through this journey. This certificate covered some
rigorous security content. You could have given up at
any point, but you didn't. And for that, you deserve
to be proud of yourself. As we discussed at the
beginning of this program, the security field is
growing and in need of security professionals
just like you to help protect organizations
around the world and the people they serve. The knowledge and
skills you've obtained throughout this
certificate program will allow you to begin applying
for entry-level security analyst jobs. Now let's take a moment to
summarize what we've discussed throughout this program. We started by exploring
core security concepts, including the definition of
security and core skills. Then we covered the focus
of eight security domains and discussed how
security supports critical organizational
operations. Following that, we
discussed network security, including network architecture
and the mechanisms used to secure an
organization's network. In the next course,
we turned our focus to computing basics
for security analysts. In this section, we
introduced Linux and SQL. After that, we explored assets,
threats, and vulnerabilities in depth. This included discussions
about how assets are classified and the security controls
used by organizations to protect valuable
information and minimize risks. In the next course, we
focused on incident detection and response. Here, we defined what
a security incident is and explained the
incident response lifecycle. In the following course,
we introduced the Python programming language
and explored how to develop code related
to common security tasks. Finally, in the last
course of the program, we explored topics
related to your pathway into the security
profession, including how to find and apply for jobs. You put a lot of
valuable time and energy into completing this
certificate program. Remember that the learning
doesn't stop here. As you move forward
in your career, always be mindful of the
new trends developing in the world of security. As technology
continues to advance, the threats to organizations
and people will evolve as well. It's up to you to stay informed
and always be willing to learn. You just completed the Google
Cybersecurity Certificate. What a remarkable
accomplishment that shows just how committed you
are to learning new skills that will allow you to
pursue your career goals. On behalf of myself and my
fellow course instructors, congratulations. SPEAKER: Congratulations,
you did it. SPEAKER: Congrats. I can't wait to see
how many of you decide to pursue this career
and visit some really cool places in cybersecurity. SPEAKER: Way to go. Congratulations. SPEAKER: Congratulations. SPEAKER: You're a rock star. SPEAKER: Congratulations. SPEAKER: Congratulations. DION: Great job. you did it. Congratulations. SPEAKER: Congratulations. I am rooting for you and
wishing you continued success. SPEAKER: Congratulations
on your big accomplishment. Now it's time to get to work. SPEAKER: This is
probably one of the best decisions you've ever made. And I can't wait to hear
about all the opportunities that you're going to experience. SPEAKER: Congratulations. SPEAKER: Congratulations,
you've made it to the end, and you're now ready to
keep everyone safe online. SPEAKER: Congratulations. Continue to learn. Continue to grow. You'll find this is a
very rewarding career. SPEAKER: Congratulations. You did it. Welcome to cybersecurity. SPEAKER: The adventure
continues after this. SPEAKER: There's
still a lot more to explore in the
world of security. But you're off to a great start. EMILY: It's been my
pleasure guiding you through the final
part of this program. I know you're well prepared
to begin or continue a remarkable career in security. Congratulations, and best
of luck on your journey. [MUSIC PLAYING]