verified
Verified Information • Last Updated Mar 2026
Assets, Threats, and Vulnerabilities
This is the fifth course in the Google Cybersecurity Certificate. These courses will further explore the importance of protecting organizational assets from threats, risks, and vulnerabilities. They will also continue to develop an understanding of asset classification and how to use the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF), as well as security controls, to protect assets and mitigate risk. Additionally, learners will gain an understanding of how to develop a threat actor mindset to help protect assets from ever-evolving threat actor tactics and techniques.
By the end of this course, you will:
- Learn effective data handling processes.
- Discuss the role of encryption and hashing in securing assets.
- Describe how to effectively use authentication and authorization.
- Explain how common vulnerability exposures are identified by MITRE.
- Analyze an attack surface to find risks and vulnerabilities.
- Identify threats, such as social engineering, malware, and web-based exploits.
- Summarize the threat modeling process.
Duration
8 Months
Institution
Google
Format
Online
Eligibility Criteria
school
Academic Foundation
A recognized Bachelor’s degree or high school equivalent required for admission into Google.
language
Language Proficiency
English proficiency required. IELTS, TOEFL, or standard medium-of-instruction certificates accepted.
Detailed Fees Breakdown
Base Tuition Fee
$258
Total Est. Investment
$258
Scholarships and early-bird waivers may apply. Contact admissions for exact institutional fees.
Academic Trajectory
Program Outcome
Graduates of the Assets, Threats, and Vulnerabilities program at Google are equipped with global perspectives, ready to excel in international markets and top-tier career opportunities.