• Google Assets, Threats, and Vulnerabilities

    Introduction I’m tackling the Google’s Cybersecurity Professional Certificate and I’ll share cliff notes on the courses I take. Dense summaries of what actually matters. Today Assets, Threats, and Vulnerabilities of this Google security path. Risk, assets and the CIA triad Security starts with three non-negotiable pillars that we’ve covered before: confidentiality, integrity, and availability (the…

  • Google Linux and SQL

    Introduction Another post in the Google’s Cybersecurity Professional Certificate series. As always, I’ll share the cliff notes on the courses as I go. Dense summaries of what actually matters. Today: Tools of the Trade: Linux and SQL The boot process: your first vulnerability Before your OS even loads, you’re already exposed. Computers boot via BIOS…

  • Google Networks and Network Security

    Introduction As part of tackling the Google’s Cybersecurity Professional Certificate, I’ll share the cliff notes on the courses as I go. Dense summaries of what actually matters. Today: Connect and Protect: Networks and Network Security Traffic and architecture An entry level analyst parses logs and analyzes traffic across network layers. Physical infrastructure includes firewalls (first…

  • Google Manage Security Risks

    Introduction As previously said, I’m tackling Google’s Cybersecurity Professional Certificate and I’ll share the cliff notes as I go. Dense summaries of what actually matters. Today: Play It Safe: Manage Security Risks Security domains and risk management Security teams organize their work across eight critical domains, ranging from governance (Security and Risk Management) to hands-on…

  • Google Foundations of Cybersecurity

    Introduction Years of platform engineering gave me the infrastructure fundamentals, and beyond; now I’m retooling for security. I’m tackling Google’s Cybersecurity Professional Certificate first (CompTIA Security+ next), and I’ll share the cliff notes as I go. Dense summaries of what actually matters. Kickoff: Google Foundations of Cybersecurity. The players and the prize Security is a…

  • From platform engineer to threat hunter

    Introduction I’ve spent the last decade automating everything that moves. Turning VMs into containers, containers into orchestrated workloads, and Git repos into self-healing production platforms. I’m a Kubernetes platform engineer by trade, addicted to GitOps, service meshes, and the beautiful chaos of multi-cluster architectures. But lately? I’ve been spending more time thinking about how to…