Security Risk Assessment Report
Created during Google's Cybersecurity Course based on fictional information
Part 1: Select up to three hardening tools and methods to implement
Part 2: Explain your recommendations
PreviousCybersecurity Incident Report: Website RedirectionNextAIG Shields Up: Cybersecurity Job Simulation
Last updated