(Coursera) Google Cybersecurity Professional Certificate
About Course
Become a Google Cybersecurity Professional for FREE! This comprehensive online course, taught by Google and available on Coursera, equips you with in-demand skills in web security and cybersecurity. No prior experience needed!
Learn from industry leaders: Master key cybersecurity concepts and best practices, including threat identification, vulnerability assessment, incident response, and more. Gain hands-on experience through practical projects and real-world scenarios.
Launch your cybersecurity career: This program prepares you for a high-demand career in the booming cybersecurity industry. With dedicated study, you could be ready to start your new career in as little as 6 months!
This Google Cybersecurity Professional Certificate program includes 8 in-depth courses:
- Cybersecurity Foundations
- Network Security
- Security Operations
- Threat Intelligence
- Incident Response
- Vulnerability Management
- Security Auditing
- Cybersecurity Law & Ethics
Become a cybersecurity expert: This program prepares you for the CompTIA Security+ exam and other industry certifications. Learn the essential skills to protect organizations from cyberattacks, secure sensitive data, and become a valuable asset to any company.
This course is completely FREE and available on Coursera, a leading online learning platform. Access thousands more free courses from platforms like Udemy, Udacity, Coursera, MasterClass, NearPeer, and more on Theetay. Start your learning journey today!
What Will You Learn?
- Linux operating system and its various applications in the world of cyber security
- Powerful Python programming language
- Information security
- Security Information and Event Management System (SIEM)
- Intrusion Detection Systems
- SQL language
- Common attacks in the cyber world
- Ethical and professional principles in the world of hacking and security
- United States Cybersecurity Framework
- And …
Course Content
01. Foundations of Cybersecurity
-
A Message from the Professor
-
002 1. Welcome to the Google Cybersecurity Certificate.mp4
00:00 -
003 2. Google Cybersecurity Certificate overview.html
00:00 -
004 3. Course 1 overview.html
00:00 -
006 4. Welcome to week 1.mp4
00:00 -
007 5. Helpful resources and tips.html
00:00 -
008 6. Participate in program surveys.html
00:00 -
010 1. Introduction to cybersecurity.mp4
00:00 -
012 2. Toni My path to cybersecurity.mp4
00:00 -
014 3. Responsibilities of an entrylevel cybersecurity analyst.mp4
00:00 -
016 4. Nikki A day in the life of a security engineer.mp4
00:00 -
017 5. Common cybersecurity terminology.html
00:00 -
019 1. Core skills for cybersecurity professionals.mp4
00:00 -
021 2. Veronica My path to working in cybersecurity.mp4
00:00 -
022 3. Transferable and technical cybersecurity skills.html
00:00 -
024 4. The importance of cybersecurity.mp4
00:00 -
026 1. Wrapup.mp4
00:00 -
027 2. Glossary terms from week 1.html
00:00 -
029 1. Welcome to week 2.mp4
00:00 -
031 2. Past cybersecurity attacks.mp4
00:00 -
033 3. Attacks in the digital age.mp4
00:00 -
034 4. Common attacks and their effectiveness.html
00:00 -
036 5. Sean Keep your cool during a data breach.mp4
00:00 -
038 1. Introduction to the eight CISSP security domains Part 1.mp4
00:00 -
040 2. Introduction to the eight CISSP security domains Part 2.mp4
00:00 -
041 3. Determine the type of attack.html
00:00 -
042 4. Understand attackers.html
00:00 -
044 1. Wrapup.mp4
00:00 -
045 2. Glossary terms from week 2.html
00:00 -
047 1. Welcome to week 3.mp4
00:00 -
049 2. Introduction to security frameworks and controls.mp4
00:00 -
051 3. Secure design.mp4
00:00 -
052 4. Controls frameworks and compliance.html
00:00 -
054 5. Heather Protect sensitive data and information.mp4
00:00 -
056 1. Ethics in cybersecurity.mp4
00:00 -
057 2. Ethical concepts that guide cybersecurity decisions.html
00:00 -
059 3. Holly The importance of ethics as a cybersecurity professional.mp4
00:00 -
061 1. Wrapup.mp4
00:00 -
062 2. Glossary terms from week 3.html
00:00 -
064 1. Welcome to week 4.mp4
00:00 -
066 2. Common cybersecurity tools.mp4
00:00 -
067 3. Tools for protecting business operations.html
00:00 -
069 1. Introduction to Linux SQL and Python.mp4
00:00 -
070 2. Use tools to protect business operations.html
00:00 -
071 3. Create a cybersecurity portfolio.html
00:00 -
072 4. Portfolio Activity Exemplar Draft a professional statement.html
00:00 -
074 1. Wrapup.mp4
00:00 -
075 2. Glossary terms from week 4.html
00:00 -
077 1. Course wrapup.mp4
00:00 -
078 2. Course 1 glossary.html
00:00 -
079 3. Get started on the next course.html
00:00 -
Section Quiz
02. Play It Safe Manage Security Risks
-
002 1. Introduction to Course 2.mp4
00:00 -
003 2. Course 2 overview.html
00:00 -
004 3. Helpful resources and tips.html
00:00 -
006 1. Welcome to week 1.mp4
00:00 -
008 2. Explore the CISSP security domains Part 1.mp4
00:00 -
010 3. Explore the CISSP security domains Part 2.mp4
00:00 -
011 4. Security domains cybersecurity analysts need to know.html
00:00 -
013 5. Ashley My path to cybersecurity.mp4
00:00 -
015 1. Threats risks and vulnerabilities.mp4
00:00 -
017 2. Key impacts of threats risks and vulnerabilities.mp4
00:00 -
019 3. Herbert Manage threats risks and vulnerabilities.mp4
00:00 -
021 4. NISTs Risk Management Framework.mp4
00:00 -
022 5. Manage common threats risks and vulnerabilities.html
00:00 -
024 1. Wrapup.mp4
00:00 -
025 2. Glossary terms from week 1.html
00:00 -
027 1. Welcome to week 2.mp4
00:00 -
029 2. Frameworks.mp4
00:00 -
031 3. Controls.mp4
00:00 -
032 4. The relationship between frameworks and controls.html
00:00 -
034 1. Explore the CIA triad.mp4
00:00 -
035 2. Use the CIA triad to protect organizations.html
00:00 -
037 1. NIST frameworks.mp4
00:00 -
039 2. Explore the five functions of the NIST Cybersecurity Framework.mp4
00:00 -
041 1. OWASP security principles.mp4
00:00 -
042 2. More about OWASP security principles.html
00:00 -
044 3. Wajih Stay uptodate on the latest cybersecurity threats.mp4
00:00 -
046 4. Plan a security audit.mp4
00:00 -
048 5. Complete a security audit.mp4
00:00 -
049 6. More about security audits.html
00:00 -
050 7. Portfolio Activity Exemplar Conduct a security audit Part 1.html
00:00 -
051 8. Portfolio Activity Exemplar Conduct a security audit Part 2.html
00:00 -
053 1. Wrapup.mp4
00:00 -
054 2. Glossary terms from week 2.html
00:00 -
056 1. Welcome to week 3.mp4
00:00 -
058 2. Logs and SIEM tools.mp4
00:00 -
060 3. SIEM dashboards.mp4
00:00 -
061 4. The future of SIEM tools.html
00:00 -
063 5. Parisa The parallels of accessibility and security.mp4
00:00 -
065 1. Explore common SIEM tools.mp4
00:00 -
066 2. More about cybersecurity tools.html
00:00 -
068 3. Talya Myths about the cybersecurity field.mp4
00:00 -
069 4. Use SIEM tools to protect organizations.html
00:00 -
071 1. Wrapup.mp4
00:00 -
072 2. Glossary terms from week 3.html
00:00 -
074 1. Welcome to week 4.mp4
00:00 -
076 2. Phases of an incident response playbook.mp4
00:00 -
077 3. More about playbooks.html
00:00 -
079 1. Use a playbook to respond to threats risks or vulnerabilities.mp4
00:00 -
081 2. Erin The importance of diversity of perspective on a security team.mp4
00:00 -
082 3. Playbooks SIEM tools and SOAR tools.html
00:00 -
084 1. Wrapup.mp4
00:00 -
085 2. Glossary terms from week 4.html
00:00 -
087 1. Course wrapup.mp4
00:00 -
088 2. Course 2 glossary.html
00:00 -
089 3. Get started on the next course.html
00:00 -
Section Quiz
03. Connect and Protect Networks and Network Security
-
002 1. Introduction to Course 3.mp4
00:00 -
003 2. Course 3 overview.html
00:00 -
004 3. Helpful resources and tips.html
00:00 -
006 1. Welcome to week 1.mp4
00:00 -
008 2. Chris My path to cybersecurity.mp4
00:00 -
010 3. What are networks.mp4
00:00 -
012 4. Tina Working in network security.mp4
00:00 -
014 5. Emmanuel Useful skills for network security.mp4
00:00 -
016 6. Network tools.mp4
00:00 -
017 7. Network components devices and diagrams.html
00:00 -
019 8. Cloud networks.mp4
00:00 -
020 9. Cloud computing and softwaredefined networks.html
00:00 -
022 1. Introduction to network communication.mp4
00:00 -
024 2. The TCPIP model.mp4
00:00 -
026 3. The four layers of the TCPIP model.mp4
00:00 -
027 4. Learn more about the TCPIP model.html
00:00 -
028 5. The OSI model.html
00:00 -
030 1. IP addresses and network communication.mp4
00:00 -
031 2. Components of network layer communication.html
00:00 -
033 1. Wrapup.mp4
00:00 -
034 2. Glossary terms from week 1.html
00:00 -
036 1. Welcome to week 2.mp4
00:00 -
038 2. Network protocols.mp4
00:00 -
039 3. Common network protocols.html
00:00 -
040 4. Additional network protocols.html
00:00 -
042 5. Wireless protocols.mp4
00:00 -
043 6. The evolution of wireless security protocols.html
00:00 -
045 1. Firewalls and network security measures.mp4
00:00 -
047 2. Virtual private networks VPNs.mp4
00:00 -
049 3. Security zones.mp4
00:00 -
050 4. Subnetting and CIDR.html
00:00 -
052 5. Proxy servers.mp4
00:00 -
053 6. Virtual networks and privacy.html
00:00 -
055 1. Wrapup.mp4
00:00 -
056 2. Glossary terms from week 2.html
00:00 -
058 1. Welcome to week 3.mp4
00:00 -
060 2. The case for securing networks.mp4
00:00 -
061 3. How intrusions compromise your system.html
00:00 -
063 1. Denial of Service DoS attacks.mp4
00:00 -
064 2. Read tcpdump logs.html
00:00 -
065 3. Activity Exemplar Analyze network layer communication.html
00:00 -
066 4. Reallife DDoS attack.html
00:00 -
068 1. Malicious packet sniffing.mp4
00:00 -
070 2. IP Spoofing.mp4
00:00 -
071 3. Overview of interception tactics.html
00:00 -
072 4. Activity Exemplar Analyze network attacks.html
00:00 -
074 1. Wrapup.mp4
00:00 -
075 2. Glossary terms from week 3.html
00:00 -
077 1. Welcome to week 4.mp4
00:00 -
079 2. Security hardening.mp4
00:00 -
081 1. OS hardening practices.mp4
00:00 -
082 2. Brute force attacks and OS hardening.html
00:00 -
083 3. Activity Exemplar Apply OS hardening techniques.html
00:00 -
085 1. Network hardening practices.mp4
00:00 -
086 2. Network security applications.html
00:00 -
087 3. Activity Exemplar Analysis of network hardening.html
00:00 -
089 1. Network security in the cloud.mp4
00:00 -
091 2. Kelsey Cloud security explained.mp4
00:00 -
092 3. Secure the cloud.html
00:00 -
094 1. Wrapup.mp4
00:00 -
095 2. Glossary terms from week 4.html
00:00 -
096 3. Portfolio Activity Exemplar Use the NIST Cybersecurity Framework to respond to a security incident.html
00:00 -
098 1. Course wrapup.mp4
00:00 -
099 2. Course 3 glossary.html
00:00 -
100 3. Get started on the next course.html
00:00 -
Section Quiz
04. Tools of the Trade Linux and SQL
-
002 1. Introduction to Course 4.mp4
00:00 -
003 2. Course 4 overview.html
00:00 -
004 3. Helpful resources and tips.html
00:00 -
006 1. Welcome to week 1.mp4
00:00 -
008 2. Kim My journey into computing.mp4
00:00 -
010 3. Introduction to operating systems.mp4
00:00 -
011 4. Compare operating systems.html
00:00 -
013 1. Inside the operating system.mp4
00:00 -
014 2. Requests to the operating system.html
00:00 -
016 3. Resource allocation via the OS.mp4
00:00 -
018 1. GUI versus CLI.mp4
00:00 -
019 2. The command line in use.html
00:00 -
021 3. Ellen My path into cybersecurity.mp4
00:00 -
023 1. Wrapup.mp4
00:00 -
024 2. Glossary terms from week 1.html
00:00 -
026 1. Welcome to week 2.mp4
00:00 -
028 2. Introduction to Linux.mp4
00:00 -
030 3. Phil Learn and grow in the cybersecurity field.mp4
00:00 -
032 4. Linux architecture.mp4
00:00 -
033 5. Linux architecture explained.html
00:00 -
035 1. Linux distributions.mp4
00:00 -
037 2. KALI LINUX.mp4
00:00 -
038 3. More Linux distributions.html
00:00 -
039 4. Resources for completing Linux labs.html
00:00 -
041 1. Introduction to the shell.mp4
00:00 -
043 2. Input and output in the shell.mp4
00:00 -
045 1. Wrapup.mp4
00:00 -
046 2. Glossary terms from week 2.html
00:00 -
048 1. Welcome to week 3.mp4
00:00 -
050 2. Linux commands via the Bash shell.mp4
00:00 -
052 3. Core commands for navigation and reading files.mp4
00:00 -
053 4. Navigate Linux and read file content.html
00:00 -
055 1. Find what you need with Linux.mp4
00:00 -
056 2. Filter content in Linux.html
00:00 -
058 3. Create and modify directories and files.mp4
00:00 -
059 4. Manage directories and files.html
00:00 -
061 1. File permissions and ownership.mp4
00:00 -
063 2. Change permissions.mp4
00:00 -
064 3. Permission commands.html
00:00 -
065 4. Portfolio Activity Exemplar Use Linux commands to manage file permissions.html
00:00 -
067 5. Add and delete users.mp4
00:00 -
068 6. Responsible use of sudo.html
00:00 -
070 1. Damar My journey into Linux commands.mp4
00:00 -
072 2. The Linux community.mp4
00:00 -
074 3. Man pages within the shell.mp4
00:00 -
075 4. Linux resources.html
00:00 -
077 1. Wrapup.mp4
00:00 -
078 2. Glossary terms from week 3.html
00:00 -
080 1. Welcome to week 4.mp4
00:00 -
082 2. Introduction to databases.mp4
00:00 -
084 3. Query databases with SQL.mp4
00:00 -
085 4. SQL filtering versus Linux filtering.html
00:00 -
087 5. Adedayo SQL in cybersecurity.mp4
00:00 -
089 1. Basic queries.mp4
00:00 -
090 2. Query a database.html
00:00 -
091 3. Resources for completing SQL labs.html
00:00 -
093 4. Basic filters on SQL queries.mp4
00:00 -
094 5. The WHERE clause and basic operators.html
00:00 -
096 1. Filter dates and numbers.mp4
00:00 -
097 2. Operators for filtering dates and numbers.html
00:00 -
099 3. Filters with AND OR and NOT.mp4
00:00 -
100 4. More on filters with AND OR and NOT.html
00:00 -
101 5. Portfolio Activity Exemplar Apply filters to SQL queries.html
00:00 -
103 1. Join tables in SQL.mp4
00:00 -
105 2. Types of joins.mp4
00:00 -
106 3. Compare types of joins.html
00:00 -
107 4. Continuous learning in SQL.html
00:00 -
109 1. Wrapup.mp4
00:00 -
110 2. Glossary terms from week 4.html
00:00 -
112 1. Course wrapup.mp4
00:00 -
113 2. Course 4 glossary.html
00:00 -
114 3. Get started on the next course.html
00:00 -
Section Quiz
05. Assets, Threats, and Vulnerabilities
-
002 1. Introduction to Course 5.mp4
00:00 -
003 2. Course 5 overview.html
00:00 -
004 3. Helpful resources and tips.html
00:00 -
006 4. DaQueshia My path to cybersecurity.mp4
00:00 -
008 1. Welcome to week 1.mp4
00:00 -
010 2. The what why and how of asset security.mp4
00:00 -
011 3. Understand risks threats and vulnerabilities.html
00:00 -
013 4. Tri Life in asset security.mp4
00:00 -
015 5. Security starts with asset classification.mp4
00:00 -
016 6. Common classification requirements.html
00:00 -
017 7. Activity Exemplar Classify the assets connected to a home network.html
00:00 -
019 1. Assets in a digital world.mp4
00:00 -
020 2. The emergence of cloud security.html
00:00 -
022 1. Elements of a security plan.mp4
00:00 -
024 2. The NIST Cybersecurity Framework.mp4
00:00 -
025 3. Security guidelines in action.html
00:00 -
027 1. Wrapup.mp4
00:00 -
028 2. Glossary terms from week 1.html
00:00 -
030 1. Welcome to week 2.mp4
00:00 -
032 2. Security controls.mp4
00:00 -
033 3. Principle of least privilege.html
00:00 -
034 4. Information privacy Regulations and compliance.html
00:00 -
036 5. Heather The importance of protecting PII.mp4
00:00 -
038 1. Fundamentals of cryptography.mp4
00:00 -
040 2. Public key infrastructure.mp4
00:00 -
041 3. Symmetric and asymmetric encryption.html
00:00 -
042 4. Resources for completing labs.html
00:00 -
044 5. Nonrepudiation and hashing.mp4
00:00 -
045 6. The evolution of hash functions.html
00:00 -
047 1. Access controls and authentication systems.mp4
00:00 -
048 2. The rise of SSO and MFA.html
00:00 -
050 3. The mechanisms of authorization.mp4
00:00 -
052 4. Why we audit user activity.mp4
00:00 -
054 5. Tim Finding purpose in protecting assets.mp4
00:00 -
055 6. Identity and access management.html
00:00 -
056 7. Activity Exemplar Improve authentication and authorization for a small business.html
00:00 -
058 1. Wrapup.mp4
00:00 -
059 2. Glossary terms from week 2.html
00:00 -
061 1. Welcome to week 3.mp4
00:00 -
063 2. Vulnerability management.mp4
00:00 -
065 3. Defense in depth strategy.mp4
00:00 -
067 4. Common vulnerabilities and exposures.mp4
00:00 -
068 5. The OWASP Top 10.html
00:00 -
070 1. Vulnerability assessments.mp4
00:00 -
071 2. Approaches to vulnerability scanning.html
00:00 -
072 3. The importance of updates.html
00:00 -
074 4. Omad My learning journey into cybersecurity.mp4
00:00 -
076 1. Protect all entry points.mp4
00:00 -
077 2. Approach cybersecurity with an attacker mindset.html
00:00 -
078 3. Types of threat actors.html
00:00 -
080 4. Niru Adopt an attacker mindset.mp4
00:00 -
082 5. Pathways through defenses.mp4
00:00 -
083 6. Fortify against brute force cyber attacks.html
00:00 -
084 7. Activity Exemplar Identify the attack vectors of a USB drive.html
00:00 -
086 1. Wrapup.mp4
00:00 -
087 2. Glossary terms from week 3.html
00:00 -
089 1. Welcome to week 4.mp4
00:00 -
091 2. The criminal art of persuasion.mp4
00:00 -
092 3. Social engineering tactics.html
00:00 -
094 4. Phishing for information.mp4
00:00 -
095 5. Types of phishing.html
00:00 -
097 1. Malicious software.mp4
00:00 -
098 2. An introduction to malware.html
00:00 -
100 3. The rise of cryptojacking.mp4
00:00 -
102 1. Crosssite scripting.mp4
00:00 -
104 2. Exploitable gaps in databases.mp4
00:00 -
106 1. A proactive approach to security.mp4
00:00 -
108 2. Chantelle The value of diversity in cybersecurity.mp4
00:00 -
110 3. PASTA The Process for Attack Simulation and Threat Analysis.mp4
00:00 -
111 4. Traits of an effective threat model.html
00:00 -
112 5. Activity Exemplar Apply the PASTA threat model framework.html
00:00 -
114 1. Wrapup.mp4
00:00 -
115 2. Glossary terms from week 4.html
00:00 -
117 1. Course wrapup.mp4
00:00 -
118 2. Course 5 glossary.html
00:00 -
119 3. Get started on the next course.html
00:00 -
Section Quiz
06. Sound the Alarm Detection and Response
-
002 1. Introduction to Course 6.mp4
00:00 -
003 2. Course 6 overview.html
00:00 -
004 3. Helpful resources and tips.html
00:00 -
006 4. Dave Grow your cybersecurity career with mentors.mp4
00:00 -
008 1. Welcome to week 1.mp4
00:00 -
010 2. Introduction to the incident response lifecycle.mp4
00:00 -
011 3. Portfolio Activity Exemplar Document an incident with an incident handlers journal.html
00:00 -
013 1. Incident response teams.mp4
00:00 -
015 2. Fatima The importance of communication during incident response.mp4
00:00 -
016 3. Roles in response.html
00:00 -
018 4. Incident response plans.mp4
00:00 -
020 1. Incident response tools.mp4
00:00 -
022 2. The value of documentation.mp4
00:00 -
024 3. Intrusion detection systems.mp4
00:00 -
025 4. Overview of detection tools.html
00:00 -
027 5. Alert and event management with SIEM and SOAR tools.mp4
00:00 -
029 1. Wrapup.mp4
00:00 -
030 2. Glossary terms from week 1.html
00:00 -
032 1. Welcome to week 2.mp4
00:00 -
034 2. Casey Apply soft skills in cybersecurity.mp4
00:00 -
036 3. The importance of network traffic flows.mp4
00:00 -
037 4. Maintain awareness with network monitoring.html
00:00 -
039 5. Data exfiltration attacks.mp4
00:00 -
041 1. Packets and packet captures.mp4
00:00 -
042 2. Learn more about packet captures.html
00:00 -
044 3. Interpret network communications with packets.mp4
00:00 -
046 4. Reexamine the fields of a packet header.mp4
00:00 -
047 5. Investigate packet details.html
00:00 -
048 6. Resources for completing labs.html
00:00 -
050 1. Packet captures with tcpdump.mp4
00:00 -
051 2. Overview of tcpdump.html
00:00 -
053 1. Wrapup.mp4
00:00 -
054 2. Glossary terms from week 2.html
00:00 -
056 1. Welcome to week 3.mp4
00:00 -
058 2. The detection and analysis phase of the lifecycle.mp4
00:00 -
059 3. Cybersecurity incident detection methods.html
00:00 -
061 4. MK Changes in the cybersecurity industry.mp4
00:00 -
062 5. Indicators of compromise.html
00:00 -
063 6. Analyze indicators of compromise with investigative tools.html
00:00 -
064 7. Activity Exemplar Investigate a suspicious file hash.html
00:00 -
066 1. The benefits of documentation.mp4
00:00 -
068 2. Document evidence with chain of custody forms.mp4
00:00 -
069 3. Best practices for effective documentation.html
00:00 -
071 4. The value of cybersecurity playbooks.mp4
00:00 -
072 5. Activity Exemplar Use a playbook to respond to a phishing incident.html
00:00 -
074 1. The role of triage in incident response.mp4
00:00 -
076 2. Robin Foster crossteam collaboration.mp4
00:00 -
077 3. The triage process.html
00:00 -
079 4. The containment eradication and recovery phase of the lifecycle.mp4
00:00 -
080 5. Business continuity considerations.html
00:00 -
082 1. The postincident activity phase of the lifecycle.mp4
00:00 -
083 2. Postincident review.html
00:00 -
085 1. Wrapup.mp4
00:00 -
086 2. Glossary terms from week 3.html
00:00 -
088 1. Welcome to week 4.mp4
00:00 -
090 2. The importance of logs.mp4
00:00 -
091 3. Best practices for log collection and management.html
00:00 -
093 4. Rebecca Learn new tools and technologies.mp4
00:00 -
095 5. Variations of logs.mp4
00:00 -
096 6. Overview of log file formats.html
00:00 -
098 1. Security monitoring with detection tools.mp4
00:00 -
099 2. Detection tools and techniques.html
00:00 -
101 3. Components of a detection signature.mp4
00:00 -
103 4. Examine signatures with Suricata.mp4
00:00 -
105 5. Examine Suricata logs.mp4
00:00 -
106 6. Overview of Suricata.html
00:00 -
108 1. Reexamine SIEM tools.mp4
00:00 -
110 2. Query for events with Splunk.mp4
00:00 -
112 3. Query for events with Chronicle.mp4
00:00 -
113 4. Search methods with SIEM tools.html
00:00 -
115 1. Wrapup.mp4
00:00 -
116 2. Glossary terms from week 4.html
00:00 -
117 3. Portfolio Activity Exemplar Finalize your incident handlers journal.html
00:00 -
119 1. Course wrapup.mp4
00:00 -
120 2. Course 6 glossary.html
00:00 -
121 3. Get started on the next course.html
00:00 -
Section Quiz
07. Automate Cybersecurity Tasks with Python
-
002 1. Introduction to Course 7.mp4
00:00 -
003 2. Course 7 overview.html
00:00 -
005 3. Ángel My personal career journey.mp4
00:00 -
006 4. Helpful resources and tips.html
00:00 -
008 1. Welcome to week 1.mp4
00:00 -
010 2. Python and cybersecurity.mp4
00:00 -
011 3. Get to know Python.html
00:00 -
013 4. Create a basic Python script.mp4
00:00 -
014 5. Python environments.html
00:00 -
016 6. Akash Python and the cybersecurity professional.mp4
00:00 -
018 1. Data types in Python.mp4
00:00 -
019 2. More about data types.html
00:00 -
021 3. Work with variables in Python.mp4
00:00 -
022 4. Assign and reassign variables in Python.html
00:00 -
024 1. Conditional statements in Python.mp4
00:00 -
025 2. More on conditionals in Python.html
00:00 -
027 3. For loops.mp4
00:00 -
029 4. While loops.mp4
00:00 -
030 5. More on loops in Python.html
00:00 -
032 1. Wrapup.mp4
00:00 -
033 2. Glossary terms from week 1.html
00:00 -
035 1. Welcome to week 2.mp4
00:00 -
037 2. Introduction to functions.mp4
00:00 -
039 3. Create a basic function.mp4
00:00 -
040 4. Python functions in cybersecurity.html
00:00 -
042 1. Use parameters in functions.mp4
00:00 -
044 2. Return statements.mp4
00:00 -
045 3. Functions and variables.html
00:00 -
047 4. Explore builtin functions.mp4
00:00 -
048 5. Work with builtin functions.html
00:00 -
050 1. Modules and libraries.mp4
00:00 -
052 2. Code readability.mp4
00:00 -
053 3. Ensure proper syntax and readability in Python.html
00:00 -
055 4. Dorsa Use Python efficiently on a cybersecurity team.mp4
00:00 -
057 1. Wrapup.mp4
00:00 -
058 2. Glossary terms from week 2.html
00:00 -
060 1. Welcome to week 3.mp4
00:00 -
062 2. String operations.mp4
00:00 -
064 3. String indices and slices.mp4
00:00 -
065 4. Strings and the security analyst.html
00:00 -
067 1. List operations in Python.mp4
00:00 -
069 2. Write a simple algorithm.mp4
00:00 -
070 3. Lists and the security analyst.html
00:00 -
072 1. Regular expressions in Python.mp4
00:00 -
073 2. More about regular expressions.html
00:00 -
075 1. Wrapup.mp4
00:00 -
076 2. Glossary terms from week 3.html
00:00 -
078 1. Welcome to week 4.mp4
00:00 -
080 2. Automate cybersecurity tasks with Python.mp4
00:00 -
081 3. Essential Python components for automation.html
00:00 -
083 4. Clancy Continual learning and Python.mp4
00:00 -
085 1. Access a text file in Python.mp4
00:00 -
086 2. Import files into Python.html
00:00 -
088 3. Parse a text file in Python.mp4
00:00 -
090 4. Develop a parsing algorithm in Python.mp4
00:00 -
091 5. Portfolio Activity Exemplar Update a file through a Python algorithm.html
00:00 -
093 1. Debugging strategies.mp4
00:00 -
095 2. Apply debugging strategies.mp4
00:00 -
096 3. Explore debugging techniques.html
00:00 -
098 1. Wrapup.mp4
00:00 -
099 2. Glossary terms from week 4.html
00:00 -
101 1. Course wrapup.mp4
00:00 -
102 2. Course 7 glossary.html
00:00 -
103 3. Get started on the next course.html
00:00
08. Put It to Work Prepare for Cybersecurity Jobs
-
002 1. Introduction to Course 8.mp4
00:00 -
003 2. Course 8 overview.html
00:00 -
005 3. Dion My personal career journey.mp4
00:00 -
006 4. Helpful resources and tips.html
00:00 -
008 1. Welcome to week 1.mp4
00:00 -
010 2. Security as a mindset.mp4
00:00 -
011 3. Data and asset classification.html
00:00 -
013 1. Detect and protect without neglect.mp4
00:00 -
014 2. Disaster recovery and business continuity.html
00:00 -
015 3. Julianas story Asset protection.html
00:00 -
017 1. Wrapup.mp4
00:00 -
018 2. Glossary terms from week 1.html
00:00 -
020 1. Welcome to week 2.mp4
00:00 -
022 2. The importance of escalation.mp4
00:00 -
023 3. Escalate with a purpose.html
00:00 -
025 1. Prepare to escalate through security recognition.mp4
00:00 -
026 2. Recognize roles and responsibilities during escalation.html
00:00 -
028 1. From simple activity to major data breach.mp4
00:00 -
030 2. When and how to escalate a security incident.mp4
00:00 -
031 3. Escalation timing.html
00:00 -
032 4. Julianas story Attention to detail.html
00:00 -
034 1. Wrapup.mp4
00:00 -
035 2. Glossary terms from week 2.html
00:00 -
037 1. Welcome to week 3.mp4
00:00 -
039 2. Stakeholders in cybersecurity.mp4
00:00 -
040 3. The purpose and impact of stakeholders.html
00:00 -
042 1. Clear and concise communication.mp4
00:00 -
044 2. Building blocks of cybersecurity communications.mp4
00:00 -
045 3. Communicate effectively with stakeholders.html
00:00 -
047 1. Visual storytelling in cybersecurity.mp4
00:00 -
048 2. Create visual dashboards for impactful cybersecurity communications.html
00:00 -
050 3. How to create a visual dashboard.mp4
00:00 -
051 4. Julianas story Effective communication.html
00:00 -
053 1. Wrapup.mp4
00:00 -
054 2. Glossary terms from week 3.html
00:00 -
056 1. Welcome to week 4.mp4
00:00 -
058 2. Helpful cybersecurity resources.mp4
00:00 -
059 3. Strategies for engaging with the cybersecurity community.html
00:00 -
061 4. Victoria Continue your learning journey.mp4
00:00 -
063 1. Engage with the cybersecurity community in a meaningful way.mp4
00:00 -
064 2. Connect with other cybersecurity professionals.html
00:00 -
066 3. Sarah Network in the cybersecurity community.mp4
00:00 -
068 1. Wrapup.mp4
00:00 -
069 2. Glossary terms from week 4.html
00:00 -
071 1. Welcome to week 5.mp4
00:00 -
073 2. Find cybersecurity jobs.mp4
00:00 -
075 3. Create a resume.mp4
00:00 -
076 4. Tips for finding and applying for a job.html
00:00 -
077 5. Portfolio Activity Exemplar Create or update a resume.html
00:00 -
079 6. Garvey Cover letter tips.mp4
00:00 -
081 1. Explore the interview process.mp4
00:00 -
082 2. The interview process.html
00:00 -
084 3. Garvey Technical interview tips.mp4
00:00 -
085 4. Prepare for technical interviews.html
00:00 -
087 5. Conduct preinterview research.mp4
00:00 -
089 6. Build rapport with interviewers.mp4
00:00 -
091 1. Use strategies to answer interview questions.mp4
00:00 -
092 2. Apply the STAR method during interviews.html
00:00 -
093 3. Activity Exemplar Use the STAR method to answer interview questions.html
00:00 -
094 4. Prepare for interviews.html
00:00 -
096 5. Ask the interviewer questions.mp4
00:00 -
098 6. Karan Interview tips from a hiring manager.mp4
00:00 -
099 7. Prepare for interviews with Interview Warmup.html
00:00 -
101 1. Develop an elevator pitch.mp4
00:00 -
102 2. Learn more about developing an elevator pitch.html
00:00 -
103 3. Tips for interviewing remotely.html
00:00 -
105 4. Emily Overcome imposter syndrome.mp4
00:00 -
107 1. Wrapup.mp4
00:00 -
108 2. Glossary terms from week 5.html
00:00 -
110 3. Course wrapup.mp4
00:00 -
111 4. Course 8 glossary.html
00:00 -
113 1. Recap of the Google Cybersecurity Certificate program.mp4
00:00 -
115 2. Congratulations on completing the Google Cybersecurity Certificate program.mp4
00:00 -
116 3. Showcase your work.html
00:00 -
117 4. Claim your Google Cybersecurity Certificate badge.html
00:00 -
118 5. Google Cybersecurity Certificate glossary.html
00:00 -
Section Quiz
Earn a certificate
Add this certificate to your resume to demonstrate your skills & increase your chances of getting noticed.