[Completed] Professional Google Cybersecurity Specialization C3/8; Connect and Protect: Networks and Network Security
14 hours (approximately)
Grade Achieved: 97.62% pro tip only do the exams when your not tired
getting started & introduction to networks
Introduction to Course 3 + course 3 overview
Introduction You've learned about security domains in previous courses.Now we'll explore one of ...
Glossary Cybersecurity
Terms and definitions from the certificateAAbsolute file path: The full file path, which starts f...
Welcome to week 1
Before securing a network, you need to understand the basic design of a network and how it functi...
Chris: My path to cybersecurity
My name is Chris and I'm the Chief Information Security Officer at Google Fiber. We provide high ...
What are networks?
Welcome! Before you can understand the importance of securing a network, you need to know what a ...
Tina: Working in network security
My name is Tina and I'm a software engineer at Google. As a software engineer, I work on an inter...
Emmanuel: Useful skills for network security
My name is Emmanuel and I am an offensive security engineer at Google. For offensive security, my...
tech enthusiest reminder
A hub is a network device that broadcasts information to every device on the network.
Network tools
In this video, you'll learn about the common devices that make up a network. Let's get started.A ...
Network components, devices, and diagrams
In this section of the course, you will learn about network architecture. Once you have a found...
Cloud networks
Companies have traditionally owned their network devices, and kept them in their own office build...
Cloud networks
Companies have traditionally owned their network devices, and kept them in their own office build...
Network Communication
Introduction to network communication
Networks help organizations communicate and connect. But communication makes network attacks more...
The TCP/IP model
Hello again. In this video, you'll learn more about communication protocols and devices used to c...
The four layers of the TCP/IP model
Now that we've discussed the structure of a network and how communications takes place, it's impo...
Learn more about the TCP/IP model
In this reading, you will build on what you have learned about the Transmission Control Protocol/...
The OSI model
So far in this section of the course, you learned about the components of a network, network devi...
Local and wide network communication
Let's learn about how IP addresses are used to communicate over a network. IP stands for internet...
Components of network layer communication
Components of network layer communication In the reading about the OSI model, you learned about ...
Wrap-up
Hey, you made it! Well done! Let's wrap up what you've learned in this section of the course.We e...
Glossary terms from Course 3, Week 1
Terms and definitions from Course 3, Week 1 Bandwidth: The maximum data transmission capacity ...
Introduction to network protocols
Welcome to week 2, Network potocols
Congratulations on the progress you've made so far!In this section, you'll learn about hownetwo...
Common network protocols
In this section of the course, you learned about network protocols and how they organize communic...
Additional network protocols
In previous readings and videos, you learned how network protocols organize the sending and recei...
Antara: Working in network security
My name is Antara,I work on the Enterprise Infrastructure Protection Team at Google.And our main ...
Wireless protocols, The evolution of wireless security protocols
So far, you've learned abouta variety of network protocols,including communication protocols like...
Firewalls and network security measures
Firewalls and network security measures
In this video, you'll learn about different types of firewalls. These include hardware,...
Virtual private networks (VPNs)
In this video, we're going to discuss how virtual private networks, or VPNs, add securi...
Security zones
In this section, we'll discuss a type of network security feature called a security zone....
Subnetting and CIDR
Earlier in this course, you learned about network segmentation, a security technique that divides...
Proxy servers
Previously, we discussed how firewalls, VPNs, and security zones help to secure networks....
Virtual networks and privacy
This section of the course covered a lot of information about network operations. You reviewed th...
Glossary terms from week 2
Glossary terms from week 2 Terms and definitions from Course 3, Week 2 Address Resolution Proto...
Course 3 resources and citations
Week 1: Network architecture Resources Helpful resources to get started Coursera Code...
Introduction to intrusion tactics
The case for securing networks
Let's start by answering the question, why do we need secure networks? As you've learned,...
Matt: A professional on dealing with attacks
My name's Matt, I'm a chaos specialist at Google. They let us choose our own job titles to be...
Denial of Service (DoS) attacks
Welcome back. In this video, we're going to discuss denial of service attacks. A denial...
Read tcpdump logs
A network protocol analyzer, sometimes called a packet sniffer or a packet analyzer, is a tool de...
Real-life DDoS attack
Previously, you were introduced to Denial of Service (DoS) attacks. You also learned that volumet...
Malicious packet sniffing
In this video, we'll discuss packet sniffing, with a focus on how threat actors may use...
IP Spoofing
Next, let's learn about another kind of network attack called IP spoofing. IP spoofing ...
Overview of interception tactics
In the previous course items, you learned how packet sniffing and IP spoofing are used in network...
Glossary terms from week 3 & wrap-up
Nice job finishing this section! Let's review what you've learned so far. We discussed ...
Security hardning
temp
things to review On-path attack Distributed denial of service attack (DDoS) Denial of servic...
Introduction to security hardening
I want to take a moment to congratulate you on your progress so far. First, you learned a...
OS hardening practices
Hi there. In this video, we'll discuss operating system, or OS, hardening and why it's ...
Brute force attacks and OS hardening
In this reading, you’ll learn about brute force attacks. You’ll consider how vulnerabilities can ...
Network hardening practices
Earlier, you learned that OS hardening focuses on device safety and uses patch updates, sec...
Network security applications
This section of the course covers the topic of network hardening and monitoring. Each device, too...
Kelsey: Cloud security explained
I'm Kelsey, I'm a distinguished engineer at Google Cloud. I work on compute platforms and sec...
Security hardening Wrap-up & Glossary terms from week 4
Great work on learning about security hardening! Let's take a few minutes to wrap up what...
Cloud Hardening
Network security in the cloud In recent years, many organizations are using network servi...
how to read a tcpdump
idk if this is correct but from my research this is what I've figured out An example TCP dump lo...
network hardening
Course wrap-up; Glossary Cybersecurity Course 3
Wow, we have covered a lot in this course! Let's review everything we've discussed. You...