Skip to main content

[Completed] Professional Google Cybersecurity Specialization C3/8; Connect and Protect: Networks and Network Security

14 hours (approximately)
Grade Achieved: 97.62% pro tip only do the exams when your not tired

getting started & introduction to networks

Introduction to Course 3 + course 3 overview

Introduction You've learned about security domains in previous courses.Now we'll explore one of ...

Glossary Cybersecurity

Terms and definitions from the certificateAAbsolute file path: The full file path, which starts f...

Welcome to week 1

Before securing a network, you need to understand the basic design of a network and how it functi...

Chris: My path to cybersecurity

My name is Chris and I'm the Chief Information Security Officer at Google Fiber. We provide high ...

What are networks?

Welcome! Before you can understand the importance of securing a network, you need to know what a ...

Tina: Working in network security

My name is Tina and I'm a software engineer at Google. As a software engineer, I work on an inter...

Emmanuel: Useful skills for network security

My name is Emmanuel and I am an offensive security engineer at Google. For offensive security, my...

tech enthusiest reminder

A hub is a network device that broadcasts information to every device on the network.

Network tools

In this video, you'll learn about the common devices that make up a network. Let's get started.A ...

Network components, devices, and diagrams

In this section of the course, you will learn about network architecture.  Once you have a found...

Cloud networks

Companies have traditionally owned their network devices, and kept them in their own office build...

Cloud networks

Companies have traditionally owned their network devices, and kept them in their own office build...

Network Communication

Introduction to network protocols

Firewalls and network security measures

Introduction to intrusion tactics

Security hardning

how to read a tcpdump

idk if this is correct but from my research this is what I've figured out An example TCP dump lo...

network hardening

Course wrap-up; Glossary Cybersecurity Course 3

Wow, we have covered a lot in this course! Let's review everything we've discussed. You...