Skip to main content

[Completed] Professional Google Cybersecurity Specialization C4/8;Tools of the Trade: Linux and SQL

Hello, and welcome to Tools of the Trade: Linux and SQL, the fourth course in the Google Cybersecurity Certificate. You're on an exciting journey!

By the end of this course, you will develop a greater understanding of the basics of computing that will support your work as a security analyst. You will learn foundational concepts related to understanding operating systems, communicating with the Linux operating system through commands, and querying databases with Structured Query Language (SQL). These are key concepts in the cybersecurity field and understanding them will help you keep organizations secure.

All things Operating System

Introduction to Course 4

Hi! Welcome to this course on computing basics for security. My name is Kim, and I work a...

Helpful resources and tips

As a learner, you can choose to complete one or multiple courses in this program. However, to obt...

Welcome to week 1; Introduction to operating systems

How many times a week do you use a computer? For some of us, the answer might be "a lot"!...

Kim: My journey into computing

Hi, I'm Kim. I'm a technical program manager at Google.  I'm currently working in the securi...

Compare operating systems

You previously explored why operating systems are an important part of how a computer works.  In ...

Inside the operating system

Previously, you learned about what operating systems are. Now, let's discuss how they wor...

Requests to the operating system

Operating systems are a critical component of a computer. They make connections between applicati...

Resource allocation via the OS

Now we're ready to discuss a different aspect of your operating system. Not only does the...

Virtualization technology

You've explored a lot about operating systems. One more aspect to consider is that operating syst...

GUI versus CLI

Now that you've learned the inner workings of computers, let's discuss how users and operat...

The command line in use

Previously, you explored graphical user interfaces (GUI) and command-line user interfaces (CLI). ...

Ellen: My path into cybersecurity

My name is Ellen and I am a security engineering manager at Google focused in on how Google use...

Wrap-up; Glossary terms from week 1

We did it! What a great section of learning! The best thing is that we did this togethe...

Linux Basics

Welcome to week 2; introduction to linux

Welcome back! We have another important topic to explore.Previously, you learned aboutoperating s...

Linux architecture

Let me start with a quick question that may seem unrelated to security. Do you have a fav...

Linux architecture explained

Understanding the Linux architecture is important for a security analyst. When you understand how...

Linux distributions

Let's learn a little bit more about Linux and what you need to know about this operating sy...

KALI LINUX ™

In this section, we're going to cover a Linux distribution that's widely used in security a...

More Linux distributions

Previously, you were introduced to the different distributions of Linux. This included KALI LINUX...

Package managers for installing applications

Previously, you learned about Linux distributions and that different distributions derive from di...

Vanilla os

i came accross vanilla os in a yt video and it appears to be realy interesting. i quite like gnom...

Nix OS

make page on nix os, alternative to vanilla os?

Resources for completing Linux labs

This course features hands-on lab activities where you’ll have the opportunity to practice Linux ...

Introduction to the shell

Welcome back! In this video, we're going to discuss the Linux shell. This part of the Lin...

Different types of shells

Knowing how to work with Linux shells is an important skill for cybersecurity professionals. Shel...

Input and output in the shell

Hello again! In this video, we're going to learn a little more about the shell and how to c...

Linux basics Wrap-up; Glossary terms from week 2

We've made it to the end of this section. Great work! Let's recap what you've just comp...

stories

linux basics part 2; electric boogalooo

Welcome to week 3; Linux commands via bash the bourne-again shell

Learning to communicate in a new way can be exciting. Maybe you've learned a new language...

Core commands for navigation and reading files

Welcome back. I hope you're learning a lot about how to communicate with the Linux OS. As...

Navigate Linux and read file content

In this reading, you’ll review how to navigate the file system using Linux commands in Bash. You’...

Find what you need with Linux

Now that we covered: pwd, ls, and cd and are familiar with these basic commands for navigat...

Filter content in Linux

In this reading, you’ll continue exploring Linux commands, which can help you filter for the info...

Create and modify directories and files

Let's make some branches! What do I mean by that? Well, in a previous video, we discuss...

Manage directories and files

Previously, you explored how to manage the file system using Linux commands. The following comman...

File permissions and ownership

Hi there. It's great to have you back! Let's continue to learn more about how to work in ...

Permission commands

Previously, you explored file permissions and the commands that you can use to display and change...

File permissions and ownership

Hi there. It's great to have you back! Let's continue to learn more about how to work in ...

Change permissions

Hi there! In the previous video, you learned how to check permissions for a user. In this...

Permission commands

Previously, you explored file permissions and the commands that you can use to display and change...

Add and delete users

Welcome back! In this video, we are going to discuss adding and deleting users. This is r...

Responsible use of sudo

Previously, you explored authorization, authentication, and Linux commands with sudo, useradd, an...

The Linux community

There are so many others just like you who will be using the command line. Linux's popula...

Linux resources

Previously, you were introduced to the Linux community and some resources that exist to help Linu...

Wrap-up; Glossary terms from week 3

Congratulations! You completed another section in this course. Take a minute to think abo...

Damar: My journey into Linux commands

My name is Damar, I'm a security engineer here at Google. I've always wanted to get into cybers...

SQL and Databases

Welcome to week 4; SQL and Databases

In the world of security, diversity is important. Diverse perspectives are often needed t...

Introduction to databases

Our modern world is filled with data and that data almost always guides us in making import...

SQL filtering versus Linux filtering

Previously, you explored the Linux commands that allow you to filter for specific information con...

Adedayo: SQL in cybersecurity

My name is Adedayo, and I'm a Security Engineer at Google. A lot of people think you need to ...

Basic queries

In this video, we're going to be running our very first SQL query! This query will be bas...

Query a database

Previously, you explored how SQL is an important tool in the world of cybersecurity and is essent...

find table name and comumns definintion for SQL and variences

Standard SQL: For databases that support the ANSI SQL standard and have the INFORMATION_SC...

Basic filters on SQL queries

One of the most powerful features of SQL is its ability to filter. In this video, we're g...

The WHERE clause and basic operators

Previously, you focused on how to refine your SQL queries by using the WHERE clause to filter res...

Filter dates and numbers

In this video, we're going to continue using SQL queries and filters, but now we're going t...

Operators for filtering dates and numbers

Previously, you examined operators like less than (<) or greater than (>) and explored how they c...

Filters with AND, OR, and NOT

In the previous lesson, we learned about even more ways to filter queries in SQL to work wi...

More on filters with AND, OR, and NOT

Previously, you explored how to add filters containing the AND, OR, and NOT operators to your SQL...

Join tables in SQL

You've already learned a lot about SQL queries and filters. Nice work! The last concept w...

Types of joins

Welcome back. I hope you enjoyed working on inner joins. In the previous video and exerci...

Compare types of joins

Previously, you explored SQL joins and how to use them to join data from multiple tables when the...

Continuous learning in SQL

You've explored a lot about SQL, including applying filters to SQL queries and joining multiple t...

Wrap-up; Glossary terms from week 4

Congratulations! We've made it together through the end of our focus on SQL. You've put i...

Course wrap-up

You made it to the end of this course! Congratulations—you did it! I hope you are proud...