[Completed] Professional Google Cybersecurity Specialization C4/8;Tools of the Trade: Linux and SQL
Hello, and welcome to Tools of the Trade: Linux and SQL, the fourth course in the Google Cybersecurity Certificate. You're on an exciting journey!
By the end of this course, you will develop a greater understanding of the basics of computing that will support your work as a security analyst. You will learn foundational concepts related to understanding operating systems, communicating with the Linux operating system through commands, and querying databases with Structured Query Language (SQL). These are key concepts in the cybersecurity field and understanding them will help you keep organizations secure.
All things Operating System
Introduction to Course 4
Hi! Welcome to this course on computing basics for security. My name is Kim, and I work a...
Helpful resources and tips
As a learner, you can choose to complete one or multiple courses in this program. However, to obt...
Welcome to week 1; Introduction to operating systems
How many times a week do you use a computer? For some of us, the answer might be "a lot"!...
Kim: My journey into computing
Hi, I'm Kim. I'm a technical program manager at Google. I'm currently working in the securi...
Compare operating systems
You previously explored why operating systems are an important part of how a computer works. In ...
Inside the operating system
Previously, you learned about what operating systems are. Now, let's discuss how they wor...
Requests to the operating system
Operating systems are a critical component of a computer. They make connections between applicati...
Resource allocation via the OS
Now we're ready to discuss a different aspect of your operating system. Not only does the...
Virtualization technology
You've explored a lot about operating systems. One more aspect to consider is that operating syst...
GUI versus CLI
Now that you've learned the inner workings of computers, let's discuss how users and operat...
The command line in use
Previously, you explored graphical user interfaces (GUI) and command-line user interfaces (CLI). ...
Ellen: My path into cybersecurity
My name is Ellen and I am a security engineering manager at Google focused in on how Google use...
Wrap-up; Glossary terms from week 1
We did it! What a great section of learning! The best thing is that we did this togethe...
Linux Basics
Welcome to week 2; introduction to linux
Welcome back! We have another important topic to explore.Previously, you learned aboutoperating s...
Linux architecture
Let me start with a quick question that may seem unrelated to security. Do you have a fav...
Linux architecture explained
Understanding the Linux architecture is important for a security analyst. When you understand how...
Linux distributions
Let's learn a little bit more about Linux and what you need to know about this operating sy...
KALI LINUX ™
In this section, we're going to cover a Linux distribution that's widely used in security a...
More Linux distributions
Previously, you were introduced to the different distributions of Linux. This included KALI LINUX...
Package managers for installing applications
Previously, you learned about Linux distributions and that different distributions derive from di...
Vanilla os
i came accross vanilla os in a yt video and it appears to be realy interesting. i quite like gnom...
Nix OS
make page on nix os, alternative to vanilla os?
Resources for completing Linux labs
This course features hands-on lab activities where you’ll have the opportunity to practice Linux ...
Introduction to the shell
Welcome back! In this video, we're going to discuss the Linux shell. This part of the Lin...
Different types of shells
Knowing how to work with Linux shells is an important skill for cybersecurity professionals. Shel...
Input and output in the shell
Hello again! In this video, we're going to learn a little more about the shell and how to c...
Linux basics Wrap-up; Glossary terms from week 2
We've made it to the end of this section. Great work! Let's recap what you've just comp...
stories
linux basics part 2; electric boogalooo
Welcome to week 3; Linux commands via bash the bourne-again shell
Learning to communicate in a new way can be exciting. Maybe you've learned a new language...
Core commands for navigation and reading files
Welcome back. I hope you're learning a lot about how to communicate with the Linux OS. As...
Navigate Linux and read file content
In this reading, you’ll review how to navigate the file system using Linux commands in Bash. You’...
Find what you need with Linux
Now that we covered: pwd, ls, and cd and are familiar with these basic commands for navigat...
Filter content in Linux
In this reading, you’ll continue exploring Linux commands, which can help you filter for the info...
Create and modify directories and files
Let's make some branches! What do I mean by that? Well, in a previous video, we discuss...
Manage directories and files
Previously, you explored how to manage the file system using Linux commands. The following comman...
File permissions and ownership
Hi there. It's great to have you back! Let's continue to learn more about how to work in ...
Permission commands
Previously, you explored file permissions and the commands that you can use to display and change...
File permissions and ownership
Hi there. It's great to have you back! Let's continue to learn more about how to work in ...
Change permissions
Hi there! In the previous video, you learned how to check permissions for a user. In this...
Permission commands
Previously, you explored file permissions and the commands that you can use to display and change...
Add and delete users
Welcome back! In this video, we are going to discuss adding and deleting users. This is r...
Responsible use of sudo
Previously, you explored authorization, authentication, and Linux commands with sudo, useradd, an...
The Linux community
There are so many others just like you who will be using the command line. Linux's popula...
Linux resources
Previously, you were introduced to the Linux community and some resources that exist to help Linu...
Wrap-up; Glossary terms from week 3
Congratulations! You completed another section in this course. Take a minute to think abo...
Damar: My journey into Linux commands
My name is Damar, I'm a security engineer here at Google. I've always wanted to get into cybers...
SQL and Databases
Welcome to week 4; SQL and Databases
In the world of security, diversity is important. Diverse perspectives are often needed t...
Introduction to databases
Our modern world is filled with data and that data almost always guides us in making import...
SQL filtering versus Linux filtering
Previously, you explored the Linux commands that allow you to filter for specific information con...
Adedayo: SQL in cybersecurity
My name is Adedayo, and I'm a Security Engineer at Google. A lot of people think you need to ...
Basic queries
In this video, we're going to be running our very first SQL query! This query will be bas...
Query a database
Previously, you explored how SQL is an important tool in the world of cybersecurity and is essent...
find table name and comumns definintion for SQL and variences
Standard SQL: For databases that support the ANSI SQL standard and have the INFORMATION_SC...
Basic filters on SQL queries
One of the most powerful features of SQL is its ability to filter. In this video, we're g...
The WHERE clause and basic operators
Previously, you focused on how to refine your SQL queries by using the WHERE clause to filter res...
Filter dates and numbers
In this video, we're going to continue using SQL queries and filters, but now we're going t...
Operators for filtering dates and numbers
Previously, you examined operators like less than (<) or greater than (>) and explored how they c...
Filters with AND, OR, and NOT
In the previous lesson, we learned about even more ways to filter queries in SQL to work wi...
More on filters with AND, OR, and NOT
Previously, you explored how to add filters containing the AND, OR, and NOT operators to your SQL...
Join tables in SQL
You've already learned a lot about SQL queries and filters. Nice work! The last concept w...
Types of joins
Welcome back. I hope you enjoyed working on inner joins. In the previous video and exerci...
Compare types of joins
Previously, you explored SQL joins and how to use them to join data from multiple tables when the...
Continuous learning in SQL
You've explored a lot about SQL, including applying filters to SQL queries and joining multiple t...
Wrap-up; Glossary terms from week 4
Congratulations! We've made it together through the end of our focus on SQL. You've put i...
Course wrap-up
You made it to the end of this course! Congratulations—you did it! I hope you are proud...