Skip to main content

[Completed] Professional Google Cybersecurity Specialization C7/8; Automate Cybersecurity Tasks with Python

module 1

Crouse Outline ?

You will get an introduction to the Python programming language and how Python is used in cyberse...

Introduction to Course 7

The demand for security professionals has never been higher.Organizations across the world requir...

Ángel: My personal career journey

My name is Ángel, and I'm a Security Engineer at Google.There were a number of things in my life ...

Welcome to module 1

The process of learning a new programming language is similar to learning a new language.For inst...

Python and cybersecurity

Security professionals use a variety of tools.One of those tools is computer programming.Programm...

Get to know Python!

Why might a security analyst choose Python to automate tasks?  Python resembles human language a...

Create a basic Python script

Hi there.Previously, we discussed the basics of Python.Now we'll practice writing and running cod...

Python environments

You can run Python through a variety of environments. These environments include notebooks, integ...

copy paste this into a .html this is what the lab looks like

<!DOCTYPE html> <html> <head><meta charset="utf-8" /> <title>LAB_Activity_PracticeWritingPyt...

Akash: Python and the cybersecurity professional

My name is Akash, and I work as a Security Engineer at Google.As a cybersecurity engineer, you wo...

Data types in Python

Our next topic relates to categorizing data in Python.First, let's take a moment to consider anot...

More about data types

Previously, you explored data types in Python. A data type is a category for a particular type of...

Work with variables in Python

Previously, we compared data types to the categories we have for different ingredients we use whe...

Assign and reassign variables in Python

Previously, you've explored variables and how to assign and reassign them in Python. In this read...

lab 2

like the other lab copy/paste the code into a .html then run it, still not sure how to host .html...

Conditional statements in Python

Previously, we discussed how to store different data types in variables.Now we'll begin to move i...

More on conditionals in Python

Previously, you explored conditional statements and how they’re useful in automating tasks in P...

For loops

We just learned about conditional statements and how they can be developed to allow computers to ...

While loops

Previously, we introduced iterative statements in Python and focused on for loops.An iterative st...

More on loops in Python

Previously, you explored iterative statements. An iterative statement is code that repeatedly exe...

New Page

Activity_Create loops /*! * * Twitter Bootstrap * */ /*! * Bootstrap v3.3.7 (http://ge...

Wrap-up

Well done!You've learned about why security analysts use Python and the basic structure of a prog...

Reference guide: Python concepts from module 1

This reference guide contains Python language introduced during module 1. The guide is organized ...

Glossary terms from module 1

Terms and definitions from Course 7, Module 1 Automation: The use of technology to reduce human ...

module 2

Welcome to module 2

Welcome back to our Python journey!In the previous videos, we learned all about the basics of Pyt...

Python functions in cybersecurity

Previously, you explored how to define and call your own functions. In this reading, you’ll rev...

Introduction to functions

As the complexity of our programs grow, it's also likely that we'll reuse the same lines of code....

Create a basic function

Let's start our exploration of user-defined functions by creating and then running a very simple ...

Use parameters in functions

Previously, we defined and called our first function.It didn't require any information from outsi...

Return statements

We previously learned how we can pass arguments into a function.We can do more than pass informat...

Functions and variables

Previously, you focused on working with multiple parameters and arguments in functions and return...

Explore built-in functions

Now that we know how to create our own functions, let's also explore a few of Python's built-in f...

Work with built-in functions

Previously, you explored built-in functions in Python, including print(), type(), max(), and sort...

Activity: Define and call a function

Introduction As a security analyst, when you're writing out Python code to automate a certai...

Modules and libraries

Hello again!Previously, we learned about built-in functions in Python.Built-in functions come sta...

Import modules and libraries in Python

Previously, you explored libraries and modules. You learned that a module is a Python file that c...

Code readability

Welcome back!One of the advantages to programming in Python is that it's a very readable language...

Ensure proper syntax and readability in Python

Previously, you were introduced to the PEP 8 style guide and its stylistic guidelines for program...

Dorsa: Use Python efficiently on a cybersecurity team

Hi, my name is Dorsa and I'm a security engineer.What I love the most about my job is that I get ...

Wrap-up; Reference guide: Python concepts from module 2

Great work on making it this far in the Python course!You've put in a lot of work and effort towa...

Glossary terms from module 2

Terms and definitions from Course 7, Module 2 Argument (Python): The data brought into a functio...

module 3

module 4 (36% of the course lmfao)

Welcome to module 4

We've learned a lot about Python together already, and we still have more to cover.In this sectio...

Automate cybersecurity tasks with Python

Automation is a key concern in the security profession.For example, it would be difficult to moni...

Essential Python components for automation

Throughout this course, you explored coding in Python. You've focused on variables, conditional s...

Clancy: Continual learning and Python

My name is Clancy and I'm a Senior Security Engineer.My team here at Google is part of an ongoing...

Access a text file in Python

Security professionals are often tasked with reviewing log files.These files may have thousands o...

Import files into Python

Previously, you explored how to open files in Python, convert them into strings, and read them. I...

Parse a text file in Python

Now that you know how to import text files into Python, we're going to take this one step further...

Work with files in Python

You previously explored how to open files in Python as well as how to read them and write to them...

Develop a parsing algorithm in Python

We're now going to bring all of the pieces together to import a file, parse it, and implement a s...

Portfoleo project: Algorythm for file updates in Python

Algorithm for file updates in Python Project description this script automates management of an...

Debugging strategies

As a security analyst, you might be required to read or write code.One of the biggest challenges ...

Matt: Learning from mistakes

My name is Matt.I'm a software engineer working in cybersecurity.When I was in high school, what ...

Apply debugging strategies

Let's say our co-workers need some help getting their code to work, and we've offered to debug th...

Explore debugging techniques

Previously, you examined three types of errors you may encounter while working in Python and expl...

Wrap-up

Great work in this section!We focused on a few new topics that will help you put Python into prac...

Reference guide: Python concepts from module 4

File operations The following functions, methods, and keywords are used with operations involvin...

Terms and definitions from Course 7, Module 4

Glossary terms from module 4 Automation: The use of technology to reduce human and manual effort...

Course wrap-up

As we wrap up this course, I want to congratulate you for your commitment to learning Python.You ...

Reference guide: Python concepts from Course 7

Google Cybersecurity Certificate   Comments The following syntax is used to create a comment...

Terms and definitions from Course 7

A Algorithm: A set of rules that solve a problem Argument (Python): The data brought into a f...