[Completed] Professional Google Cybersecurity Specialization C7/8; Automate Cybersecurity Tasks with Python
module 1
Crouse Outline ?
You will get an introduction to the Python programming language and how Python is used in cyberse...
Introduction to Course 7
The demand for security professionals has never been higher.Organizations across the world requir...
Ángel: My personal career journey
My name is Ángel, and I'm a Security Engineer at Google.There were a number of things in my life ...
Welcome to module 1
The process of learning a new programming language is similar to learning a new language.For inst...
Python and cybersecurity
Security professionals use a variety of tools.One of those tools is computer programming.Programm...
Get to know Python!
Why might a security analyst choose Python to automate tasks? Python resembles human language a...
Create a basic Python script
Hi there.Previously, we discussed the basics of Python.Now we'll practice writing and running cod...
Python environments
You can run Python through a variety of environments. These environments include notebooks, integ...
copy paste this into a .html this is what the lab looks like
<!DOCTYPE html> <html> <head><meta charset="utf-8" /> <title>LAB_Activity_PracticeWritingPyt...
Akash: Python and the cybersecurity professional
My name is Akash, and I work as a Security Engineer at Google.As a cybersecurity engineer, you wo...
Data types in Python
Our next topic relates to categorizing data in Python.First, let's take a moment to consider anot...
More about data types
Previously, you explored data types in Python. A data type is a category for a particular type of...
Work with variables in Python
Previously, we compared data types to the categories we have for different ingredients we use whe...
Assign and reassign variables in Python
Previously, you've explored variables and how to assign and reassign them in Python. In this read...
lab 2
like the other lab copy/paste the code into a .html then run it, still not sure how to host .html...
Conditional statements in Python
Previously, we discussed how to store different data types in variables.Now we'll begin to move i...
More on conditionals in Python
Previously, you explored conditional statements and how they’re useful in automating tasks in P...
For loops
We just learned about conditional statements and how they can be developed to allow computers to ...
While loops
Previously, we introduced iterative statements in Python and focused on for loops.An iterative st...
More on loops in Python
Previously, you explored iterative statements. An iterative statement is code that repeatedly exe...
New Page
Activity_Create loops /*! * * Twitter Bootstrap * */ /*! * Bootstrap v3.3.7 (http://ge...
Wrap-up
Well done!You've learned about why security analysts use Python and the basic structure of a prog...
Reference guide: Python concepts from module 1
This reference guide contains Python language introduced during module 1. The guide is organized ...
Glossary terms from module 1
Terms and definitions from Course 7, Module 1 Automation: The use of technology to reduce human ...
module 2
Welcome to module 2
Welcome back to our Python journey!In the previous videos, we learned all about the basics of Pyt...
Python functions in cybersecurity
Previously, you explored how to define and call your own functions. In this reading, you’ll rev...
Introduction to functions
As the complexity of our programs grow, it's also likely that we'll reuse the same lines of code....
Create a basic function
Let's start our exploration of user-defined functions by creating and then running a very simple ...
Use parameters in functions
Previously, we defined and called our first function.It didn't require any information from outsi...
Return statements
We previously learned how we can pass arguments into a function.We can do more than pass informat...
Functions and variables
Previously, you focused on working with multiple parameters and arguments in functions and return...
Explore built-in functions
Now that we know how to create our own functions, let's also explore a few of Python's built-in f...
Work with built-in functions
Previously, you explored built-in functions in Python, including print(), type(), max(), and sort...
Activity: Define and call a function
Introduction As a security analyst, when you're writing out Python code to automate a certai...
Modules and libraries
Hello again!Previously, we learned about built-in functions in Python.Built-in functions come sta...
Import modules and libraries in Python
Previously, you explored libraries and modules. You learned that a module is a Python file that c...
Code readability
Welcome back!One of the advantages to programming in Python is that it's a very readable language...
Ensure proper syntax and readability in Python
Previously, you were introduced to the PEP 8 style guide and its stylistic guidelines for program...
Dorsa: Use Python efficiently on a cybersecurity team
Hi, my name is Dorsa and I'm a security engineer.What I love the most about my job is that I get ...
Wrap-up; Reference guide: Python concepts from module 2
Great work on making it this far in the Python course!You've put in a lot of work and effort towa...
Glossary terms from module 2
Terms and definitions from Course 7, Module 2 Argument (Python): The data brought into a functio...
module 3
Welcome to module 3
As a security analyst,you'll work with a lot of data.Being able to develop solutions formanaging ...
String operations
Knowing how to work with the string data in security is important. For example, you mig...
String indices and slices
In security, there are a variety of reasons we might need to search through a string. F...
Strings and the security analyst
The ability to work with strings is important in the cybersecurity profession. Previously, you we...
List operations in Python
Another data type we discussed previously is the list.Lists are useful because they allow you to ...
Write a simple algorithm
In our everyday lives, we frequently follow rules for solving problems.As a simple example, imagi...
Lists and the security analyst
Previously, you examined how to use bracket notation to access and change elements in a list and ...
Regular expressions in Python
We've already learned a lot about working with strings.This includes working with their positiona...
More about regular expressions
You were previously introduced to regular expressions and a couple of symbols that you can use to...
Wrap-up
Congratulations!We accomplished a lot together.Let's take time to quickly go through all the new ...
Reference guide: Python concepts from module 3; Terms and definitions from Course 7, Module 3
Built-in functions The following built-in functions are commonly used in Python. str() Con...
module 4 (36% of the course lmfao)
Welcome to module 4
We've learned a lot about Python together already, and we still have more to cover.In this sectio...
Automate cybersecurity tasks with Python
Automation is a key concern in the security profession.For example, it would be difficult to moni...
Essential Python components for automation
Throughout this course, you explored coding in Python. You've focused on variables, conditional s...
Clancy: Continual learning and Python
My name is Clancy and I'm a Senior Security Engineer.My team here at Google is part of an ongoing...
Access a text file in Python
Security professionals are often tasked with reviewing log files.These files may have thousands o...
Import files into Python
Previously, you explored how to open files in Python, convert them into strings, and read them. I...
Parse a text file in Python
Now that you know how to import text files into Python, we're going to take this one step further...
Work with files in Python
You previously explored how to open files in Python as well as how to read them and write to them...
Develop a parsing algorithm in Python
We're now going to bring all of the pieces together to import a file, parse it, and implement a s...
Portfoleo project: Algorythm for file updates in Python
Algorithm for file updates in Python Project description this script automates management of an...
Debugging strategies
As a security analyst, you might be required to read or write code.One of the biggest challenges ...
Matt: Learning from mistakes
My name is Matt.I'm a software engineer working in cybersecurity.When I was in high school, what ...
Apply debugging strategies
Let's say our co-workers need some help getting their code to work, and we've offered to debug th...
Explore debugging techniques
Previously, you examined three types of errors you may encounter while working in Python and expl...
Wrap-up
Great work in this section!We focused on a few new topics that will help you put Python into prac...
Reference guide: Python concepts from module 4
File operations The following functions, methods, and keywords are used with operations involvin...
Terms and definitions from Course 7, Module 4
Glossary terms from module 4 Automation: The use of technology to reduce human and manual effort...
Course wrap-up
As we wrap up this course, I want to congratulate you for your commitment to learning Python.You ...
Reference guide: Python concepts from Course 7
Google Cybersecurity Certificate Comments The following syntax is used to create a comment...
Terms and definitions from Course 7
A Algorithm: A set of rules that solve a problem Argument (Python): The data brought into a f...