module 3
Welcome to module 3
As a security analyst,you'll work with a lot of data.Being able to develop solutions formanaging ...
String operations
Knowing how to work with the string data in security is important. For example, you mig...
String indices and slices
In security, there are a variety of reasons we might need to search through a string. F...
Strings and the security analyst
The ability to work with strings is important in the cybersecurity profession. Previously, you we...
List operations in Python
Another data type we discussed previously is the list.Lists are useful because they allow you to ...
Write a simple algorithm
In our everyday lives, we frequently follow rules for solving problems.As a simple example, imagi...
Lists and the security analyst
Previously, you examined how to use bracket notation to access and change elements in a list and ...
Regular expressions in Python
We've already learned a lot about working with strings.This includes working with their positiona...
More about regular expressions
You were previously introduced to regular expressions and a couple of symbols that you can use to...
Wrap-up
Congratulations!We accomplished a lot together.Let's take time to quickly go through all the new ...
Reference guide: Python concepts from module 3; Terms and definitions from Course 7, Module 3
Built-in functions The following built-in functions are commonly used in Python. str() Con...