Recently Updated Pages
Query a database
Previously, you explored how SQL is an important tool in the world of cybersecurity and is essent...
Basic queries
In this video, we're going to be running our very first SQL query! This query will be bas...
Adedayo: SQL in cybersecurity
My name is Adedayo, and I'm a Security Engineer at Google. A lot of people think you need to ...
SQL filtering versus Linux filtering
Previously, you explored the Linux commands that allow you to filter for specific information con...
Introduction to databases
Our modern world is filled with data and that data almost always guides us in making import...
Welcome to week 4; SQL and Databases
In the world of security, diversity is important. Diverse perspectives are often needed t...
Damar: My journey into Linux commands
My name is Damar, I'm a security engineer here at Google. I've always wanted to get into cybers...
Wrap-up; Glossary terms from week 3
Congratulations! You completed another section in this course. Take a minute to think abo...
Linux resources
Previously, you were introduced to the Linux community and some resources that exist to help Linu...
The Linux community
There are so many others just like you who will be using the command line. Linux's popula...
Responsible use of sudo
Previously, you explored authorization, authentication, and Linux commands with sudo, useradd, an...
Add and delete users
Welcome back! In this video, we are going to discuss adding and deleting users. This is r...
Permission commands
Previously, you explored file permissions and the commands that you can use to display and change...
Change permissions
Hi there! In the previous video, you learned how to check permissions for a user. In this...
File permissions and ownership
Hi there. It's great to have you back! Let's continue to learn more about how to work in ...
Permission commands
Previously, you explored file permissions and the commands that you can use to display and change...
File permissions and ownership
Hi there. It's great to have you back! Let's continue to learn more about how to work in ...
Manage directories and files
Previously, you explored how to manage the file system using Linux commands. The following comman...
Binary
You might be wondering how are computers get these ones and zeros? It's a pretty ...
Supplemental Reading for CPU architecture
To learn more about the differences between 32-bit and 64-bit CPU architecture, click here for ...