Recently Updated Pages
Linux architecture
Let me start with a quick question that may seem unrelated to security. Do you have a fav...
Welcome to week 2; introduction to linux
Welcome back! We have another important topic to explore.Previously, you learned aboutoperating s...
Wrap-up; Glossary terms from week 1
We did it! What a great section of learning! The best thing is that we did this togethe...
Ellen: My path into cybersecurity
My name is Ellen and I am a security engineering manager at Google focused in on how Google use...
The command line in use
Previously, you explored graphical user interfaces (GUI) and command-line user interfaces (CLI). ...
GUI versus CLI
Now that you've learned the inner workings of computers, let's discuss how users and operat...
Virtualization technology
You've explored a lot about operating systems. One more aspect to consider is that operating syst...
Resource allocation via the OS
Now we're ready to discuss a different aspect of your operating system. Not only does the...
Requests to the operating system
Operating systems are a critical component of a computer. They make connections between applicati...
Inside the operating system
Previously, you learned about what operating systems are. Now, let's discuss how they wor...
Compare operating systems
You previously explored why operating systems are an important part of how a computer works. In ...
Kim: My journey into computing
Hi, I'm Kim. I'm a technical program manager at Google. I'm currently working in the securi...
Welcome to week 1; Introduction to operating systems
How many times a week do you use a computer? For some of us, the answer might be "a lot"!...
Helpful resources and tips
As a learner, you can choose to complete one or multiple courses in this program. However, to obt...
Introduction to Course 4
Hi! Welcome to this course on computing basics for security. My name is Kim, and I work a...
Course wrap-up; Glossary Cybersecurity Course 3
Wow, we have covered a lot in this course! Let's review everything we've discussed. You...
Cloud Hardening
Network security in the cloud In recent years, many organizations are using network servi...
tech enthusiest reminder
A hub is a network device that broadcasts information to every device on the network.
Network hardening practices
Earlier, you learned that OS hardening focuses on device safety and uses patch updates, sec...
OS hardening practices
Hi there. In this video, we'll discuss operating system, or OS, hardening and why it's ...