Skip to main content

Recently Updated Pages

Linux architecture

[Completed] Professional Google Cyberse... Linux Basics

Let me start with a quick question that may seem unrelated to security. Do you have a fav...

Updated 1 year ago by naruzkurai

Welcome to week 2; introduction to linux

[Completed] Professional Google Cyberse... Linux Basics

Welcome back! We have another important topic to explore.Previously, you learned aboutoperating s...

Updated 1 year ago by naruzkurai

Wrap-up; Glossary terms from week 1

[Completed] Professional Google Cyberse... All things Operating System

We did it! What a great section of learning! The best thing is that we did this togethe...

Updated 1 year ago by naruzkurai

Ellen: My path into cybersecurity

[Completed] Professional Google Cyberse... All things Operating System

My name is Ellen and I am a security engineering manager at Google focused in on how Google use...

Updated 1 year ago by naruzkurai

The command line in use

[Completed] Professional Google Cyberse... All things Operating System

Previously, you explored graphical user interfaces (GUI) and command-line user interfaces (CLI). ...

Updated 1 year ago by naruzkurai

GUI versus CLI

[Completed] Professional Google Cyberse... All things Operating System

Now that you've learned the inner workings of computers, let's discuss how users and operat...

Updated 1 year ago by naruzkurai

Virtualization technology

[Completed] Professional Google Cyberse... All things Operating System

You've explored a lot about operating systems. One more aspect to consider is that operating syst...

Updated 1 year ago by naruzkurai

Resource allocation via the OS

[Completed] Professional Google Cyberse... All things Operating System

Now we're ready to discuss a different aspect of your operating system. Not only does the...

Updated 1 year ago by naruzkurai

Requests to the operating system

[Completed] Professional Google Cyberse... All things Operating System

Operating systems are a critical component of a computer. They make connections between applicati...

Updated 1 year ago by naruzkurai

Inside the operating system

[Completed] Professional Google Cyberse... All things Operating System

Previously, you learned about what operating systems are. Now, let's discuss how they wor...

Updated 1 year ago by naruzkurai

Compare operating systems

[Completed] Professional Google Cyberse... All things Operating System

You previously explored why operating systems are an important part of how a computer works.  In ...

Updated 1 year ago by naruzkurai

Kim: My journey into computing

[Completed] Professional Google Cyberse... All things Operating System

Hi, I'm Kim. I'm a technical program manager at Google.  I'm currently working in the securi...

Updated 1 year ago by naruzkurai

Welcome to week 1; Introduction to operating systems

[Completed] Professional Google Cyberse... All things Operating System

How many times a week do you use a computer? For some of us, the answer might be "a lot"!...

Updated 1 year ago by naruzkurai

Helpful resources and tips

[Completed] Professional Google Cyberse... All things Operating System

As a learner, you can choose to complete one or multiple courses in this program. However, to obt...

Updated 1 year ago by naruzkurai

Introduction to Course 4

[Completed] Professional Google Cyberse... All things Operating System

Hi! Welcome to this course on computing basics for security. My name is Kim, and I work a...

Updated 1 year ago by naruzkurai

Course wrap-up; Glossary Cybersecurity Course 3

[Completed] Professional Google Cyberse...

Wow, we have covered a lot in this course! Let's review everything we've discussed. You...

Updated 1 year ago by naruzkurai

Cloud Hardening

[Completed] Professional Google Cyberse... Security hardning

Network security in the cloud  In recent years, many organizations are using network servi...

Updated 1 year ago by naruzkurai

tech enthusiest reminder

[Completed] Professional Google Cyberse... getting started & introduction to networks

A hub is a network device that broadcasts information to every device on the network.

Updated 1 year ago by naruzkurai

Network hardening practices

[Completed] Professional Google Cyberse... Security hardning

Earlier, you learned that OS hardening focuses on device safety and uses patch updates, sec...

Updated 1 year ago by naruzkurai

OS hardening practices

[Completed] Professional Google Cyberse... Security hardning

Hi there. In this video, we'll discuss operating system, or OS, hardening and why it's ...

Updated 1 year ago by naruzkurai