Recently Updated Pages
Welcome to week 1; Introduction to operating systems
How many times a week do you use a computer? For some of us, the answer might be "a lot"!...
Kim: My journey into computing
Hi, I'm Kim. I'm a technical program manager at Google. I'm currently working in the securi...
Compare operating systems
You previously explored why operating systems are an important part of how a computer works. In ...
Inside the operating system
Previously, you learned about what operating systems are. Now, let's discuss how they wor...
Requests to the operating system
Operating systems are a critical component of a computer. They make connections between applicati...
Resource allocation via the OS
Now we're ready to discuss a different aspect of your operating system. Not only does the...
Virtualization technology
You've explored a lot about operating systems. One more aspect to consider is that operating syst...
GUI versus CLI
Now that you've learned the inner workings of computers, let's discuss how users and operat...
The command line in use
Previously, you explored graphical user interfaces (GUI) and command-line user interfaces (CLI). ...
Ellen: My path into cybersecurity
My name is Ellen and I am a security engineering manager at Google focused in on how Google use...
Wrap-up; Glossary terms from week 1
We did it! What a great section of learning! The best thing is that we did this togethe...
Course wrap-up; Glossary Cybersecurity Course 3
Wow, we have covered a lot in this course! Let's review everything we've discussed. You...
Cloud Hardening
Network security in the cloud In recent years, many organizations are using network servi...
tech enthusiest reminder
A hub is a network device that broadcasts information to every device on the network.
Network hardening practices
Earlier, you learned that OS hardening focuses on device safety and uses patch updates, sec...
OS hardening practices
Hi there. In this video, we'll discuss operating system, or OS, hardening and why it's ...
Security hardening Wrap-up & Glossary terms from week 4
Great work on learning about security hardening! Let's take a few minutes to wrap up what...
Kelsey: Cloud security explained
I'm Kelsey, I'm a distinguished engineer at Google Cloud. I work on compute platforms and sec...
Introduction to Course 3 + course 3 overview
Introduction You've learned about security domains in previous courses.Now we'll explore one of ...
Glossary Cybersecurity
Terms and definitions from the certificateAAbsolute file path: The full file path, which starts f...