Recently Updated Pages
Glossary terms from Course 3, Week 1
Terms and definitions from Course 3, Week 1 Bandwidth: The maximum data transmission capacity ...
Wrap-up
Hey, you made it! Well done! Let's wrap up what you've learned in this section of the course.We e...
Local and wide network communication
Let's learn about how IP addresses are used to communicate over a network. IP stands for internet...
The four layers of the TCP/IP model
Now that we've discussed the structure of a network and how communications takes place, it's impo...
The TCP/IP model
Hello again. In this video, you'll learn more about communication protocols and devices used to c...
Introduction to network communication
Networks help organizations communicate and connect. But communication makes network attacks more...
Cloud networks
Companies have traditionally owned their network devices, and kept them in their own office build...
Cloud networks
Companies have traditionally owned their network devices, and kept them in their own office build...
Network components, devices, and diagrams
In this section of the course, you will learn about network architecture. Once you have a found...
Network tools
In this video, you'll learn about the common devices that make up a network. Let's get started.A ...
Emmanuel: Useful skills for network security
My name is Emmanuel and I am an offensive security engineer at Google. For offensive security, my...
Tina: Working in network security
My name is Tina and I'm a software engineer at Google. As a software engineer, I work on an inter...
What are networks?
Welcome! Before you can understand the importance of securing a network, you need to know what a ...
Chris: My path to cybersecurity
My name is Chris and I'm the Chief Information Security Officer at Google Fiber. We provide high ...
Welcome to week 1
Before securing a network, you need to understand the basic design of a network and how it functi...
Glossary Cybersecurity
Terms and definitions from the certificateAAbsolute file path: The full file path, which starts f...
Introduction to Course 3 + course 3 overview
Introduction You've learned about security domains in previous courses.Now we'll explore one of ...
Page 1
-Embarrassment means that someone has seen or heard something about you that you didn't want th...
Mod the Cube
Summary : In this exercise, you'll be challenged to modify a provided script to change the behavi...
adressing the formating
as i do courses my formating does change from start to finish, i will attempt to adhear to a stan...