Recently Updated Pages
Attacks in the digital age
With the expansion of reliable high-speed internet, the number of computers connected to the inte...
Past cybersecurity attacks
The security industry is constantly evolving, but many present-day attacks are not entirely new. ...
welcome to week 2
Welcome back! When it comes to security, there is so much to learn, and I'm thrilled to be part o...
Wrap-up
Congratulations on completing the first section of this course! Let's quickly review what we've c...
The importance of cybersecurity
As we've discussed, security professionals protect many physical and digital assets. These skills...
Transferable and technical cybersecurity skills
Previously, you learned that cybersecurity analysts need to develop certain core skills to be suc...
Veronica: My path to working in cybersecurity
Hi, I'm Veronica and I'm a security engineer at Google. My journey into cybersecurity has changed...
Core skills for cybersecurity professionals
In this video, we'll discuss both transferable and technical skills that are particularly useful ...
Common cybersecurity terminology
As you’ve learned, cybersecurity (also known as security) is the practice of ensuring confident...
Nikki: A day in the life of a security engineer
My name is Nikki and I'm a security engineer at Google. I am part of the insider threat detection...
Responsibilities of an entry-level cybersecurity analyst
Technology is rapidly changing and so are the tactics and techniques that attackers use. As digit...
Toni: My path to cybersecurity
Hi, I'm Toni, I'm a Security Engineering Manager. Our teams protect Google and its users from ser...
Introduction to cybersecurity
Imagine that you're preparing for a storm. You've received notification that a storm is c...
Welcome to the Google Cybersecurity Certificate
Hello and welcome to the Google Career Certificate focused on cybersecurity. I'm so exc...
Helpful resources and tips
(They made me type my name and some reason to commit, par the usual, I am your god, and i suffer ...
Welcome to week 1
Hi again! Now that you have some idea of what to expect from the program as a...
Course 1 overview
Cybersecurity Certificate. You’ve begun an exciting journey! In this course, you will ...
Google Cybersecurity Certificate overview
Why are skills in cybersecurity in such high demand? The world is undergoing a digital transforma...
Qwiklabs Terms of Service
This Terms of Service Agreement (the “Agreement”), along with the Privacy Policy located at pri...
Coursera Honor Code
All users of learning materials hosted on the Coursera platform are expected to abide by ...