Skip to main content

Recently Updated Pages

Explore debugging techniques

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Previously, you examined three types of errors you may encounter while working in Python and expl...

Updated 10 months ago by naruzkurai

Apply debugging strategies

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Let's say our co-workers need some help getting their code to work, and we've offered to debug th...

Updated 10 months ago by naruzkurai

Matt: Learning from mistakes

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

My name is Matt.I'm a software engineer working in cybersecurity.When I was in high school, what ...

Updated 10 months ago by naruzkurai

Debugging strategies

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

As a security analyst, you might be required to read or write code.One of the biggest challenges ...

Updated 10 months ago by naruzkurai

Portfoleo project: Algorythm for file updates in Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Algorithm for file updates in Python Project description this script automates management of an...

Updated 10 months ago by naruzkurai

Develop a parsing algorithm in Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

We're now going to bring all of the pieces together to import a file, parse it, and implement a s...

Updated 10 months ago by naruzkurai

Work with files in Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

You previously explored how to open files in Python as well as how to read them and write to them...

Updated 10 months ago by naruzkurai

Parse a text file in Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Now that you know how to import text files into Python, we're going to take this one step further...

Updated 10 months ago by naruzkurai

Import files into Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Previously, you explored how to open files in Python, convert them into strings, and read them. I...

Updated 10 months ago by naruzkurai

Access a text file in Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Security professionals are often tasked with reviewing log files.These files may have thousands o...

Updated 10 months ago by naruzkurai

Clancy: Continual learning and Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

My name is Clancy and I'm a Senior Security Engineer.My team here at Google is part of an ongoing...

Updated 10 months ago by naruzkurai

Essential Python components for automation

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Throughout this course, you explored coding in Python. You've focused on variables, conditional s...

Updated 10 months ago by naruzkurai

Automate cybersecurity tasks with Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Automation is a key concern in the security profession.For example, it would be difficult to moni...

Updated 10 months ago by naruzkurai

Welcome to module 4

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

We've learned a lot about Python together already, and we still have more to cover.In this sectio...

Updated 10 months ago by naruzkurai

Reference guide: Python concepts from module 3; Terms and definitions from Course 7, Module 3

[Completed] Professional Google Cyberse... module 3

Built-in functions The following built-in functions are commonly used in Python. str() Con...

Updated 10 months ago by naruzkurai

Wrap-up

[Completed] Professional Google Cyberse... module 3

Congratulations!We accomplished a lot together.Let's take time to quickly go through all the new ...

Updated 10 months ago by naruzkurai

More about regular expressions

[Completed] Professional Google Cyberse... module 3

You were previously introduced to regular expressions and a couple of symbols that you can use to...

Updated 10 months ago by naruzkurai

Regular expressions in Python

[Completed] Professional Google Cyberse... module 3

We've already learned a lot about working with strings.This includes working with their positiona...

Updated 10 months ago by naruzkurai

Lists and the security analyst

[Completed] Professional Google Cyberse... module 3

Previously, you examined how to use bracket notation to access and change elements in a list and ...

Updated 10 months ago by naruzkurai

Write a simple algorithm

[Completed] Professional Google Cyberse... module 3

In our everyday lives, we frequently follow rules for solving problems.As a simple example, imagi...

Updated 10 months ago by naruzkurai