Skip to main content

Recently Updated Pages

Explore debugging techniques

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Previously, you examined three types of errors you may encounter while working in Python and expl...

Updated 9 months ago by naruzkurai

Apply debugging strategies

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Let's say our co-workers need some help getting their code to work, and we've offered to debug th...

Updated 9 months ago by naruzkurai

Matt: Learning from mistakes

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

My name is Matt.I'm a software engineer working in cybersecurity.When I was in high school, what ...

Updated 9 months ago by naruzkurai

Debugging strategies

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

As a security analyst, you might be required to read or write code.One of the biggest challenges ...

Updated 9 months ago by naruzkurai

Portfoleo project: Algorythm for file updates in Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Algorithm for file updates in Python Project description this script automates management of an...

Updated 9 months ago by naruzkurai

Develop a parsing algorithm in Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

We're now going to bring all of the pieces together to import a file, parse it, and implement a s...

Updated 9 months ago by naruzkurai

Work with files in Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

You previously explored how to open files in Python as well as how to read them and write to them...

Updated 9 months ago by naruzkurai

Parse a text file in Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Now that you know how to import text files into Python, we're going to take this one step further...

Updated 9 months ago by naruzkurai

Import files into Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Previously, you explored how to open files in Python, convert them into strings, and read them. I...

Updated 9 months ago by naruzkurai

Access a text file in Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Security professionals are often tasked with reviewing log files.These files may have thousands o...

Updated 9 months ago by naruzkurai

Clancy: Continual learning and Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

My name is Clancy and I'm a Senior Security Engineer.My team here at Google is part of an ongoing...

Updated 9 months ago by naruzkurai

Essential Python components for automation

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Throughout this course, you explored coding in Python. You've focused on variables, conditional s...

Updated 9 months ago by naruzkurai

Automate cybersecurity tasks with Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Automation is a key concern in the security profession.For example, it would be difficult to moni...

Updated 9 months ago by naruzkurai

Welcome to module 4

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

We've learned a lot about Python together already, and we still have more to cover.In this sectio...

Updated 9 months ago by naruzkurai

Reference guide: Python concepts from module 3; Terms and definitions from Course 7, Module 3

[Completed] Professional Google Cyberse... module 3

Built-in functions The following built-in functions are commonly used in Python. str() Con...

Updated 9 months ago by naruzkurai

Wrap-up

[Completed] Professional Google Cyberse... module 3

Congratulations!We accomplished a lot together.Let's take time to quickly go through all the new ...

Updated 9 months ago by naruzkurai

More about regular expressions

[Completed] Professional Google Cyberse... module 3

You were previously introduced to regular expressions and a couple of symbols that you can use to...

Updated 9 months ago by naruzkurai

Regular expressions in Python

[Completed] Professional Google Cyberse... module 3

We've already learned a lot about working with strings.This includes working with their positiona...

Updated 9 months ago by naruzkurai

Lists and the security analyst

[Completed] Professional Google Cyberse... module 3

Previously, you examined how to use bracket notation to access and change elements in a list and ...

Updated 9 months ago by naruzkurai

Write a simple algorithm

[Completed] Professional Google Cyberse... module 3

In our everyday lives, we frequently follow rules for solving problems.As a simple example, imagi...

Updated 9 months ago by naruzkurai