Recently Updated Pages
Work with files in Python
You previously explored how to open files in Python as well as how to read them and write to them...
Parse a text file in Python
Now that you know how to import text files into Python, we're going to take this one step further...
Import files into Python
Previously, you explored how to open files in Python, convert them into strings, and read them. I...
Access a text file in Python
Security professionals are often tasked with reviewing log files.These files may have thousands o...
Clancy: Continual learning and Python
My name is Clancy and I'm a Senior Security Engineer.My team here at Google is part of an ongoing...
Essential Python components for automation
Throughout this course, you explored coding in Python. You've focused on variables, conditional s...
Automate cybersecurity tasks with Python
Automation is a key concern in the security profession.For example, it would be difficult to moni...
Welcome to module 4
We've learned a lot about Python together already, and we still have more to cover.In this sectio...
Reference guide: Python concepts from module 3; Terms and definitions from Course 7, Module 3
Built-in functions The following built-in functions are commonly used in Python. str() Con...
Wrap-up
Congratulations!We accomplished a lot together.Let's take time to quickly go through all the new ...
More about regular expressions
You were previously introduced to regular expressions and a couple of symbols that you can use to...
Regular expressions in Python
We've already learned a lot about working with strings.This includes working with their positiona...
Lists and the security analyst
Previously, you examined how to use bracket notation to access and change elements in a list and ...
Write a simple algorithm
In our everyday lives, we frequently follow rules for solving problems.As a simple example, imagi...
List operations in Python
Another data type we discussed previously is the list.Lists are useful because they allow you to ...
Strings and the security analyst
The ability to work with strings is important in the cybersecurity profession. Previously, you we...
String indices and slices
In security, there are a variety of reasons we might need to search through a string. F...
String operations
Knowing how to work with the string data in security is important. For example, you mig...
Welcome to module 3
As a security analyst,you'll work with a lot of data.Being able to develop solutions formanaging ...
Glossary terms from module 2
Terms and definitions from Course 7, Module 2 Argument (Python): The data brought into a functio...