Skip to main content

Recently Updated Pages

List operations in Python

[Completed] Professional Google Cyberse... module 3

Another data type we discussed previously is the list.Lists are useful because they allow you to ...

Updated 10 months ago by naruzkurai

Strings and the security analyst

[Completed] Professional Google Cyberse... module 3

The ability to work with strings is important in the cybersecurity profession. Previously, you we...

Updated 10 months ago by naruzkurai

String indices and slices

[Completed] Professional Google Cyberse... module 3

In security, there are a variety of reasons we might need to search through a string. F...

Updated 10 months ago by naruzkurai

String operations

[Completed] Professional Google Cyberse... module 3

Knowing how to work with the string data in security is important. For example, you mig...

Updated 10 months ago by naruzkurai

Welcome to module 3

[Completed] Professional Google Cyberse... module 3

As a security analyst,you'll work with a lot of data.Being able to develop solutions formanaging ...

Updated 10 months ago by naruzkurai

Glossary terms from module 2

[Completed] Professional Google Cyberse... module 2

Terms and definitions from Course 7, Module 2 Argument (Python): The data brought into a functio...

Updated 10 months ago by naruzkurai

Wrap-up; Reference guide: Python concepts from module 2

[Completed] Professional Google Cyberse... module 2

Great work on making it this far in the Python course!You've put in a lot of work and effort towa...

Updated 10 months ago by naruzkurai

Dorsa: Use Python efficiently on a cybersecurity team

[Completed] Professional Google Cyberse... module 2

Hi, my name is Dorsa and I'm a security engineer.What I love the most about my job is that I get ...

Updated 10 months ago by naruzkurai

Ensure proper syntax and readability in Python

[Completed] Professional Google Cyberse... module 2

Previously, you were introduced to the PEP 8 style guide and its stylistic guidelines for program...

Updated 10 months ago by naruzkurai

Code readability

[Completed] Professional Google Cyberse... module 2

Welcome back!One of the advantages to programming in Python is that it's a very readable language...

Updated 10 months ago by naruzkurai

Import modules and libraries in Python

[Completed] Professional Google Cyberse... module 2

Previously, you explored libraries and modules. You learned that a module is a Python file that c...

Updated 10 months ago by naruzkurai

Modules and libraries

[Completed] Professional Google Cyberse... module 2

Hello again!Previously, we learned about built-in functions in Python.Built-in functions come sta...

Updated 10 months ago by naruzkurai

Activity: Define and call a function

[Completed] Professional Google Cyberse... module 2

Introduction As a security analyst, when you're writing out Python code to automate a certai...

Updated 10 months ago by naruzkurai

Work with built-in functions

[Completed] Professional Google Cyberse... module 2

Previously, you explored built-in functions in Python, including print(), type(), max(), and sort...

Updated 10 months ago by naruzkurai

Explore built-in functions

[Completed] Professional Google Cyberse... module 2

Now that we know how to create our own functions, let's also explore a few of Python's built-in f...

Updated 10 months ago by naruzkurai

Functions and variables

[Completed] Professional Google Cyberse... module 2

Previously, you focused on working with multiple parameters and arguments in functions and return...

Updated 10 months ago by naruzkurai

Return statements

[Completed] Professional Google Cyberse... module 2

We previously learned how we can pass arguments into a function.We can do more than pass informat...

Updated 10 months ago by naruzkurai

Use parameters in functions

[Completed] Professional Google Cyberse... module 2

Previously, we defined and called our first function.It didn't require any information from outsi...

Updated 10 months ago by naruzkurai

Create a basic function

[Completed] Professional Google Cyberse... module 2

Let's start our exploration of user-defined functions by creating and then running a very simple ...

Updated 10 months ago by naruzkurai

Introduction to functions

[Completed] Professional Google Cyberse... module 2

As the complexity of our programs grow, it's also likely that we'll reuse the same lines of code....

Updated 10 months ago by naruzkurai