Skip to main content

Recently Updated Pages

Work with files in Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

You previously explored how to open files in Python as well as how to read them and write to them...

Updated 1 year ago by naruzkurai

Parse a text file in Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Now that you know how to import text files into Python, we're going to take this one step further...

Updated 1 year ago by naruzkurai

Import files into Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Previously, you explored how to open files in Python, convert them into strings, and read them. I...

Updated 1 year ago by naruzkurai

Access a text file in Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Security professionals are often tasked with reviewing log files.These files may have thousands o...

Updated 1 year ago by naruzkurai

Clancy: Continual learning and Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

My name is Clancy and I'm a Senior Security Engineer.My team here at Google is part of an ongoing...

Updated 1 year ago by naruzkurai

Essential Python components for automation

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Throughout this course, you explored coding in Python. You've focused on variables, conditional s...

Updated 1 year ago by naruzkurai

Automate cybersecurity tasks with Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Automation is a key concern in the security profession.For example, it would be difficult to moni...

Updated 1 year ago by naruzkurai

Welcome to module 4

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

We've learned a lot about Python together already, and we still have more to cover.In this sectio...

Updated 1 year ago by naruzkurai

Reference guide: Python concepts from module 3; Terms and definitions from Course 7, Module 3

[Completed] Professional Google Cyberse... module 3

Built-in functions The following built-in functions are commonly used in Python. str() Con...

Updated 1 year ago by naruzkurai

Wrap-up

[Completed] Professional Google Cyberse... module 3

Congratulations!We accomplished a lot together.Let's take time to quickly go through all the new ...

Updated 1 year ago by naruzkurai

Welcome to module 2

[Completed] Professional Google Cyberse... module 2

Welcome back to our Python journey!In the previous videos, we learned all about the basics of Pyt...

Updated 1 year ago by naruzkurai

Python functions in cybersecurity

[Completed] Professional Google Cyberse... module 2

Previously, you explored how to define and call your own functions. In this reading, you’ll rev...

Updated 1 year ago by naruzkurai

Introduction to functions

[Completed] Professional Google Cyberse... module 2

As the complexity of our programs grow, it's also likely that we'll reuse the same lines of code....

Updated 1 year ago by naruzkurai

Create a basic function

[Completed] Professional Google Cyberse... module 2

Let's start our exploration of user-defined functions by creating and then running a very simple ...

Updated 1 year ago by naruzkurai

Use parameters in functions

[Completed] Professional Google Cyberse... module 2

Previously, we defined and called our first function.It didn't require any information from outsi...

Updated 1 year ago by naruzkurai

Return statements

[Completed] Professional Google Cyberse... module 2

We previously learned how we can pass arguments into a function.We can do more than pass informat...

Updated 1 year ago by naruzkurai

Functions and variables

[Completed] Professional Google Cyberse... module 2

Previously, you focused on working with multiple parameters and arguments in functions and return...

Updated 1 year ago by naruzkurai

Explore built-in functions

[Completed] Professional Google Cyberse... module 2

Now that we know how to create our own functions, let's also explore a few of Python's built-in f...

Updated 1 year ago by naruzkurai

Work with built-in functions

[Completed] Professional Google Cyberse... module 2

Previously, you explored built-in functions in Python, including print(), type(), max(), and sort...

Updated 1 year ago by naruzkurai

Activity: Define and call a function

[Completed] Professional Google Cyberse... module 2

Introduction As a security analyst, when you're writing out Python code to automate a certai...

Updated 1 year ago by naruzkurai