Skip to main content

Recently Updated Pages

Wrap-up; Reference guide: Python concepts from module 2

[Completed] Professional Google Cyberse... module 2

Great work on making it this far in the Python course!You've put in a lot of work and effort towa...

Updated 1 year ago by naruzkurai

Dorsa: Use Python efficiently on a cybersecurity team

[Completed] Professional Google Cyberse... module 2

Hi, my name is Dorsa and I'm a security engineer.What I love the most about my job is that I get ...

Updated 1 year ago by naruzkurai

Ensure proper syntax and readability in Python

[Completed] Professional Google Cyberse... module 2

Previously, you were introduced to the PEP 8 style guide and its stylistic guidelines for program...

Updated 1 year ago by naruzkurai

Code readability

[Completed] Professional Google Cyberse... module 2

Welcome back!One of the advantages to programming in Python is that it's a very readable language...

Updated 1 year ago by naruzkurai

Import modules and libraries in Python

[Completed] Professional Google Cyberse... module 2

Previously, you explored libraries and modules. You learned that a module is a Python file that c...

Updated 1 year ago by naruzkurai

Modules and libraries

[Completed] Professional Google Cyberse... module 2

Hello again!Previously, we learned about built-in functions in Python.Built-in functions come sta...

Updated 1 year ago by naruzkurai

Activity: Define and call a function

[Completed] Professional Google Cyberse... module 2

Introduction As a security analyst, when you're writing out Python code to automate a certai...

Updated 1 year ago by naruzkurai

Work with built-in functions

[Completed] Professional Google Cyberse... module 2

Previously, you explored built-in functions in Python, including print(), type(), max(), and sort...

Updated 1 year ago by naruzkurai

Explore built-in functions

[Completed] Professional Google Cyberse... module 2

Now that we know how to create our own functions, let's also explore a few of Python's built-in f...

Updated 1 year ago by naruzkurai

Functions and variables

[Completed] Professional Google Cyberse... module 2

Previously, you focused on working with multiple parameters and arguments in functions and return...

Updated 1 year ago by naruzkurai

Return statements

[Completed] Professional Google Cyberse... module 2

We previously learned how we can pass arguments into a function.We can do more than pass informat...

Updated 1 year ago by naruzkurai

Use parameters in functions

[Completed] Professional Google Cyberse... module 2

Previously, we defined and called our first function.It didn't require any information from outsi...

Updated 1 year ago by naruzkurai

Create a basic function

[Completed] Professional Google Cyberse... module 2

Let's start our exploration of user-defined functions by creating and then running a very simple ...

Updated 1 year ago by naruzkurai

Introduction to functions

[Completed] Professional Google Cyberse... module 2

As the complexity of our programs grow, it's also likely that we'll reuse the same lines of code....

Updated 1 year ago by naruzkurai

Python functions in cybersecurity

[Completed] Professional Google Cyberse... module 2

Previously, you explored how to define and call your own functions. In this reading, you’ll rev...

Updated 1 year ago by naruzkurai

Welcome to module 2

[Completed] Professional Google Cyberse... module 2

Welcome back to our Python journey!In the previous videos, we learned all about the basics of Pyt...

Updated 1 year ago by naruzkurai

Glossary terms from module 1

[Completed] Professional Google Cyberse... module 1

Terms and definitions from Course 7, Module 1 Automation: The use of technology to reduce human ...

Updated 1 year ago by naruzkurai

Reference guide: Python concepts from module 1

[Completed] Professional Google Cyberse... module 1

This reference guide contains Python language introduced during module 1. The guide is organized ...

Updated 1 year ago by naruzkurai

Wrap-up

[Completed] Professional Google Cyberse... module 1

Well done!You've learned about why security analysts use Python and the basic structure of a prog...

Updated 1 year ago by naruzkurai

New Page

[Completed] Professional Google Cyberse... module 1

Activity_Create loops /*! * * Twitter Bootstrap * */ /*! * Bootstrap v3.3.7 (http://ge...

Updated 1 year ago by naruzkurai