Advanced Search
Search Results
813 total results found
Crafting Your Resume
Your resume is usually the first impression that companies have of you, so you want to make sure that you include relevant information in it. If you’d like to build your resume from scratch, make sure to scroll down to the bottom of this page to download PDFs ...
Getting Ready for the Interview
A lot of us are quite nervous when we go through our first interviews. There are a lot of things at stake and it might be hard not to freak out, but don't panic. You can do this if you prepare. With interviews as with lots of other things in life, practice mak...
Creating Your Elevator Pitch
An elevator pitch is a short description of yourself. The name comes from the fact that you want it to be so short that you can deliver it to someone that you are meeting in an elevator ride. The goal of the elevator pitch is to explain who you are, what you...
What to Expect During the Technical Interview
When you're interviewing for a technical position, you'll likely have one or more interviews where you'll specifically need to demonstrate your technical skills and knowledge. These interviews may take the form of technical troubleshooting scenarios or explana...
Showing Your Best Self During the Interview
Being your best self for the interview starts the night before. Being fully rested will help you have more energy, be more focused, and minimize anxiety. So make sure that you get a good night sleep. Don't try to cram in any last-minute studying, this will onl...
Interview Role Play: Customer Service
Hi, thanks for coming in. For a jump into my technical questions, I'd like to know a bit more about you. Tell me why you're interested in this position? When I came into college, I was a pre-med major and eventually, I led down the path to take an introductio...
Course Wrap Up
In the very beginning of this course, we told you that all a computer does is calculate and process data. We also told you that with that simple function, we can post a social media, create beautiful graphics, listen to music, and more. Well, in the short time...
Sabrina: Technology can open doors
Technology can open doors and allow you to achieve things that even you didn't expect. Growing up, I never pictured that I would be in technology, right? I didn't ever even expect to go to college. I don't think that it's about college. I do think that you nee...
Glossary - IT Support - Terms and definitions from Course 1
#404 Not Found: An error message you might see on websites that have been moved or deletedAAbstraction: To take a relatively complex system and simplify it for our useAddress bus: Connects the CPU to the MCC and sends over the location of the data, but notth...
Congrats!
Congratulations. >> Congratulations on all your hard work. >> Congratulations. >> Congratulations. >> Congratulations on getting through all of that content. I really hope you found something that spoke to you, and that you're going to pursue and continue to l...
Google Cybersecurity Certificate overview
Why are skills in cybersecurity in such high demand? The world is undergoing a digital transformation. Every day, global access to the internet is expanding, introducing more devices, more applications, and an even larger amount of data to the World Wide Web. ...
Course 1 overview
Cybersecurity Certificate. You’ve begun an exciting journey! In this course, you will learn the primary job responsibilities and core skills of those who work in the field of cybersecurity. You will explore the eight Certified Information Systems Se...
Welcome to week 1
Hi again! Now that you have some idea of what to expect from the program as a whole, let's discuss more about what you'll learn in this course. Play video starting at ::11 and follow transcript0:11 This course will introduce...
Helpful resources and tips
(They made me type my name and some reason to commit, par the usual, I am your god, and i suffer for you, i am your lord and saviour NaruZKurai)As a learner, you can choose to complete one or multiple courses in this program. However, to obtain the Google Cybe...
Google Cybersecurity Certificate glossary
A Absolute file path: The full file path, which starts from the root Access controls: Security controls that manage access, authorization, and accountability of information Active packet sniffing: A type of attack where data packets are manipulated in tra...
Introduction to cybersecurity
Imagine that you're preparing for a storm. You've received notification that a storm is coming. You prepare by gathering the tools and materials you'll need to stay safe. You make sure your windows and doors are secure. You assemble a first aid...
Toni: My path to cybersecurity
Hi, I'm Toni, I'm a Security Engineering Manager. Our teams protect Google and its users from serious threats. Usually government-backed attackers, coordinated influence operations and serious cybercrime threat actors. I grew up as an army brat. My dad was in ...
Responsibilities of an entry-level cybersecurity analyst
Technology is rapidly changing and so are the tactics and techniques that attackers use. As digital infrastructure evolves, security professionals are expected to continually grow their skills in order to protect and secure sensitive information. In this video...
Nikki: A day in the life of a security engineer
My name is Nikki and I'm a security engineer at Google. I am part of the insider threat detection team at Google, so my role is more focused on catching insider threats or insider suspicious activity within the company. My first experience with cybersecurity w...
Common cybersecurity terminology
As you’ve learned, cybersecurity (also known as security) is the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation. In this rea...