Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

948 total results found

Tina: Working in network security

[Completed] Professional Google Cyberse... getting started & introduction to networks

My name is Tina and I'm a software engineer at Google. As a software engineer, I work on an internal tool that serves the security engineers and network engineers at Google. Network security is important because we want to make sure that our network systems ar...

Emmanuel: Useful skills for network security

[Completed] Professional Google Cyberse... getting started & introduction to networks

My name is Emmanuel and I am an offensive security engineer at Google. For offensive security, my job is to simulate adversaries and threats that are targeting various companies and I look at defending how we can protect Google's infrastructure. I make it hard...

tech enthusiest reminder

[Completed] Professional Google Cyberse... getting started & introduction to networks

A hub is a network device that broadcasts information to every device on the network.

Network tools

[Completed] Professional Google Cyberse... getting started & introduction to networks

In this video, you'll learn about the common devices that make up a network. Let's get started.A hub is a network device that broadcasts information to every device on the network. Think of a hub like a radio tower that broadcasts a signal to any radio tuned t...

Network components, devices, and diagrams

[Completed] Professional Google Cyberse... getting started & introduction to networks

In this section of the course, you will learn about network architecture.  Once you have a foundational understanding of network architecture, sometimes referred to as network design, you will learn about security vulnerabilities inherent in all networks and ...

Cloud networks

[Completed] Professional Google Cyberse... getting started & introduction to networks

Companies have traditionally owned their network devices, and kept them in their own office buildings. But now, a lot of companies are using third-party providers to manage their networks. Why? Well, this model helps companies save money while giving them acce...

Cloud networks

[Completed] Professional Google Cyberse... getting started & introduction to networks

Companies have traditionally owned their network devices, and kept them in their own office buildings. But now, a lot of companies are using third-party providers to manage their networks.Why? Well, this model helps companies save money while giving them acces...

Introduction to network communication

[Completed] Professional Google Cyberse... Network Communication

Networks help organizations communicate and connect. But communication makes network attacks more likely because it gives a malicious actor an opportunity to take advantage of vulnerable devices and unprotected networks.Communication over a network happens whe...

The TCP/IP model

[Completed] Professional Google Cyberse... Network Communication

Hello again. In this video, you'll learn more about communication protocols and devices used to communicate with each other across the internet. This is called the TCP/IP model.TCP/IP stands for Transmission Control Protocol and Internet Protocol. TCP/IP is th...

The four layers of the TCP/IP model

[Completed] Professional Google Cyberse... Network Communication

Now that we've discussed the structure of a network and how communications takes place, it's important for you to know how the security professionals identify problems that might arise.The TCP/IP model is a framework that is used to visualize how data is organ...

Learn more about the TCP/IP model

[Completed] Professional Google Cyberse... Network Communication

In this reading, you will build on what you have learned about the Transmission Control Protocol/Internet Protocol (TCP/IP) model, consider the differences between the Open Systems Interconnection (OSI) model and TCP/IP model, and learn how they’re related. Th...

The OSI model

[Completed] Professional Google Cyberse... Network Communication

So far in this section of the course, you learned about the components of a network, network devices, and how network communication occurs across a network. All communication on a network is organized using network protocols. Previously, you learned about the...

Local and wide network communication

[Completed] Professional Google Cyberse... Network Communication

Let's learn about how IP addresses are used to communicate over a network. IP stands for internet protocol. An internet protocol address, or IP address, is a unique string of characters that identifies a location of a device on the internet. Each device on the...

Components of network layer communication

[Completed] Professional Google Cyberse... Network Communication

Components of network layer communication In the reading about the OSI model, you learned about the seven layers of the OSI model that are used to conceptualize the way data is transmitted across the internet. In this reading, you will learn more about operat...

Wrap-up

[Completed] Professional Google Cyberse... Network Communication

Hey, you made it! Well done! Let's wrap up what you've learned in this section of the course.We explored the structure of a network, including WANs and LANs. We also discussed standard networking tools like hubs, switches, routers, and modems. We briefly intro...

Glossary terms from Course 3, Week 1

[Completed] Professional Google Cyberse... Network Communication

Terms and definitions from Course 3, Week 1 Bandwidth: The maximum data transmission capacity over a network, measured by bits per second Cloud computing: The practice of using remote servers, application, and network services that are hosted on the intern...

Welcome to week 2, Network potocols

[Completed] Professional Google Cyberse... Introduction to network protocols

Congratulations on the progress you've made so far!In this section, you'll learn about hownetworks operate using tools and protocols.These are the concepts that you'll use everyday in your work as a security analyst.The tools and protocols you'll learn in th...

Common network protocols

[Completed] Professional Google Cyberse... Introduction to network protocols

In this section of the course, you learned about network protocols and how they organize communication over a network. This reading will discuss network protocols in more depth and review some basic protocols that you have learned previously. You will also lea...

Additional network protocols

[Completed] Professional Google Cyberse... Introduction to network protocols

In previous readings and videos, you learned how network protocols organize the sending and receiving of data across a network. You also learned that protocols can be divided into three categories: communication protocols, management protocols, and security pr...

Antara: Working in network security

[Completed] Professional Google Cyberse... Introduction to network protocols

My name is Antara,I work on the Enterprise Infrastructure Protection Team at Google.And our main job responsibility is to protectthe infrastructure that all the amazing Google products run on.I didn't start with a background in computers, and I did my undergra...