Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

812 total results found

Network security applications

[Completed] Professional Google Cyberse... Security hardning

This section of the course covers the topic of network hardening and monitoring. Each device, tool, or security strategy put in place by security analysts further protects—or hardens—the network until the network owner is satisfied with the level of security. ...

Cloud Hardening

[Completed] Professional Google Cyberse... Security hardning

Network security in the cloud  In recent years, many organizations are using network services in the cloud. So in addition to securing on-premises networks, a security analyst will need to secure cloud networks. In a previous video, you learned th...

Kelsey: Cloud security explained

[Completed] Professional Google Cyberse... Security hardning

I'm Kelsey, I'm a distinguished engineer at Google Cloud. I work on compute platforms and security related topics. When I was starting, the only jobs I had previous, the only jobs I was confident were accessible to me were fast food jobs. I wanted a ...

Security hardening Wrap-up & Glossary terms from week 4

[Completed] Professional Google Cyberse... Security hardning

Great work on learning about security hardening! Let's take a few minutes to wrap up what you've learned. You learned about security hardening and its importance to an organization's infrastructure. First, we discussed how securit...

Course wrap-up; Glossary Cybersecurity Course 3

[Completed] Professional Google Cyberse...

Wow, we have covered a lot in this course! Let's review everything we've discussed. You learned about networks, network architecture, and the best practices used by security professionals to secure a network against security breaches.  As we bring t...

Introduction to Course 4

[Completed] Professional Google Cyberse... All things Operating System

Hi! Welcome to this course on computing basics for security. My name is Kim, and I work as a Technical Program Manager in security. I grew up with computers and the internet but didn't really consider security as a career opportunity until I saw how ...

Helpful resources and tips

[Completed] Professional Google Cyberse... All things Operating System

As a learner, you can choose to complete one or multiple courses in this program. However, to obtain the Google Cybersecurity Certificate, you must complete all the courses. This reading describes what is required to obtain a certificate and best practices for...

Welcome to week 1; Introduction to operating systems

[Completed] Professional Google Cyberse... All things Operating System

How many times a week do you use a computer? For some of us, the answer might be "a lot"! They are incredible machines that let us do everything from using specialized applications when completing a task at work to sending emails to loved ones in a d...

Kim: My journey into computing

[Completed] Professional Google Cyberse... All things Operating System

Hi, I'm Kim. I'm a technical program manager at Google.  I'm currently working in the security, mergers, and acquisitions team. Where I work with other companies that we purchase, and I help them integrate into the Google environment. I've held multip...

Compare operating systems

[Completed] Professional Google Cyberse... All things Operating System

You previously explored why operating systems are an important part of how a computer works.  In this reading, you’ll compare some popular operating systems used today. You’ll also focus on the risks of using legacy operating systems. Common operating systems...

Inside the operating system

[Completed] Professional Google Cyberse... All things Operating System

Previously, you learned about what operating systems are. Now, let's discuss how they work. In this video, you'll learn what happens with an operating system, or OS, when someone uses a computer for a task. Think about when someon...

Requests to the operating system

[Completed] Professional Google Cyberse... All things Operating System

Operating systems are a critical component of a computer. They make connections between applications and hardware to allow users to perform tasks. In this reading, you’ll explore this complex process further and consider it using a new analogy and a new exampl...

Resource allocation via the OS

[Completed] Professional Google Cyberse... All things Operating System

Now we're ready to discuss a different aspect of your operating system. Not only does the OS interact with other parts of your computer, but it's also responsible for managing the resources of the system. This is a big task that requires a lot of b...

Virtualization technology

[Completed] Professional Google Cyberse... All things Operating System

You've explored a lot about operating systems. One more aspect to consider is that operating systems can run on virtual machines. In this reading, you’ll learn about virtual machines and the general concept of virtualization. You’ll explore how virtual machine...

GUI versus CLI

[Completed] Professional Google Cyberse... All things Operating System

Now that you've learned the inner workings of computers, let's discuss how users and operating systems communicate with each other.  So far, you've learned that a computer has an operating system, hardware, and applications. Remember, the operating sy...

The command line in use

[Completed] Professional Google Cyberse... All things Operating System

Previously, you explored graphical user interfaces (GUI) and command-line user interfaces (CLI). In this reading, you’ll compare these two interfaces and learn more about how they’re used in cybersecurity.   CLI vs. GUI A graphical user interface (GUI) is a ...

Ellen: My path into cybersecurity

[Completed] Professional Google Cyberse... All things Operating System

My name is Ellen and I am a security engineering manager at Google focused in on how Google uses the cloud. Cybersecurity wasn't a field when I got started in technology, something I came to later. I got started in technology when I was working retail at...

Wrap-up; Glossary terms from week 1

[Completed] Professional Google Cyberse... All things Operating System

We did it! What a great section of learning! The best thing is that we did this together and covered some very useful topics. Let's recap this section's lessons. As a security analyst, it's important that you understand the systems that you're wo...

Welcome to week 2; introduction to linux

[Completed] Professional Google Cyberse... Linux Basics

Welcome back! We have another important topic to explore.Previously, you learned aboutoperating systems and user interfaces.You learned how operating systems work and how resources are allocated in computers.We also reviewed several common operating systems.Yo...

Phil: Learn and grow in the cybersecurity field

[Completed] Professional Google Cyberse... stories

Hi, I'm Phil I'm the Chief Information Security Officer for Google Cloud, and a big part of that is, of course, cybersecurity.So, in cyber you've always got to learn, you've always got to stay up to date for the simple reason that technology and business and t...