Advanced Search
Search Results
843 total results found
Kim: My journey into computing
Hi, I'm Kim. I'm a technical program manager at Google. I'm currently working in the security, mergers, and acquisitions team. Where I work with other companies that we purchase, and I help them integrate into the Google environment. I've held multip...
Compare operating systems
You previously explored why operating systems are an important part of how a computer works. In this reading, you’ll compare some popular operating systems used today. You’ll also focus on the risks of using legacy operating systems. Common operating systems...
Inside the operating system
Previously, you learned about what operating systems are. Now, let's discuss how they work. In this video, you'll learn what happens with an operating system, or OS, when someone uses a computer for a task. Think about when someon...
Requests to the operating system
Operating systems are a critical component of a computer. They make connections between applications and hardware to allow users to perform tasks. In this reading, you’ll explore this complex process further and consider it using a new analogy and a new exampl...
Resource allocation via the OS
Now we're ready to discuss a different aspect of your operating system. Not only does the OS interact with other parts of your computer, but it's also responsible for managing the resources of the system. This is a big task that requires a lot of b...
Virtualization technology
You've explored a lot about operating systems. One more aspect to consider is that operating systems can run on virtual machines. In this reading, you’ll learn about virtual machines and the general concept of virtualization. You’ll explore how virtual machine...
GUI versus CLI
Now that you've learned the inner workings of computers, let's discuss how users and operating systems communicate with each other. So far, you've learned that a computer has an operating system, hardware, and applications. Remember, the operating sy...
The command line in use
Previously, you explored graphical user interfaces (GUI) and command-line user interfaces (CLI). In this reading, you’ll compare these two interfaces and learn more about how they’re used in cybersecurity. CLI vs. GUI A graphical user interface (GUI) is a ...
Ellen: My path into cybersecurity
My name is Ellen and I am a security engineering manager at Google focused in on how Google uses the cloud. Cybersecurity wasn't a field when I got started in technology, something I came to later. I got started in technology when I was working retail at...
Wrap-up; Glossary terms from week 1
We did it! What a great section of learning! The best thing is that we did this together and covered some very useful topics. Let's recap this section's lessons. As a security analyst, it's important that you understand the systems that you're wo...
Welcome to week 2; introduction to linux
Welcome back! We have another important topic to explore.Previously, you learned aboutoperating systems and user interfaces.You learned how operating systems work and how resources are allocated in computers.We also reviewed several common operating systems.Yo...
Phil: Learn and grow in the cybersecurity field
Hi, I'm Phil I'm the Chief Information Security Officer for Google Cloud, and a big part of that is, of course, cybersecurity.So, in cyber you've always got to learn, you've always got to stay up to date for the simple reason that technology and business and t...
Linux architecture
Let me start with a quick question that may seem unrelated to security. Do you have a favorite building? And what is it about its architecture that impresses you the most? The windows? The structure of the walls? Just like buildings, operating sy...
Linux architecture explained
Understanding the Linux architecture is important for a security analyst. When you understand how a system is organized, it makes it easier to understand how it functions. In this reading, you’ll learn more about the individual components in the Linux architec...
Linux distributions
Let's learn a little bit more about Linux and what you need to know about this operating system when working as a security analyst. Linux is a very customizable operating system. Unlike other operating systems, there are different versions available ...
KALI LINUX ™
In this section, we're going to cover a Linux distribution that's widely used in security and discuss KALI LINUX™. KALI LINUX™ is a trademark of Offensive Security and is Debian derived. This open-source distro was made specifically with penetration ...
More Linux distributions
Previously, you were introduced to the different distributions of Linux. This included KALI LINUX ™. (KALI LINUX ™ is a trademark of OffSec.) In addition to KALI LINUX ™, there are multiple other Linux distributions that security analysts should be familiar wi...
Package managers for installing applications
Previously, you learned about Linux distributions and that different distributions derive from different sources, such as Debian or Red Hat Enterprise Linux distribution. You were also introduced to package managers, and learned that Linux applications are com...
Vanilla os
i came accross vanilla os in a yt video and it appears to be realy interesting. i quite like gnome as a base and im thinking this is potentially one of the best options in the future if they stick with it. also theres only two updates per year and a roling rel...
Nix OS
make page on nix os, alternative to vanilla os?