Advanced Search
Search Results
812 total results found
Filter dates and numbers
In this video, we're going to continue using SQL queries and filters, but now we're going to apply them to new data types. First, let's explore the three common data types that you will find in databases: string, numeric, and date and time. String ...
Operators for filtering dates and numbers
Previously, you examined operators like less than (<) or greater than (>) and explored how they can be used in filtering numeric and date and time data types. This reading summarizes what you learned and provides new examples of using operators in filters. Nu...
Filters with AND, OR, and NOT
In the previous lesson, we learned about even more ways to filter queries in SQL to work with some typical security analyst tasks. However, when working with real security questions, we often have to filter for multiple conditions. Vulnerabilities, f...
More on filters with AND, OR, and NOT
Previously, you explored how to add filters containing the AND, OR, and NOT operators to your SQL queries. In this reading, you'll continue to explore how these operators can help you refine your queries. Logical operators AND, OR, and NOT allow you to filte...
Join tables in SQL
You've already learned a lot about SQL queries and filters. Nice work! The last concept we're introducing in this section is joining tables when querying a database. This is helpful when you need information from two different tables in a database. ...
Types of joins
Welcome back. I hope you enjoyed working on inner joins. In the previous video and exercises, we saw how inner joins can be useful by only returning records that share a value in specify columns. However, in some situations, we might need all of the ...
Compare types of joins
Previously, you explored SQL joins and how to use them to join data from multiple tables when these tables share a common column. You also examined how there are different types of joins, and each of them returns different rows from the tables being joined. In...
Continuous learning in SQL
You've explored a lot about SQL, including applying filters to SQL queries and joining multiple tables together in a query. There's still more that you can do with SQL. This reading will explore an example of something new you can add to your SQL toolbox: agg...
Wrap-up; Glossary terms from week 4
Congratulations! We've made it together through the end of our focus on SQL. You've put in a lot of work and learned an important tool that will help you on your journey as a security analyst. Let's take a moment to go through all of the topics you l...
Course wrap-up
You made it to the end of this course! Congratulations—you did it! I hope you are proud of all you learned. The focus of this course was computing basics. Understanding the basics of computing is a valuable skill as you transition into your c...
Introduction to Course 5
What do you picture when you think about the security field? This might make you think of a dark room with people hunched over their computers. Maybe you picture a person in a lab carefully analyzing evidence. Or, maybe you imagine a guard standing...
Course 5 overview
Hello, and welcome to Assets, Threats, and Vulnerabilities, the fifth course in the Google Cybersecurity Certificate. You’re on an exciting journey! By the end of this course, you’ll build an understanding of the wide range of assets organizations must protec...
Da'Queshia: My path to cybersecurity
Hi. My name is Da'Queshia. I'm a security engineer. That basically means I work securing Google's products so users like you aren't vulnerable. Before I entered cybersecurity, I worked installing Internet. I also worked at a chip factory. I worked ...
Understand risks, threats, and vulnerabilities
When security events occur, you’ll need to work in close coordination with others to address the problem. Doing so quickly requires clear communication between you and your team to get the job done. Previously, you learned about three foundational security te...
Tri: Life in asset security
I'm Tri, a security engineer at Google. My department is Detection and Response. Let's see, what does my everyday look like? Well, of course I have the free lunch and coffee, which is nice. And then I finally get to my desk and I open up the SIEM to ...
Security starts with asset classification
It can be really stressful when you have trouble finding something important. You're late to an appointment and can't find your keys! We all find ourselves in situations like these at one time or another. Believe it or not, organizations deal with ...
Common classification requirements
Asset management is the process of tracking assets and the risks that affect them. The idea behind this process is simple: you can only protect what you know you have. Previously, you learned that identifying, tracking, and classifying assets are all importa...
Security guidelines in action
Organizations often face an overwhelming amount of risk. Developing a security plan from the beginning that addresses all risk can be challenging. This makes security frameworks a useful option. Previously, you learned about the NIST Cybersecurity Framework (...
The emergence of cloud security
One of the most significant technology developments this century has been the emergence of cloud computing. The United Kingdom's National Cyber Security Centre defines cloud computing as, “An on-demand, massively scalable service, hosted on shared infrastructu...
Elements of a security plan
Security is all about people, processes, and technology. It's a team effort, and I mean that literally. Protecting assets extends well beyond one person or a group of people in an IT department. The truth of the matter is that security is a culture...