Advanced Search
Search Results
843 total results found
Damar: My journey into Linux commands
My name is Damar, I'm a security engineer here at Google. I've always wanted to get into cybersecurity since I was a kid. A lot of the cartoons I watched, they had like floppy disks or flash drives, and they would put that in the computer and kind of like ...
The Linux community
There are so many others just like you who will be using the command line. Linux's popularity and ease of use has created a large online community that constantly publishes information to help users learn how to operate Linux. Since Linux is open-sou...
Linux resources
Previously, you were introduced to the Linux community and some resources that exist to help Linux users. Linux has many options available to give users the information they need. This reading will review these resources. When you’re aware of the resources ava...
Wrap-up; Glossary terms from week 3
Congratulations! You completed another section in this course. Take a minute to think about what you've achieved. You learned a lot in this section. Let's recap what we covered. In this section, you utilized the command line to co...
Welcome to week 4; SQL and Databases
In the world of security, diversity is important. Diverse perspectives are often needed to find effective solutions. This is also true of the tools we use. Your job will often require you to use a lot of diverse tools. In the last section, we stu...
Introduction to databases
Our modern world is filled with data and that data almost always guides us in making important decisions. When working with large amounts of data, we need to know how to store it, so it's organized and quick to access and process. The solution to thi...
SQL filtering versus Linux filtering
Previously, you explored the Linux commands that allow you to filter for specific information contained within files or directories. And, more recently, you examined how SQL helps you efficiently filter for the information you need. In this reading, you'll exp...
Adedayo: SQL in cybersecurity
My name is Adedayo, and I'm a Security Engineer at Google. A lot of people think you need to have a degree in computer science, right to be able to get into cybersecurity. I don't think that's true. Take me for an example, I started learning IT from Lago...
Basic queries
In this video, we're going to be running our very first SQL query! This query will be based on a common work task that you might encounter as a security analyst. We're going to determine which computer has been assigned to a certain employee. Let's...
Query a database
Previously, you explored how SQL is an important tool in the world of cybersecurity and is essential when querying databases. You examined a few basic SQL queries and keywords used to extract needed information from a database. In this reading, you’ll review t...
find table name and comumns definintion for SQL and variences
Standard SQL: For databases that support the ANSI SQL standard and have the INFORMATION_SCHEMA views available, you can use the following query: SELECT table_name, column_name FROM information_schema.columns; you can append if you want to spe...
Basic filters on SQL queries
One of the most powerful features of SQL is its ability to filter. In this video, we're going to learn how this helps us make better queries and select more specific pieces of data from a database. Filtering is selecting data that m...
The WHERE clause and basic operators
Previously, you focused on how to refine your SQL queries by using the WHERE clause to filter results. In this reading, you’ll further explore how to use the WHERE clause, the LIKE operator and the percentage sign (%) wildcard. You’ll also be introduced to the...
Filter dates and numbers
In this video, we're going to continue using SQL queries and filters, but now we're going to apply them to new data types. First, let's explore the three common data types that you will find in databases: string, numeric, and date and time. String ...
Operators for filtering dates and numbers
Previously, you examined operators like less than (<) or greater than (>) and explored how they can be used in filtering numeric and date and time data types. This reading summarizes what you learned and provides new examples of using operators in filters. Nu...
Filters with AND, OR, and NOT
In the previous lesson, we learned about even more ways to filter queries in SQL to work with some typical security analyst tasks. However, when working with real security questions, we often have to filter for multiple conditions. Vulnerabilities, f...
More on filters with AND, OR, and NOT
Previously, you explored how to add filters containing the AND, OR, and NOT operators to your SQL queries. In this reading, you'll continue to explore how these operators can help you refine your queries. Logical operators AND, OR, and NOT allow you to filte...
Join tables in SQL
You've already learned a lot about SQL queries and filters. Nice work! The last concept we're introducing in this section is joining tables when querying a database. This is helpful when you need information from two different tables in a database. ...
New Page
Types of joins
Welcome back. I hope you enjoyed working on inner joins. In the previous video and exercises, we saw how inner joins can be useful by only returning records that share a value in specify columns. However, in some situations, we might need all of the ...