Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

843 total results found

Damar: My journey into Linux commands

[Completed] Professional Google Cyberse...

My name is Damar, I'm a security engineer here at Google. I've always wanted to get into cybersecurity since I was a kid. A lot of the cartoons I watched, they had like floppy disks or flash drives, and they would put that in the computer and kind of like ...

The Linux community

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

There are so many others just like you who will be using the command line. Linux's popularity and ease of use has created a large online community that constantly publishes information to help users learn how to operate Linux. Since Linux is open-sou...

Linux resources

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Previously, you were introduced to the Linux community and some resources that exist to help Linux users. Linux has many options available to give users the information they need. This reading will review these resources. When you’re aware of the resources ava...

Wrap-up; Glossary terms from week 3

[Completed] Professional Google Cyberse... linux basics part 2; electric boogalooo

Congratulations! You completed another section in this course. Take a minute to think about what you've achieved. You learned a lot in this section. Let's recap what we covered. In this section, you utilized the command line to co...

Welcome to week 4; SQL and Databases

[Completed] Professional Google Cyberse... SQL and Databases

In the world of security, diversity is important. Diverse perspectives are often needed to find effective solutions. This is also true of the tools we use. Your job will often require you to use a lot of diverse tools. In the last section, we stu...

Introduction to databases

[Completed] Professional Google Cyberse... SQL and Databases

Our modern world is filled with data and that data almost always guides us in making important decisions. When working with large amounts of data, we need to know how to store it, so it's organized and quick to access and process. The solution to thi...

SQL filtering versus Linux filtering

[Completed] Professional Google Cyberse... SQL and Databases

Previously, you explored the Linux commands that allow you to filter for specific information contained within files or directories. And, more recently, you examined how SQL helps you efficiently filter for the information you need. In this reading, you'll exp...

Adedayo: SQL in cybersecurity

[Completed] Professional Google Cyberse... SQL and Databases

My name is Adedayo, and I'm a Security Engineer at Google. A lot of people think you need to have a degree in computer science, right to be able to get into cybersecurity. I don't think that's true. Take me for an example, I started learning IT from Lago...

Basic queries

[Completed] Professional Google Cyberse... SQL and Databases

In this video, we're going to be running our very first SQL query! This query will be based on a common work task that you might encounter as a security analyst. We're going to determine which computer has been assigned to a certain employee. Let's...

Query a database

[Completed] Professional Google Cyberse... SQL and Databases

Previously, you explored how SQL is an important tool in the world of cybersecurity and is essential when querying databases. You examined a few basic SQL queries and keywords used to extract needed information from a database. In this reading, you’ll review t...

find table name and comumns definintion for SQL and variences

[Completed] Professional Google Cyberse... SQL and Databases

Standard SQL: For databases that support the ANSI SQL standard and have the INFORMATION_SCHEMA views available, you can use the following query: SELECT table_name, column_name FROM information_schema.columns; you can append if you want to spe...

Basic filters on SQL queries

[Completed] Professional Google Cyberse... SQL and Databases

One of the most powerful features of SQL is its ability to filter. In this video, we're going to learn how this helps us make better queries and select more specific pieces of data from a database. Filtering is selecting data that m...

The WHERE clause and basic operators

[Completed] Professional Google Cyberse... SQL and Databases

Previously, you focused on how to refine your SQL queries by using the WHERE clause to filter results. In this reading, you’ll further explore how to use the WHERE clause, the LIKE operator and the percentage sign (%) wildcard. You’ll also be introduced to the...

Filter dates and numbers

[Completed] Professional Google Cyberse... SQL and Databases

In this video, we're going to continue using SQL queries and filters, but now we're going to apply them to new data types. First, let's explore the three common data types that you will find in databases: string, numeric, and date and time. String ...

Operators for filtering dates and numbers

[Completed] Professional Google Cyberse... SQL and Databases

Previously, you examined operators like less than (<) or greater than (>) and explored how they can be used in filtering numeric and date and time data types. This reading summarizes what you learned and provides new examples of using operators in filters. Nu...

Filters with AND, OR, and NOT

[Completed] Professional Google Cyberse... SQL and Databases

In the previous lesson, we learned about even more ways to filter queries in SQL to work with some typical security analyst tasks. However, when working with real security questions, we often have to filter for multiple conditions. Vulnerabilities, f...

More on filters with AND, OR, and NOT

[Completed] Professional Google Cyberse... SQL and Databases

Previously, you explored how to add filters containing the AND, OR, and NOT operators to your SQL queries. In this reading, you'll continue to explore how these operators can help you refine your queries. Logical operators AND, OR, and NOT allow you to filte...

Join tables in SQL

[Completed] Professional Google Cyberse... SQL and Databases

You've already learned a lot about SQL queries and filters. Nice work! The last concept we're introducing in this section is joining tables when querying a database. This is helpful when you need information from two different tables in a database. ...

New Page

[Completed] Professional Google Cyberse... SQL and Databases

Types of joins

[Completed] Professional Google Cyberse... SQL and Databases

Welcome back. I hope you enjoyed working on inner joins. In the previous video and exercises, we saw how inner joins can be useful by only returning records that share a value in specify columns. However, in some situations, we might need all of the ...