Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

812 total results found

Filter dates and numbers

[Completed] Professional Google Cyberse... SQL and Databases

In this video, we're going to continue using SQL queries and filters, but now we're going to apply them to new data types. First, let's explore the three common data types that you will find in databases: string, numeric, and date and time. String ...

Operators for filtering dates and numbers

[Completed] Professional Google Cyberse... SQL and Databases

Previously, you examined operators like less than (<) or greater than (>) and explored how they can be used in filtering numeric and date and time data types. This reading summarizes what you learned and provides new examples of using operators in filters. Nu...

Filters with AND, OR, and NOT

[Completed] Professional Google Cyberse... SQL and Databases

In the previous lesson, we learned about even more ways to filter queries in SQL to work with some typical security analyst tasks. However, when working with real security questions, we often have to filter for multiple conditions. Vulnerabilities, f...

More on filters with AND, OR, and NOT

[Completed] Professional Google Cyberse... SQL and Databases

Previously, you explored how to add filters containing the AND, OR, and NOT operators to your SQL queries. In this reading, you'll continue to explore how these operators can help you refine your queries. Logical operators AND, OR, and NOT allow you to filte...

Join tables in SQL

[Completed] Professional Google Cyberse... SQL and Databases

You've already learned a lot about SQL queries and filters. Nice work! The last concept we're introducing in this section is joining tables when querying a database. This is helpful when you need information from two different tables in a database. ...

Types of joins

[Completed] Professional Google Cyberse... SQL and Databases

Welcome back. I hope you enjoyed working on inner joins. In the previous video and exercises, we saw how inner joins can be useful by only returning records that share a value in specify columns. However, in some situations, we might need all of the ...

Compare types of joins

[Completed] Professional Google Cyberse... SQL and Databases

Previously, you explored SQL joins and how to use them to join data from multiple tables when these tables share a common column. You also examined how there are different types of joins, and each of them returns different rows from the tables being joined. In...

Continuous learning in SQL

[Completed] Professional Google Cyberse... SQL and Databases

You've explored a lot about SQL, including applying filters to SQL queries and joining multiple tables together in a query.  There's still more that you can do with SQL. This reading will explore an example of something new you can add to your SQL toolbox: agg...

Wrap-up; Glossary terms from week 4

[Completed] Professional Google Cyberse... SQL and Databases

Congratulations! We've made it together through the end of our focus on SQL. You've put in a lot of work and learned an important tool that will help you on your journey as a security analyst. Let's take a moment to go through all of the topics you l...

Course wrap-up

[Completed] Professional Google Cyberse...

You made it to the end of this course! Congratulations—you did it! I hope you are proud of all you learned. The focus of this course was computing basics. Understanding the basics of computing is a valuable skill as you transition into your c...

Introduction to Course 5

[Completed] Professional Google Cyberse...

What do you picture when you think about the security field? This might make you think of a dark room with people hunched over their computers. Maybe you picture a person in a lab carefully analyzing evidence. Or, maybe you imagine a guard standing...

Course 5 overview

[Completed] Professional Google Cyberse...

Hello, and welcome to Assets, Threats, and Vulnerabilities, the fifth course in the Google Cybersecurity Certificate. You’re on an exciting journey! By the end of this course, you’ll build an understanding of the wide range of assets organizations must protec...

Da'Queshia: My path to cybersecurity

[Completed] Professional Google Cyberse...

Hi. My name is Da'Queshia. I'm a security engineer. That basically means I work securing Google's products so users like you aren't vulnerable. Before I entered cybersecurity, I worked installing Internet. I also worked at a chip factory. I worked ...

Understand risks, threats, and vulnerabilities

[Completed] Professional Google Cyberse...

When security events occur, you’ll need to work in close coordination with others to address the problem. Doing so quickly requires clear communication between you and your team to get the job done. Previously, you learned about three foundational security te...

Tri: Life in asset security

[Completed] Professional Google Cyberse...

I'm Tri, a security engineer at Google. My department is Detection and Response. Let's see, what does my everyday look like? Well, of course I have the free lunch and coffee, which is nice. And then I finally get to my desk and I open up the SIEM to ...

Security starts with asset classification

[Completed] Professional Google Cyberse...

It can be really stressful when you have trouble finding something important. You're late to an appointment and can't find your keys! We all find ourselves in situations like these at one time or another. Believe it or not, organizations deal with ...

Common classification requirements

[Completed] Professional Google Cyberse...

Asset management is the process of tracking assets and the risks that affect them. The idea behind this process is simple: you can only protect what you know you have.  Previously, you learned that identifying, tracking, and classifying assets are all importa...

Security guidelines in action

[Completed] Professional Google Cyberse...

Organizations often face an overwhelming amount of risk. Developing a security plan from the beginning that addresses all risk can be challenging. This makes security frameworks a useful option. Previously, you learned about the NIST Cybersecurity Framework (...

The emergence of cloud security

[Completed] Professional Google Cyberse...

One of the most significant technology developments this century has been the emergence of cloud computing. The United Kingdom's National Cyber Security Centre defines cloud computing as, “An on-demand, massively scalable service, hosted on shared infrastructu...

Elements of a security plan

[Completed] Professional Google Cyberse...

Security is all about people, processes, and technology. It's a team effort, and I mean that literally. Protecting assets extends well beyond one person or a group of people in an IT department. The truth of the matter is that security is a culture...