Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

984 total results found

Types of joins

[Completed] Professional Google Cyberse... SQL and Databases

Welcome back. I hope you enjoyed working on inner joins. In the previous video and exercises, we saw how inner joins can be useful by only returning records that share a value in specify columns. However, in some situations, we might need all of the ...

Compare types of joins

[Completed] Professional Google Cyberse... SQL and Databases

Previously, you explored SQL joins and how to use them to join data from multiple tables when these tables share a common column. You also examined how there are different types of joins, and each of them returns different rows from the tables being joined. In...

Continuous learning in SQL

[Completed] Professional Google Cyberse... SQL and Databases

You've explored a lot about SQL, including applying filters to SQL queries and joining multiple tables together in a query.  There's still more that you can do with SQL. This reading will explore an example of something new you can add to your SQL toolbox: agg...

Wrap-up; Glossary terms from week 4

[Completed] Professional Google Cyberse... SQL and Databases

Congratulations! We've made it together through the end of our focus on SQL. You've put in a lot of work and learned an important tool that will help you on your journey as a security analyst. Let's take a moment to go through all of the topics you l...

Course wrap-up

[Completed] Professional Google Cyberse...

You made it to the end of this course! Congratulations—you did it! I hope you are proud of all you learned. The focus of this course was computing basics. Understanding the basics of computing is a valuable skill as you transition into your c...

Introduction to Course 5

[Completed] Professional Google Cyberse...

What do you picture when you think about the security field? This might make you think of a dark room with people hunched over their computers. Maybe you picture a person in a lab carefully analyzing evidence. Or, maybe you imagine a guard standing...

Course 5 overview

[Completed] Professional Google Cyberse...

Hello, and welcome to Assets, Threats, and Vulnerabilities, the fifth course in the Google Cybersecurity Certificate. You’re on an exciting journey! By the end of this course, you’ll build an understanding of the wide range of assets organizations must protec...

Da'Queshia: My path to cybersecurity

[Completed] Professional Google Cyberse...

Hi. My name is Da'Queshia. I'm a security engineer. That basically means I work securing Google's products so users like you aren't vulnerable. Before I entered cybersecurity, I worked installing Internet. I also worked at a chip factory. I worked ...

Understand risks, threats, and vulnerabilities

[Completed] Professional Google Cyberse...

When security events occur, you’ll need to work in close coordination with others to address the problem. Doing so quickly requires clear communication between you and your team to get the job done. Previously, you learned about three foundational security te...

Tri: Life in asset security

[Completed] Professional Google Cyberse...

I'm Tri, a security engineer at Google. My department is Detection and Response. Let's see, what does my everyday look like? Well, of course I have the free lunch and coffee, which is nice. And then I finally get to my desk and I open up the SIEM to ...

Security starts with asset classification

[Completed] Professional Google Cyberse...

It can be really stressful when you have trouble finding something important. You're late to an appointment and can't find your keys! We all find ourselves in situations like these at one time or another. Believe it or not, organizations deal with ...

Common classification requirements

[Completed] Professional Google Cyberse...

Asset management is the process of tracking assets and the risks that affect them. The idea behind this process is simple: you can only protect what you know you have.  Previously, you learned that identifying, tracking, and classifying assets are all importa...

Security guidelines in action

[Completed] Professional Google Cyberse...

Organizations often face an overwhelming amount of risk. Developing a security plan from the beginning that addresses all risk can be challenging. This makes security frameworks a useful option. Previously, you learned about the NIST Cybersecurity Framework (...

The emergence of cloud security

[Completed] Professional Google Cyberse...

One of the most significant technology developments this century has been the emergence of cloud computing. The United Kingdom's National Cyber Security Centre defines cloud computing as, “An on-demand, massively scalable service, hosted on shared infrastructu...

Elements of a security plan

[Completed] Professional Google Cyberse...

Security is all about people, processes, and technology. It's a team effort, and I mean that literally. Protecting assets extends well beyond one person or a group of people in an IT department. The truth of the matter is that security is a culture...

The NIST Cybersecurity Framework

[Completed] Professional Google Cyberse...

Having a plan is just one part of securing assets. Once the plan is in action, the other part is making sure everyone's following along. In security, we call this compliance. Compliance is the process of adhering to internal stand...

Wrap-up; terms and definitions from course 5, week 1

[Completed] Professional Google Cyberse...

Well done! You made it to the end of this section! Being a security practitioner takes commitment and a desire to learn. A big part of the job involves keeping current with best practices and emerging trends. Thinking back on my own journey into th...

The data lifecycle

[Completed] Professional Google Cyberse...

Organizations of all sizes handle a large amount of data that must be kept private. You learned that data can be vulnerable whether it is at rest, in use, or in transit. Regardless of the state it is in, information should be kept private by limiting access an...

Things You Can Do to Make Security Worse in Your Network - Ignite Style by Jack Rhysider

yt transcripts tech ecucation edition

i used chat gpt voxscript to get this coz its great, but its 7+ years old and he stutters allot and didn't have allot of skill in making videos yet Introduction Things you can do to make security worse in your network. Why would you want to do this? Well, ...

Welcome to week 2

[Completed] Professional Google Cyberse...

I was fascinated by a world-wide malware event that happened in 2017. I started watching videos and preparing to take certification tests, just like you. I felt overwhelmed at first, but my curiosity and passion has driven me to continue learning in ...