Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

948 total results found

Python functions in cybersecurity

[Completed] Professional Google Cyberse... module 2

Previously, you explored how to define and call your own functions. In this reading, you’ll revisit what you learned about functions and examine how functions can improve efficiency in a cybersecurity setting. Functions in cybersecurity A function is a sec...

Introduction to functions

[Completed] Professional Google Cyberse... module 2

As the complexity of our programs grow, it's also likely that we'll reuse the same lines of code.Writing this code multiple times would be time-consuming, but luckily we have a way to manage this.We can use functions.A function is a section of code that can be...

Create a basic function

[Completed] Professional Google Cyberse... module 2

Let's start our exploration of user-defined functions by creating and then running a very simple function.The first thing we need to do is define our function.When we define a function, we basically tell Python that it exists.The def keyword is needed for this...

Use parameters in functions

[Completed] Professional Google Cyberse... module 2

Previously, we defined and called our first function.It didn't require any information from outside the function, but other functions might.This means we need to talk about using parameters in functions.In Python, a parameter is an object that is included in a...

Return statements

[Completed] Professional Google Cyberse... module 2

We previously learned how we can pass arguments into a function.We can do more than pass information into a function.We can also send information out of one!Return statements allow us to do this.A return statement is a Python statement that executes inside a f...

Functions and variables

[Completed] Professional Google Cyberse... module 2

Previously, you focused on working with multiple parameters and arguments in functions and returning information from functions. In this reading, you’ll review these concepts. You'll also be introduced to a new concept: global and local variables. Working wit...

Explore built-in functions

[Completed] Professional Google Cyberse... module 2

Now that we know how to create our own functions, let's also explore a few of Python's built-in functions.As we discussed previously, built-in functions are functions that exist within Python and can be called directly.Our only job is to call them by their nam...

Work with built-in functions

[Completed] Professional Google Cyberse... module 2

Previously, you explored built-in functions in Python, including print(), type(), max(), and sorted(). Built-in functions are functions that exist within Python and can be called directly. In this reading, you’ll explore these further and also learn about the ...

Activity: Define and call a function

[Completed] Professional Google Cyberse... module 2

Introduction As a security analyst, when you're writing out Python code to automate a certain task, you'll often find yourself needing to reuse the same block of code more than once. This is why functions are important. You can call that function whenever...

Modules and libraries

[Completed] Professional Google Cyberse... module 2

Hello again!Previously, we learned about built-in functions in Python.Built-in functions come standard with every version of Python and consist of functions such as print(), type(), max(), and many more.To access additional pre-built functions, you can import ...

Import modules and libraries in Python

[Completed] Professional Google Cyberse... module 2

Previously, you explored libraries and modules. You learned that a module is a Python file that contains additional functions, variables, classes, and any kind of runnable code. You also learned that a library is a collection of modules that provide code users...

Code readability

[Completed] Professional Google Cyberse... module 2

Welcome back!One of the advantages to programming in Python is that it's a very readable language.It also helps that the Python community shares a set of guidelines that promote clean and neat code.These are called style guides.A style guide is a manual that i...

Ensure proper syntax and readability in Python

[Completed] Professional Google Cyberse... module 2

Previously, you were introduced to the PEP 8 style guide and its stylistic guidelines for programmers working in Python. You also learned about how adding comments and using correct indentation makes your code more readable. Additionally, correct indentation e...

Dorsa: Use Python efficiently on a cybersecurity team

[Completed] Professional Google Cyberse... module 2

Hi, my name is Dorsa and I'm a security engineer.What I love the most about my job is that I get to look at different infrastructures and system designs on a daily basis.One piece of advice for individuals who are starting out in their cybersecurity profession...

Wrap-up; Reference guide: Python concepts from module 2

[Completed] Professional Google Cyberse... module 2

Great work on making it this far in the Python course!You've put in a lot of work and effort towards learning more about how you can use Python effectively and efficiently.Let's quickly recap the concepts you learned throughout the videos.First, we started by ...

Glossary terms from module 2

[Completed] Professional Google Cyberse... module 2

Terms and definitions from Course 7, Module 2 Argument (Python): The data brought into a function when it is called Built-in function: A function that exists within Python and can be called directly Comment: A note programmers make about the intention behin...

Welcome to module 3

[Completed] Professional Google Cyberse... module 3

As a security analyst,you'll work with a lot of data.Being able to develop solutions formanaging this data is very important.What we're about to learn inPython will help you with that.Previously, we setfoundations for what we're going to do in this section.We ...

String operations

[Completed] Professional Google Cyberse... module 3

Knowing how to work with the string data in security is important. For example, you might find yourself working with usernames to find patterns in login information. We're going to revisit the string data type and learn how to work with it in...

String indices and slices

[Completed] Professional Google Cyberse... module 3

In security, there are a variety of reasons we might need to search through a string. For example, we might need to locate a username in a security log. Or, if we learn that a certain IP address is associated with malware, we might search for...

Strings and the security analyst

[Completed] Professional Google Cyberse... module 3

The ability to work with strings is important in the cybersecurity profession. Previously, you were introduced to several ways to work with strings, including functions and methods. You also learned how to extract elements in strings using bracket notation and...