Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

948 total results found

Explore debugging techniques

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Previously, you examined three types of errors you may encounter while working in Python and explored strategies for debugging these errors. This reading further explores these concepts with additional strategies and examples for debugging Python code. Types ...

Wrap-up

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Great work in this section!We focused on a few new topics that will help you put Python into practice in the security profession.First, we explored opening and reading files in Python.Security analysts work with a lot of log files, so the ability to do this is...

Reference guide: Python concepts from module 4

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

File operations The following functions, methods, and keywords are used with operations involving files. with Handles errors and manages external resources with open("logs.txt", "r") as file: Used to handle errors and manage external resources while ope...

Terms and definitions from Course 7, Module 4

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Glossary terms from module 4 Automation: The use of technology to reduce human and manual effort to perform common and repetitive tasks Conditional statement: A statement that evaluates code to determine if it meets a specified set of conditions Debugger: A...

Course wrap-up

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

As we wrap up this course, I want to congratulate you for your commitment to learning Python.You should feel accomplished having explored a programming language that's useful in the security field.Let's recap some of what we've learned.First, we covered basic ...

Reference guide: Python concepts from Course 7

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Google Cybersecurity Certificate   Comments The following syntax is used to create a comment. (A comment is a note programmers make about the intention behind their code.) # Starts a line that contains a Python comment # Print approved usernames Con...

Terms and definitions from Course 7

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

A Algorithm: A set of rules that solve a problem Argument (Python): The data brought into a function when it is called Automation: The use of technology to reduce human and manual effort to perform common and repetitive tasks B Boolean data: Data that c...

Introduction to Course 8

[Completed] Professional Google Cyberse...

Hello, and welcome to the course!I'm Dion, a Program Manager at Google.I've worked in security for the past five years in areas ranging from risk management to insider threat detection.I'll be your first instructor in this course.As a security analyst, you'll ...

Course 8 content

[Completed] Professional Google Cyberse...

Each course of this certificate program is broken into modules. You can complete courses at your own pace, but the module breakdowns are designed to help you finish the entire Google Cybersecurity Certificate in about six months. What’s to come? Here’s a quic...

Dion: My personal career journey

[Completed] Professional Google Cyberse...

Hi, I'm Dion.I am a program manager at Google.I am a part of the detection and response team which falls under the privacy, safety, and security organization.My favorite part of my job is understanding that there are threats that we encounter day by day.And my...

Helpful resources and tips

[Completed] Professional Google Cyberse...

  As a learner, you can choose to complete one or multiple courses in this program. However, to obtain the Google Cybersecurity Certificate, you must complete all the courses. This reading describes what is required to obtain a certificate and best practices ...

Welcome to module 1

[Completed] Professional Google Cyberse...

Welcome to the first section of the course!In the next several videos, we'll discuss what it means to have a security mindset, and how you'll use that mindset to protect an organization's assets and data.Then, we'll explore the process of incident escalation i...

firefox yt better audio scaling for when im studying

Anything related to windows

// ==UserScript== // @name Youtube Music fix volume ratio // @namespace http://tampermonkey.net/ // @version 0.4 // @description Makes the YouTube music volume slider exponential so it's easier to select lower volum...

Security as a mindset

[Completed] Professional Google Cyberse...

Let's take a little time to discuss a concept that would help you throughout your security career: having a security mindset.In previous courses, we discussed various threats, risks, and vulnerabilities and how they can impact organizational operations and the...

Data and asset classification

[Completed] Professional Google Cyberse...

Protecting an organization’s business operations and assets from security threats, risks, and vulnerabilities is important. You previously learned what it means to have a security mindset. That mindset can help you identify and reduce security risks and potent...

Detect and protect without neglect

[Completed] Professional Google Cyberse...

Welcome back!In earlier courses, we discussed the impact that security incidents can have on the critical data and assets of an organization.If data and assets are compromised, it can lead to financial pains for an organization.It can even lead to regulatory f...

Disaster recovery and business continuity

[Completed] Professional Google Cyberse...

The role of a security professional is to ensure a company’s data and assets are protected from threats, risks, and vulnerabilities. However, sometimes things don’t go as planned. There are times when security incidents happen. You’ve already learned that secu...

Juliana's story: Asset protection

[Completed] Professional Google Cyberse...

Meet Juliana Soto, who recently completed an online cybersecurity certificate program and was hired as a cybersecurity analyst for Right-On-Time Payment Solutions, a fictional payment processing company allowing individuals to transfer money to friends and fam...

Wrap-up; Terms and definitions from Course 8, Module 1

[Completed] Professional Google Cyberse...

You've had an opportunity to learn more about the important role an entry-level analyst plays in protecting the data and assets of an organization.Let's quickly review what we covered.We started off by discussing the importance of having a security mindset, in...

Welcome to module 2

[Completed] Professional Google Cyberse...

I'm excited that you could join me today!Previously, you learned about the importance of various asset types.You also learned about the relationship between incidents and events.Now, we'll focus on escalating those incidents and events to the right people.Prot...