Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

812 total results found

Course wrap-up

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

As we wrap up this course, I want to congratulate you for your commitment to learning Python.You should feel accomplished having explored a programming language that's useful in the security field.Let's recap some of what we've learned.First, we covered basic ...

Reference guide: Python concepts from Course 7

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Google Cybersecurity Certificate   Comments The following syntax is used to create a comment. (A comment is a note programmers make about the intention behind their code.) # Starts a line that contains a Python comment # Print approved usernames Con...

Terms and definitions from Course 7

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

A Algorithm: A set of rules that solve a problem Argument (Python): The data brought into a function when it is called Automation: The use of technology to reduce human and manual effort to perform common and repetitive tasks B Boolean data: Data that c...

Introduction to Course 8

[Completed] Professional Google Cyberse...

Hello, and welcome to the course!I'm Dion, a Program Manager at Google.I've worked in security for the past five years in areas ranging from risk management to insider threat detection.I'll be your first instructor in this course.As a security analyst, you'll ...

Course 8 content

[Completed] Professional Google Cyberse...

Each course of this certificate program is broken into modules. You can complete courses at your own pace, but the module breakdowns are designed to help you finish the entire Google Cybersecurity Certificate in about six months. What’s to come? Here’s a quic...

Dion: My personal career journey

[Completed] Professional Google Cyberse...

Hi, I'm Dion.I am a program manager at Google.I am a part of the detection and response team which falls under the privacy, safety, and security organization.My favorite part of my job is understanding that there are threats that we encounter day by day.And my...

Helpful resources and tips

[Completed] Professional Google Cyberse...

  As a learner, you can choose to complete one or multiple courses in this program. However, to obtain the Google Cybersecurity Certificate, you must complete all the courses. This reading describes what is required to obtain a certificate and best practices ...

Welcome to module 1

[Completed] Professional Google Cyberse...

Welcome to the first section of the course!In the next several videos, we'll discuss what it means to have a security mindset, and how you'll use that mindset to protect an organization's assets and data.Then, we'll explore the process of incident escalation i...

firefox yt better audio scaling for when im studying

Anything related to windows

// ==UserScript== // @name Youtube Music fix volume ratio // @namespace http://tampermonkey.net/ // @version 0.4 // @description Makes the YouTube music volume slider exponential so it's easier to select lower volum...

Security as a mindset

[Completed] Professional Google Cyberse...

Let's take a little time to discuss a concept that would help you throughout your security career: having a security mindset.In previous courses, we discussed various threats, risks, and vulnerabilities and how they can impact organizational operations and the...

Data and asset classification

[Completed] Professional Google Cyberse...

Protecting an organization’s business operations and assets from security threats, risks, and vulnerabilities is important. You previously learned what it means to have a security mindset. That mindset can help you identify and reduce security risks and potent...

Detect and protect without neglect

[Completed] Professional Google Cyberse...

Welcome back!In earlier courses, we discussed the impact that security incidents can have on the critical data and assets of an organization.If data and assets are compromised, it can lead to financial pains for an organization.It can even lead to regulatory f...

Disaster recovery and business continuity

[Completed] Professional Google Cyberse...

The role of a security professional is to ensure a company’s data and assets are protected from threats, risks, and vulnerabilities. However, sometimes things don’t go as planned. There are times when security incidents happen. You’ve already learned that secu...

Juliana's story: Asset protection

[Completed] Professional Google Cyberse...

Meet Juliana Soto, who recently completed an online cybersecurity certificate program and was hired as a cybersecurity analyst for Right-On-Time Payment Solutions, a fictional payment processing company allowing individuals to transfer money to friends and fam...

Wrap-up; Terms and definitions from Course 8, Module 1

[Completed] Professional Google Cyberse...

You've had an opportunity to learn more about the important role an entry-level analyst plays in protecting the data and assets of an organization.Let's quickly review what we covered.We started off by discussing the importance of having a security mindset, in...

Welcome to module 2

[Completed] Professional Google Cyberse...

I'm excited that you could join me today!Previously, you learned about the importance of various asset types.You also learned about the relationship between incidents and events.Now, we'll focus on escalating those incidents and events to the right people.Prot...

The importance of escalation

[Completed] Professional Google Cyberse...

Security analysts are hired to protect company assets and data, including knowing when and how to escalate security incidents.In this video, we'll define security incident escalation and discuss your role in making decisions that help protect your organization...

The importance of escalation

[Completed] Professional Google Cyberse...

Security analysts are hired to protect company assets and data, including knowing when and how to escalate security incidents.In this video, we'll define security incident escalation and discuss your role in making decisions that help protect your organization...

Escalate with a purpose

[Completed] Professional Google Cyberse...

You previously learned about security incident escalation and the skills needed to help you escalate incidents. In this reading, you’ll learn the importance of escalating security issues and the potential impact of failing to escalate an issue.  Incident esca...

Prepare to escalate through security recognition

[Completed] Professional Google Cyberse...

Previously, we defined what it means to escalate an incident.We also discussed the skills needed to properly escalate incidents when the time comes.In this video, we're going to cover a few incident classification types to be aware of: malware infection, unaut...