Advanced Search
Search Results
812 total results found
Course wrap-up
As we wrap up this course, I want to congratulate you for your commitment to learning Python.You should feel accomplished having explored a programming language that's useful in the security field.Let's recap some of what we've learned.First, we covered basic ...
Reference guide: Python concepts from Course 7
Google Cybersecurity Certificate Comments The following syntax is used to create a comment. (A comment is a note programmers make about the intention behind their code.) # Starts a line that contains a Python comment # Print approved usernames Con...
Terms and definitions from Course 7
A Algorithm: A set of rules that solve a problem Argument (Python): The data brought into a function when it is called Automation: The use of technology to reduce human and manual effort to perform common and repetitive tasks B Boolean data: Data that c...
Introduction to Course 8
Hello, and welcome to the course!I'm Dion, a Program Manager at Google.I've worked in security for the past five years in areas ranging from risk management to insider threat detection.I'll be your first instructor in this course.As a security analyst, you'll ...
Course 8 content
Each course of this certificate program is broken into modules. You can complete courses at your own pace, but the module breakdowns are designed to help you finish the entire Google Cybersecurity Certificate in about six months. What’s to come? Here’s a quic...
Dion: My personal career journey
Hi, I'm Dion.I am a program manager at Google.I am a part of the detection and response team which falls under the privacy, safety, and security organization.My favorite part of my job is understanding that there are threats that we encounter day by day.And my...
Helpful resources and tips
As a learner, you can choose to complete one or multiple courses in this program. However, to obtain the Google Cybersecurity Certificate, you must complete all the courses. This reading describes what is required to obtain a certificate and best practices ...
Welcome to module 1
Welcome to the first section of the course!In the next several videos, we'll discuss what it means to have a security mindset, and how you'll use that mindset to protect an organization's assets and data.Then, we'll explore the process of incident escalation i...
firefox yt better audio scaling for when im studying
// ==UserScript== // @name Youtube Music fix volume ratio // @namespace http://tampermonkey.net/ // @version 0.4 // @description Makes the YouTube music volume slider exponential so it's easier to select lower volum...
Security as a mindset
Let's take a little time to discuss a concept that would help you throughout your security career: having a security mindset.In previous courses, we discussed various threats, risks, and vulnerabilities and how they can impact organizational operations and the...
Data and asset classification
Protecting an organization’s business operations and assets from security threats, risks, and vulnerabilities is important. You previously learned what it means to have a security mindset. That mindset can help you identify and reduce security risks and potent...
Detect and protect without neglect
Welcome back!In earlier courses, we discussed the impact that security incidents can have on the critical data and assets of an organization.If data and assets are compromised, it can lead to financial pains for an organization.It can even lead to regulatory f...
Disaster recovery and business continuity
The role of a security professional is to ensure a company’s data and assets are protected from threats, risks, and vulnerabilities. However, sometimes things don’t go as planned. There are times when security incidents happen. You’ve already learned that secu...
Juliana's story: Asset protection
Meet Juliana Soto, who recently completed an online cybersecurity certificate program and was hired as a cybersecurity analyst for Right-On-Time Payment Solutions, a fictional payment processing company allowing individuals to transfer money to friends and fam...
Wrap-up; Terms and definitions from Course 8, Module 1
You've had an opportunity to learn more about the important role an entry-level analyst plays in protecting the data and assets of an organization.Let's quickly review what we covered.We started off by discussing the importance of having a security mindset, in...
Welcome to module 2
I'm excited that you could join me today!Previously, you learned about the importance of various asset types.You also learned about the relationship between incidents and events.Now, we'll focus on escalating those incidents and events to the right people.Prot...
The importance of escalation
Security analysts are hired to protect company assets and data, including knowing when and how to escalate security incidents.In this video, we'll define security incident escalation and discuss your role in making decisions that help protect your organization...
The importance of escalation
Security analysts are hired to protect company assets and data, including knowing when and how to escalate security incidents.In this video, we'll define security incident escalation and discuss your role in making decisions that help protect your organization...
Escalate with a purpose
You previously learned about security incident escalation and the skills needed to help you escalate incidents. In this reading, you’ll learn the importance of escalating security issues and the potential impact of failing to escalate an issue. Incident esca...
Prepare to escalate through security recognition
Previously, we defined what it means to escalate an incident.We also discussed the skills needed to properly escalate incidents when the time comes.In this video, we're going to cover a few incident classification types to be aware of: malware infection, unaut...