Advanced Search
Search Results
812 total results found
Prepare for interviews
Great news! You’ve submitted your application and received a follow-up email requesting an interview. The work isn’t over yet, though—you still have a lot of preparation to do. That’s what you’re going to learn about in this reading! Prepare for the introduc...
Ask the interviewer questions
In this video, we'll take a little time to discuss additional strategies you can use during a job interview.In past job interviews, your potential employer may have asked: "Do you have any questions for me?" This type of question can be an opportunity for you ...
Karan: Interview tips from a hiring manager
Hi, I'm Karan.I'm a security engineering manager here at Google.As part of my job, I do participate in hiring candidates.And so far I've spoken to like hundreds of candidates, potential candidates, people who actually got into Google.Almost every time I meet s...
Develop an elevator pitch
Now, let's discuss a concept that can help you identify your strengths and allow you to highlight those strengths to others: An elevator pitch.An elevator pitch is a brief summary of your experience, skills, and background.It's called an elevator pitch because...
Learn more about developing an elevator pitch
When interviewing with potential employers, it’s important to communicate who you are, your value as a security professional, and what qualities you’re searching for in a potential job. A simple way to deliver this information succinctly is with an elevator pi...
Tips for interviewing remotely
A remote interview is an interview conducted virtually using video platform software. This type of interview provides an opportunity to connect with hiring managers and recruiters, even if you are not able to meet with them in person. Remote interviews also pr...
Emily: Overcome imposter syndrome
Hi, I'm Emily and I'm a program manager at Google.I work in our security education space.Imposter syndrome is a very real thing.There will be days where you feel like you're riding high, you're getting everything done, you're on top of your game.Then there are...
Wrap-up; Terms and definitions from Course 8, Module 5
You've done a great job completing this section of the course.Let's take a moment to review what we've covered.We started by discussing how to find and apply for jobs in the security field.Then, we explored how to create your resume.Next, we shared some strate...
Course wrap-up
Congratulations on completing the final course of the certificate program!We covered a lot of information, so let's take a moment to review.We started by discussing how to protect assets and communicate incidents by developing a security mindset.Then, we cover...
Course 8 glossary
Cybersecurity Terms and definitions from Course 8 B Business continuity plan: A document that outlines the procedures to sustain business operations during and after a significant disruption C Confidential data: Data that often has limits on the number ...
Recap of the Google Cybersecurity Certificate program
This certificate covered some rigorous security content.You could have given up at any point, but you didn't.And for that, you deserve to be proud of yourself!As we discussed at the beginning of this program, the security field is growing and in need of securi...
Congratulations on completing the Google Cybersecurity Certificate program!
You've just completed the Google cybersecurity certificate.What a remarkable accomplishment that shows just how committed you are to learning new skills that will allow you to pursue your career goals.On behalf of myself and my fellow course instructors, congr...
Showcase your work
Showcase your work Congratulations on earning your Google Cybersecurity Certificate! Now it’s time to let the world know about the skills you’ve gained to help advance your career. We recommend adding the completion of this certificate program to your res...
Claim your Google Cybersecurity Certificate badge!
Learners who complete all eight courses of the Google Cybersecurity Certificate are eligible to earn a digital badge from Credly and Google. A badge is a visual representation of a verified credential that you’ve earned. In this case, your credential is the Go...
Free resources for Google Cybersecurity Certificate graduates
Have you finished all 8 courses in the Google Cybersecurity Certificate? Congratulations! As a Google Cybersecurity Certificate graduate, you’ve unlocked exclusive job search resources. Sign up for these free resources, courtesy of Google. Notes: ...
Terms and definitions from the Professional Google Cybersecurity Specialization Certificate
A Absolute file path: The full file path, which starts from the root Access controls: Security controls that manage access, authorization, and accountability of information Active packet sniffing: A type of attack where data packets are manipulated in trans...
A career as a Junior (Associate) Security Analyst
In the Junior Security Analyst role, you will be a Triage Specialist. You will spend a lot of time triaging or monitoring the event logs and alerts. The responsibilities for a Junior Security Analyst or Tier 1 SOC Analyst include: Monitor and investigate t...
Create a cybersecurity portfolio
Throughout this certificate program, you will have multiple opportunities to develop a professional cybersecurity portfolio to showcase your security skills and knowledge. In this reading, you’ll learn what a portfolio is and why it’s important to develop a p...
Security Operations Center (SOC)
The core function of a SOC (Security Operations Center) is to investigate, monitor, prevent, and respond to threats in the cyber realm 24/7 or around the clock. Per McAfee's definition of a SOC, "Security operations teams are charged with monitoring and prote...
A day In the life of a Junior (Associate) Security Analyst
To understand the job responsibilities for a Junior (Associate) Security Analyst, let us first show you what a day in the life of the Junior Security Analyst looks like and why this is an exciting career journey. To be in the frontline is not always easy a...