Advanced Search
Search Results
989 total results found
String operations
Knowing how to work with the string data in security is important. For example, you might find yourself working with usernames to find patterns in login information. We're going to revisit the string data type and learn how to work with it in...
String indices and slices
In security, there are a variety of reasons we might need to search through a string. For example, we might need to locate a username in a security log. Or, if we learn that a certain IP address is associated with malware, we might search for...
Strings and the security analyst
The ability to work with strings is important in the cybersecurity profession. Previously, you were introduced to several ways to work with strings, including functions and methods. You also learned how to extract elements in strings using bracket notation and...
List operations in Python
Another data type we discussed previously is the list.Lists are useful because they allow you to store multiple pieces of data in a single variable.In the security profession, you will work with a variety of lists.For example, you may have a list of IP address...
Write a simple algorithm
In our everyday lives, we frequently follow rules for solving problems.As a simple example, imagine you want a cup of coffee.If you've made coffee many times, then you likely follow a process to make it.First, you grab your favorite mug.Then, you put water int...
Lists and the security analyst
Previously, you examined how to use bracket notation to access and change elements in a list and some fundamental methods for working with lists. This reading will review these concepts with new examples, introduce theĀ .index() method as it applies to lists, a...
Regular expressions in Python
We've already learned a lot about working with strings.This includes working with their positional indices and slicing them.In the previous video, we applied these to extract the first three digits from a list of IP addresses.In this video, we're going to focu...
More about regular expressions
You were previously introduced to regular expressions and a couple of symbols that you can use to construct regular expression patterns. In this reading, you'll explore additional regular expression symbols that can be used in a cybersecurity context. You'll a...
Wrap-up
Congratulations!We accomplished a lot together.Let's take time to quickly go through all the new concepts we covered.We started this course by focusing on working with strings and lists.We learned methods that work specifically with these data types.We also le...
New Page
Reference guide: Python concepts from module 3; Terms and definitions from Course 7, Module 3
Built-in functions The following built-in functions are commonly used in Python. str() Converts the input object to a string str(10) Converts the integer 10 to the string "10" len() Returns the number of elements in an object print(len("secur...
Welcome to module 4
We've learned a lot about Python together already, and we still have more to cover.In this section, we're going to explore how a security analyst like yourself puts Python into practice.As a security analyst, you will likely work with security logs that captur...
Automate cybersecurity tasks with Python
Automation is a key concern in the security profession.For example, it would be difficult to monitor each individual attempt to access the system.For this reason, it's helpful to automate the security controls put in place to keep malicious actors out of the s...
Essential Python components for automation
Throughout this course, you explored coding in Python. You've focused on variables, conditional statements, iterative statements, functions, and a variety of ways to work with strings and lists. In this reading, you will explore why these are all essential com...
Clancy: Continual learning and Python
My name is Clancy and I'm a Senior Security Engineer.My team here at Google is part of an ongoing effort to protect Google's sensitive information, customer data, PII.Everyday is different at my job, it allows me to use different skills, knowledge sets, and no...
Access a text file in Python
Security professionals are often tasked with reviewing log files.These files may have thousands of entries, so it can be helpful to automate this process, and that's where Python comes in.Let's start by importing a simple text file that just contains a few wor...
Import files into Python
Previously, you explored how to open files in Python, convert them into strings, and read them. In this reading, you'll review the syntax needed for this. You'll also focus on why the ability to work with files is important for security analysts using Python, ...
Parse a text file in Python
Now that you know how to import text files into Python, we're going to take this one step further and learn how to give them a structure.This will allow us to analyze them more easily.This process is often referred to as parsing.Parsing is the process of conve...