Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

989 total results found

Work with files in Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

You previously explored how to open files in Python as well as how to read them and write to them. You also examined how to adjust the structure of file contents through the .split() method. In this reading, you'll review the .split() method, and you'll also l...

Develop a parsing algorithm in Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

We're now going to bring all of the pieces together to import a file, parse it, and implement a simple algorithm to help us detect suspicious login attempts.In this video, we want to create a program that runs every time a new user logs in and checks if that u...

Portfoleo project: Algorythm for file updates in Python

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Algorithm for file updates in Python Project description this script automates management of an ip allowlist. the allowlist is in a file, and the script reads and writes to file. Open the file that contains the allow list import_file = "allow_list.txt" ...

Debugging strategies

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

As a security analyst, you might be required to read or write code.One of the biggest challenges is getting it to run and function properly.In fact, fixing complex errors in code can sometimes take up just as much, if not more, time than writing your code.This...

Matt: Learning from mistakes

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

My name is Matt.I'm a software engineer working in cybersecurity.When I was in high school, what I really want to do is music, I was a musician.I went to music school for jazz trombone.Partway through that process, I realized, no, bandleader in their right min...

Apply debugging strategies

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Let's say our co-workers need some help getting their code to work, and we've offered to debug their code to make sure it runs smoothly.First, we need to know about the purpose of the code.In this case, the purpose of the code is to parse a single line from a ...

Explore debugging techniques

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Previously, you examined three types of errors you may encounter while working in Python and explored strategies for debugging these errors. This reading further explores these concepts with additional strategies and examples for debugging Python code. Types ...

Wrap-up

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Great work in this section!We focused on a few new topics that will help you put Python into practice in the security profession.First, we explored opening and reading files in Python.Security analysts work with a lot of log files, so the ability to do this is...

Reference guide: Python concepts from module 4

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

File operations The following functions, methods, and keywords are used with operations involving files. with Handles errors and manages external resources with open("logs.txt", "r") as file: Used to handle errors and manage external resources while ope...

Terms and definitions from Course 7, Module 4

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Glossary terms from module 4 Automation: The use of technology to reduce human and manual effort to perform common and repetitive tasks Conditional statement: A statement that evaluates code to determine if it meets a specified set of conditions Debugger: A...

Course wrap-up

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

As we wrap up this course, I want to congratulate you for your commitment to learning Python.You should feel accomplished having explored a programming language that's useful in the security field.Let's recap some of what we've learned.First, we covered basic ...

Reference guide: Python concepts from Course 7

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

Google Cybersecurity Certificate   Comments The following syntax is used to create a comment. (A comment is a note programmers make about the intention behind their code.) # Starts a line that contains a Python comment # Print approved usernames Con...

Terms and definitions from Course 7

[Completed] Professional Google Cyberse... module 4 (36% of the course lmfao)

A Algorithm: A set of rules that solve a problem Argument (Python): The data brought into a function when it is called Automation: The use of technology to reduce human and manual effort to perform common and repetitive tasks B Boolean data: Data that c...

Introduction to Course 8

[Completed] Professional Google Cyberse...

Hello, and welcome to the course!I'm Dion, a Program Manager at Google.I've worked in security for the past five years in areas ranging from risk management to insider threat detection.I'll be your first instructor in this course.As a security analyst, you'll ...

Course 8 content

[Completed] Professional Google Cyberse...

Each course of this certificate program is broken into modules. You can complete courses at your own pace, but the module breakdowns are designed to help you finish the entire Google Cybersecurity Certificate in about six months. What’s to come? Here’s a quic...

Dion: My personal career journey

[Completed] Professional Google Cyberse...

Hi, I'm Dion.I am a program manager at Google.I am a part of the detection and response team which falls under the privacy, safety, and security organization.My favorite part of my job is understanding that there are threats that we encounter day by day.And my...

Helpful resources and tips

[Completed] Professional Google Cyberse...

  As a learner, you can choose to complete one or multiple courses in this program. However, to obtain the Google Cybersecurity Certificate, you must complete all the courses. This reading describes what is required to obtain a certificate and best practices ...

Welcome to module 1

[Completed] Professional Google Cyberse...

Welcome to the first section of the course!In the next several videos, we'll discuss what it means to have a security mindset, and how you'll use that mindset to protect an organization's assets and data.Then, we'll explore the process of incident escalation i...