Course

Google Cybersecurity

Google

Google's Cybersecurity certificate program is designed to prepare you for entry-level roles in cybersecurity without the need for a degree or prior experience. This 6-month program, comprising 8 courses, is delivered by subject matter experts at Google and covers essential skills and knowledge required in the field of cybersecurity.

Throughout the program, you will gain insights into the importance of cybersecurity practices for organizations and learn to identify and mitigate common risks, threats, and vulnerabilities. Additionally, you will develop hands-on experience with tools such as Security Information and Event Management (SIEM) and gain proficiency in Python, Linux, and SQL. Upon completion, you can directly apply for jobs with Google and numerous other top employers in the U.S., including American Express, Deloitte, and T-Mobile.

  • Prepare for a new career in the high-growth field of cybersecurity
  • Gain in-demand skills and hands-on experience
  • Connect with top employers, including Google and over 150 U.S. companies

Certificate Available ✔

Get Started / More Info
Google Cybersecurity
Course Modules

Google's Cybersecurity program consists of 8 courses designed to equip you with the fundamental skills and knowledge needed to succeed in the field of cybersecurity. From understanding security ethics and common tools to gaining hands-on experience with Python, Linux, and SQL, this program prepares you for entry-level roles and connects you with top employers.

Foundations of Cybersecurity

Recognize core skills and knowledge needed to become a cybersecurity analyst

Identify how security attacks impact business operations

Explain security ethics

Identify common tools used by cybersecurity analysts

Play It Safe: Manage Security Risks

Identify the primary threats, risks, and vulnerabilities to business operations

Examine how organizations use security frameworks and controls to protect business operations

Define commonly used Security Information and Event Management (SIEM) tools

Use a playbook to respond to threats, risks, and vulnerabilities

Connect and Protect: Networks and Network Security

Define the types of networks and components of networks

Illustrate how data is sent and received over a network

Understand how to secure a network against intrusion tactics

Describe system hardening techniques

Tools of the Trade: Linux and SQL

Explain the relationship between operating systems, applications, and hardware

Compare a graphical user interface to a command line interface

Navigate and manage the file system using Linux commands via the Bash shell

Use SQL to retrieve information from a database

Assets, Threats, and Vulnerabilities

Classify assets

Analyze an attack surface to find risks and vulnerabilities

Identify threats, such as social engineering, malware, and web-based exploits

Summarize the threat modeling process

Sound the Alarm: Detection and Response

Identify the steps to contain, eradicate, and recover from an incident

Analyze packets to interpret network communications

Understand basic syntax, components of signatures, and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools

Perform queries in Security Information and Event Management (SIEM) tools to investigate an event

Automate Cybersecurity Tasks with Python

Explain how the Python programming language is used in cybersecurity

Create new, user-defined Python functions

Use regular expressions to extract information from text

Practice debugging code

Put It to Work: Prepare for Cybersecurity Jobs

Determine when and how to escalate a security incident

Engage with the cybersecurity community

Find and apply for cybersecurity jobs

Prepare for job interviews

More Computer Security and Networks Courses

Asymmetric Cryptography and Key Management

University of Colorado System

Learn about asymmetric cryptography, RSA algorithm, Diffie-Hellman key exchange, and key distribution in this comprehensive course. Gain insights into public-key...

Introduction to Blockchain for Financial Services

INSEAD

Introduction to Blockchain for Financial Services is a comprehensive course that delves into the limitations of the internet for economic activity, explaining the...

Google サイバーセキュリティ

Google

Google サイバーセキュリティプログラムは、即戦力として活躍できるスキルを短期間で習得できる新たなキャリアの第一歩です。...

Wireshark para Principiantes: Paquetes de Captura

Coursera Project Network

Learn to capture network traffic using Wireshark, from installation to analysis. Develop essential skills to troubleshoot network issues and enhance data security....