Welcome to the exciting world of cybersecurity-Get started with the certificate program
Welcome to the Google Cybersecurity Certificate
()
Google Cybersecurity Certificate overview
Course 1 overview
Welcome to week 1
()
Helpful resources and tips
Participate in program surveys
Welcome to the exciting world of cybersecurity-Introduction to cybersecurity
Introduction to cybersecurity
()
Toni: My path to cybersecurity
()
Responsibilities of an entry-level cybersecurity analyst
()
Nikki: A day in the life of a security engineer
()
Common cybersecurity terminology
Welcome to the exciting world of cybersecurity-Core skills for cybersecurity professionals
Core skills for cybersecurity professionals
()
Veronica: My path to working in cybersecurity
()
Transferable and technical cybersecurity skills
The importance of cybersecurity
()
Welcome to the exciting world of cybersecurity-Review: Welcome to the exciting world of cybersecurity
Wrap-up
()
Glossary terms from module 1
The evolution of cybersecurity-The history of cybersecurity
Welcome to module 2
()
Past cybersecurity attacks
()
Attacks in the digital age
()
Common attacks and their effectiveness
Sean: Keep your cool during a data breach
()
The evolution of cybersecurity-The eight CISSP security domains
Introduction to the eight CISSP security domains, Part 1
()
Introduction to the eight CISSP security domains, Part 2
()
Determine the type of attack
Understand attackers
The evolution of cybersecurity-Review: The evolution of cybersecurity
Wrap-up
()
Glossary terms from module 2
Protect against threats, risks, and vulnerabilities-Frameworks and controls
Welcome to module 3
()
Introduction to security frameworks and controls
()
Secure design
()
Controls, frameworks, and compliance
Heather: Protect sensitive data and information
()
Protect against threats, risks, and vulnerabilities-Ethics in cybersecurity
Ethics in cybersecurity
()
Ethical concepts that guide cybersecurity decisions
Holly: The importance of ethics as a cybersecurity professional
()
Protect against threats, risks, and vulnerabilities-Review: Protect against threats, risks, and vulnerabilities
Wrap-up
()
Glossary terms from module 3
Cybersecurity tools and programming languages-Important cybersecurity tools
Welcome to module 4
()
Common cybersecurity tools
()
Tools for protecting business operations
Cybersecurity tools and programming languages-Core cybersecurity knowledge and skills
Introduction to Linux, SQL, and Python
()
Use tools to protect business operations
Create a cybersecurity portfolio
Portfolio Activity Exemplar: Draft a professional statement
Cybersecurity tools and programming languages-Review: Cybersecurity tools and programming languages
Wrap-up
()
Glossary terms from module 4
Cybersecurity tools and programming languages-Congratulations on completing Course 1!
Course wrap-up
()
Course 1 glossary
Get started on the next course