Course Code: googlecyberpro
Duration: 35 hours
Prerequisites:
  • No degree or experience required.
Overview:

In this program, you’ll learn in-demand skills that will have you job-ready in a very short time. No degree or experience required.

What you'll learn

  • Understand the importance of cybersecurity practices and their impact for organizations.

  • Identify common risks, threats, and vulnerabilities, as well as techniques to mitigate them.

  • Protect networks, devices, people, and data from unauthorized access and cyberattacks using Security Information and Event Management (SIEM) tools.

  • Gain hands-on experience with Python, Linux, and SQL.

Course Outline:

Foundations of Cybersecurity

  • Recognize core skills and knowledge needed to become a cybersecurity analyst

  • Identify how security attacks impact business operations

  • Explain security ethics

  • Identify common tools used by cybersecurity analysts

Play It Safe: Manage Security Risks

  • Identify the primary threats, risks, and vulnerabilities to business operations

  • Examine how organizations use security frameworks and controls to protect business operations

  • Define commonly used Security Information and Event Management (SIEM) tools

  • Use a playbook to respond to threats, risks, and vulnerabilities

Connect and Protect: Networks and Network Security

  • Define the types of networks and components of networks

  • Illustrate how data is sent and received over a network

  • Understand how to secure a network against intrusion tactics

  • Describe system hardening techniques

Tools of the Trade: Linux and SQL

  • Explain the relationship between operating systems, applications, and hardware

  • Compare a graphical user interface to a command line interface

  • Navigate and manage the file system using Linux commands via the Bash shell

  • Use SQL to retrieve information from a database

Assets, Threats, and Vulnerabilities

  • Classify assets

  • Analyze an attack surface to find risks and vulnerabilities

  • Identify threats, such as social engineering, malware and web-based exploits

  • Summarize the threat modeling process

Sound the Alarm: Detection and Response

  • Identify the steps to contain, eradicate, and recover from an incident

  • Analyze packets to interpret network communications

  • Understand basic syntax, components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools

  • Perform queries in Security Information and Event Management (SIEM) tools to investigate an event

Automate Cybersecurity Tasks with Python

  • Explain how the Python programming language is used in cybersecurity

  • Create new, user-defined Python functions

  • Use regular expressions to extract information from text

  • Practice debugging code

Put It to Work: Prepare for Cybersecurity Jobs

  • Determine when and how to escalate a security incident

  • Engage with the cybersecurity community

  • Find and apply for cybersecurity jobs

  • Prepare for job interviews

Sites Published:

United Arab Emirates - Google Cybersecurity Professional

Qatar - Google Cybersecurity Professional

Egypt - Google Cybersecurity Professional

Saudi Arabia - Google Cybersecurity Professional

South Africa - Google Cybersecurity Professional

Morocco - Google Cybersecurity Professional

Tunisia - Google Cybersecurity Professional

Kuwait - Google Cybersecurity Professional

Oman - Google Cybersecurity Professional

Kenya - Google Cybersecurity Professional

Nigeria - Google Cybersecurity Professional

Botswana - Google Cybersecurity Professional

Slovenia - Google Cybersecurity Professional

Croatia - Google Cybersecurity Professional

Serbia - Google Cybersecurity Professional

Bhutan - Google Cybersecurity Professional

Nepal - Google Cybersecurity Professional

Uzbekistan - Google Cybersecurity Professional