- No degree or experience required.
In this program, you’ll learn in-demand skills that will have you job-ready in a very short time. No degree or experience required.
What you'll learn
-
Understand the importance of cybersecurity practices and their impact for organizations.
-
Identify common risks, threats, and vulnerabilities, as well as techniques to mitigate them.
-
Protect networks, devices, people, and data from unauthorized access and cyberattacks using Security Information and Event Management (SIEM) tools.
-
Gain hands-on experience with Python, Linux, and SQL.
Foundations of Cybersecurity
-
Recognize core skills and knowledge needed to become a cybersecurity analyst
-
Identify how security attacks impact business operations
-
Explain security ethics
-
Identify common tools used by cybersecurity analysts
Play It Safe: Manage Security Risks
-
Identify the primary threats, risks, and vulnerabilities to business operations
-
Examine how organizations use security frameworks and controls to protect business operations
-
Define commonly used Security Information and Event Management (SIEM) tools
-
Use a playbook to respond to threats, risks, and vulnerabilities
Connect and Protect: Networks and Network Security
-
Define the types of networks and components of networks
-
Illustrate how data is sent and received over a network
-
Understand how to secure a network against intrusion tactics
-
Describe system hardening techniques
Tools of the Trade: Linux and SQL
-
Explain the relationship between operating systems, applications, and hardware
-
Compare a graphical user interface to a command line interface
-
Navigate and manage the file system using Linux commands via the Bash shell
-
Use SQL to retrieve information from a database
Assets, Threats, and Vulnerabilities
-
Classify assets
-
Analyze an attack surface to find risks and vulnerabilities
-
Identify threats, such as social engineering, malware and web-based exploits
-
Summarize the threat modeling process
Sound the Alarm: Detection and Response
-
Identify the steps to contain, eradicate, and recover from an incident
-
Analyze packets to interpret network communications
-
Understand basic syntax, components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools
-
Perform queries in Security Information and Event Management (SIEM) tools to investigate an event
Automate Cybersecurity Tasks with Python
-
Explain how the Python programming language is used in cybersecurity
-
Create new, user-defined Python functions
-
Use regular expressions to extract information from text
-
Practice debugging code
Put It to Work: Prepare for Cybersecurity Jobs
-
Determine when and how to escalate a security incident
-
Engage with the cybersecurity community
-
Find and apply for cybersecurity jobs
-
Prepare for job interviews
United Arab Emirates - Google Cybersecurity Professional
Qatar - Google Cybersecurity Professional
Egypt - Google Cybersecurity Professional
Saudi Arabia - Google Cybersecurity Professional
South Africa - Google Cybersecurity Professional
Morocco - Google Cybersecurity Professional
Tunisia - Google Cybersecurity Professional
Kuwait - Google Cybersecurity Professional
Oman - Google Cybersecurity Professional
Kenya - Google Cybersecurity Professional
Nigeria - Google Cybersecurity Professional
Botswana - Google Cybersecurity Professional
Slovenia - Google Cybersecurity Professional
Croatia - Google Cybersecurity Professional
Serbia - Google Cybersecurity Professional
Bhutan - Google Cybersecurity Professional