Google Cybersecurity Certificate (IN PROGRESS) - Google, 2024
Courses
Foundations of Cybersecurity
Description: Students are introduced to the world of cybersecurity through an interactive curriculum developed by Google. Students will identify significant events that led to the development of the cybersecurity field, explain the importance of cybersecurity in today's business operations, and explore the job responsibilities and skills of an entry-level cybersecurity analyst.
Skills Gained:
Identify how security attacks impact business operations
Explore the job responsibilities and core skills of an entry-level cybersecurity analyst
Recognize how past and present attacks on organizations led to the development of the cybersecurity field
Learn the CISSP eight security domains
Identify security domains, frameworks, and controls
Explain security ethics
Recognize common tools used by cybersecurity analysts
Description: Students are introduced to Python programming, covering core concepts such as variables, control structures, functions, and object-oriented programming.
Skills Gained:
Proficient in Python
Write, debug, and optimize Python scripts
Apply data manipulation, automation, and basic cybersecurity tasks
Description: Students are provided with the concepts and skills for planning, development, and deployment of web-based hypermedia systems. It covers the use of text, graphics, audio, and video in web environments and the conversion of existing systems to web environments
Description: Students explore computing skills that are used on-the-job as a cybersecurity analyst. Students practice using Linux, an operating system commonly used by cybersecurity professionals. For example, students use the Linux command line through the Bash shell to navigate and manage the file system and authenticate users. Then, students use SQL to communicate with a database.
Skills Gained:
Explain the relationship between operating systems, applications, and hardware
Compare a graphical user interface to a command line interface
Identify the unique features of common Linux distributions
Navigate and manage the file system using Linux commands via the Bash shell
Use Linux commands via the Bash shell to authenticate and authorize users
Describe how a relational database is organized
Use SQL to retrieve information from a database
Apply filters to SQL queries and use joins to combine multiple tables
Connect and Protect: Networks and Network Security
Description: Students will explore how networks connect multiple devices and allow them to communicate. Students start with the fundamentals of modern networking operations and protocols. For example, the Transmission Control Protocol / Internet Protocol (TCP/IP) model and how network hardware, like routers and modems, allow computers to send and receive information on the internet. Then, students learn about network security. Organizations often store and send valuable information on their networks, so networks are common targets of cyber attacks. By the end of this course, students are able to recognize network-level vulnerabilities, and explain how to secure a network using firewalls, system hardening, and virtual private networks.
Skills Gained:
Describe the structure of different computer networks
Illustrate how data is sent and received over a network
Recognize common network protocols
Identify common network security measures and protocols
Explain how to secure a network against intrusion tactics
Compare and contrast local networks to cloud computing
Explain the different types of system hardening techniques
Description: Students take a deeper dive into concepts introduced in Foundations of Cybersecurity, with an emphasis on how cybersecurity professionals use frameworks and controls to protect business operations. In particular, students identify the steps of risk management and explore common threats, risks, and vulnerabilities. Additionally, students explore Security Information and Event Management (SIEM) data and use a playbook to respond to identified threats, risks, and vulnerabilities. Finally, students take an important step towards becoming a cybersecurity professional and practice performing a security audit.
Skills Gained:
Identify the common threats, risks, and vulnerabilities to business operations
Understand the threats, risks, and vulnerabilities that entry-level cybersecurity analysts are most focused on
Comprehend the purpose of security frameworks and controls
Describe the confidentiality, integrity, and availability (CIA) triad
Explain the National Institute of Standards and Technology (NIST) framework
Explore and practice conducting a security audit
Use a playbook to respond to threats, risks, and vulnerabilities