FileMood

Download [CourserHub.com] Coursera - Google Cybersecurity Professional Certificate

CourserHub com Coursera Google Cybersecurity Professional Certificate

Name

[CourserHub.com] Coursera - Google Cybersecurity Professional Certificate

 DOWNLOAD Copy Link

Total Size

4.1 GB

Total Files

1330

Last Seen

2024-07-23 00:03

Hash

FEFA0EA64A939F45215B17E226DBA7EBB2C1B171

/0. Websites you may like/

[CourserHub.com].url

0.1 KB

/

Readme.txt

0.1 KB

/.../01_get-started-with-the-course/

01_introduction-to-course-5.en.srt

4.5 KB

01_introduction-to-course-5.en.txt

2.8 KB

01_introduction-to-course-5.mp4

16.8 MB

02_course-5-overview_instructions.html

1.3 MB

03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

03_helpful-resources-and-tips_instructions.html

11.5 KB

04_da-queshia-my-path-to-cybersecurity.en.srt

4.5 KB

04_da-queshia-my-path-to-cybersecurity.en.txt

2.3 KB

04_da-queshia-my-path-to-cybersecurity.mp4

14.6 MB

/.../02_introduction-to-assets/

01_welcome-to-week-1.en.srt

3.4 KB

01_welcome-to-week-1.en.txt

2.1 KB

01_welcome-to-week-1.mp4

10.7 MB

02_the-what-why-and-how-of-asset-security.en.srt

7.1 KB

02_the-what-why-and-how-of-asset-security.en.txt

4.4 KB

02_the-what-why-and-how-of-asset-security.mp4

21.8 MB

03_understand-risks-threats-and-vulnerabilities_instructions.html

6.6 KB

04_tri-life-in-asset-security.en.srt

3.9 KB

04_tri-life-in-asset-security.en.txt

2.4 KB

04_tri-life-in-asset-security.mp4

17.8 MB

05_security-starts-with-asset-classification.en.srt

6.8 KB

05_security-starts-with-asset-classification.en.txt

3.7 KB

05_security-starts-with-asset-classification.mp4

17.7 MB

06_common-classification-requirements_instructions.html

108.8 KB

/.../03_digital-and-physical-assets/

01_assets-in-a-digital-world.en.srt

6.8 KB

01_assets-in-a-digital-world.en.txt

3.6 KB

01_assets-in-a-digital-world.mp4

18.8 MB

02_the-emergence-of-cloud-security_instructions.html

144.7 KB

/.../04_risk-and-asset-security/

01_elements-of-a-security-plan.en.srt

6.3 KB

01_elements-of-a-security-plan.en.txt

4.1 KB

01_elements-of-a-security-plan.mp4

21.2 MB

02_the-nist-cybersecurity-framework.en.srt

5.9 KB

02_the-nist-cybersecurity-framework.en.txt

3.7 KB

02_the-nist-cybersecurity-framework.mp4

21.3 MB

03_security-guidelines-in-action_Commercial_Facilities_Sector_Cybersecurity_Framework_Implementation_Guidance_FINAL_508.pdf

1.6 MB

03_security-guidelines-in-action_instructions.html

483.8 KB

/.../05_review-introduction-to-asset-security/

01_wrap-up.en.srt

3.1 KB

01_wrap-up.en.txt

1.7 KB

01_wrap-up.mp4

7.2 MB

02_glossary-terms-from-week-1_instructions.html

3.5 KB

/.../01_safeguard-information/

01_welcome-to-week-2.en.srt

3.2 KB

01_welcome-to-week-2.en.txt

1.7 KB

01_welcome-to-week-2.mp4

10.3 MB

02_security-controls.en.srt

5.3 KB

02_security-controls.en.txt

3.4 KB

02_security-controls.mp4

20.5 MB

03_principle-of-least-privilege_instructions.html

7.9 KB

04_information-privacy-regulations-and-compliance_instructions.html

132.3 KB

05_heather-the-importance-of-protecting-pii.en.srt

3.4 KB

05_heather-the-importance-of-protecting-pii.en.txt

1.8 KB

05_heather-the-importance-of-protecting-pii.mp4

15.3 MB

/.../02_encryption-methods/

01_fundamentals-of-cryptography.en.srt

6.1 KB

01_fundamentals-of-cryptography.en.txt

3.8 KB

01_fundamentals-of-cryptography.mp4

23.7 MB

02_public-key-infrastructure.en.srt

8.9 KB

02_public-key-infrastructure.en.txt

4.6 KB

02_public-key-infrastructure.mp4

22.2 MB

03_symmetric-and-asymmetric-encryption_instructions.html

9.4 KB

04_resources-for-completing-labs_instructions.html

111.1 KB

05_non-repudiation-and-hashing.en.srt

5.1 KB

05_non-repudiation-and-hashing.en.txt

3.2 KB

05_non-repudiation-and-hashing.mp4

14.2 MB

06_the-evolution-of-hash-functions_instructions.html

599.4 KB

/.../03_authentication-authorization-and-accounting/

01_access-controls-and-authentication-systems.en.srt

6.3 KB

01_access-controls-and-authentication-systems.en.txt

4.0 KB

01_access-controls-and-authentication-systems.mp4

19.2 MB

02_the-rise-of-sso-and-mfa_instructions.html

378.4 KB

03_the-mechanisms-of-authorization.en.srt

8.3 KB

03_the-mechanisms-of-authorization.en.txt

4.4 KB

03_the-mechanisms-of-authorization.mp4

26.4 MB

04_why-we-audit-user-activity.en.srt

5.6 KB

04_why-we-audit-user-activity.en.txt

3.0 KB

04_why-we-audit-user-activity.mp4

17.0 MB

05_tim-finding-purpose-in-protecting-assets.en.srt

2.1 KB

05_tim-finding-purpose-in-protecting-assets.en.txt

1.3 KB

05_tim-finding-purpose-in-protecting-assets.mp4

7.3 MB

06_identity-and-access-management_instructions.html

310.1 KB

/.../04_review-protect-organizational-assets/

01_wrap-up.en.srt

2.4 KB

01_wrap-up.en.txt

1.6 KB

01_wrap-up.mp4

8.6 MB

02_glossary-terms-from-week-2_instructions.html

7.2 KB

/.../01_flaws-in-the-system/

01_welcome-to-week-3.en.srt

2.9 KB

01_welcome-to-week-3.en.txt

1.7 KB

01_welcome-to-week-3.mp4

9.6 MB

02_vulnerability-management.en.srt

6.1 KB

02_vulnerability-management.en.txt

3.9 KB

02_vulnerability-management.mp4

23.0 MB

03_defense-in-depth-strategy.en.srt

6.4 KB

03_defense-in-depth-strategy.en.txt

3.4 KB

03_defense-in-depth-strategy.mp4

20.9 MB

04_common-vulnerabilities-and-exposures.en.srt

8.3 KB

04_common-vulnerabilities-and-exposures.en.txt

4.4 KB

04_common-vulnerabilities-and-exposures.mp4

29.2 MB

05_the-owasp-top-10_instructions.html

145.3 KB

/.../02_identify-system-vulnerabilities/

01_vulnerability-assessments.en.srt

6.0 KB

01_vulnerability-assessments.en.txt

3.2 KB

01_vulnerability-assessments.mp4

20.4 MB

02_approaches-to-vulnerability-scanning_instructions.html

7.6 KB

03_the-importance-of-updates_instructions.html

7.3 KB

04_omad-my-learning-journey-into-cybersecurity.en.srt

4.5 KB

04_omad-my-learning-journey-into-cybersecurity.en.txt

2.8 KB

04_omad-my-learning-journey-into-cybersecurity.mp4

10.4 MB

/.../03_cyber-attacker-mindset/

01_protect-all-entry-points.en.srt

5.9 KB

01_protect-all-entry-points.en.txt

3.7 KB

01_protect-all-entry-points.mp4

23.6 MB

02_approach-cybersecurity-with-an-attacker-mindset_instructions.html

210.9 KB

03_types-of-threat-actors_instructions.html

505.2 KB

04_niru-adopt-an-attacker-mindset.en.srt

4.7 KB

04_niru-adopt-an-attacker-mindset.en.txt

3.0 KB

04_niru-adopt-an-attacker-mindset.mp4

19.0 MB

05_pathways-through-defenses.en.srt

7.6 KB

05_pathways-through-defenses.en.txt

4.0 KB

05_pathways-through-defenses.mp4

23.5 MB

06_fortify-against-brute-force-cyber-attacks_NIST.SP.800-63b.pdf

1.3 MB

06_fortify-against-brute-force-cyber-attacks_instructions.html

156.8 KB

/.../04_review-vulnerabilities-in-systems/

01_wrap-up.en.srt

3.7 KB

01_wrap-up.en.txt

2.0 KB

01_wrap-up.mp4

12.4 MB

02_glossary-terms-from-week-3_instructions.html

3.7 KB

/.../01_social-engineering/

01_welcome-to-week-4.en.srt

3.1 KB

01_welcome-to-week-4.en.txt

1.7 KB

01_welcome-to-week-4.mp4

9.0 MB

02_the-criminal-art-of-persuasion.en.srt

7.5 KB

02_the-criminal-art-of-persuasion.en.txt

4.1 KB

02_the-criminal-art-of-persuasion.mp4

22.7 MB

03_social-engineering-tactics_instructions.html

179.5 KB

04_phishing-for-information.en.srt

7.0 KB

04_phishing-for-information.en.txt

4.4 KB

04_phishing-for-information.mp4

25.2 MB

05_types-of-phishing_instructions.html

347.5 KB

/.../04_threats-to-asset-security/02_malware/

01_malicious-software.en.srt

7.8 KB

01_malicious-software.en.txt

4.2 KB

01_malicious-software.mp4

25.7 MB

02_an-introduction-to-malware_instructions.html

167.8 KB

03_the-rise-of-cryptojacking.en.srt

6.8 KB

03_the-rise-of-cryptojacking.en.txt

3.7 KB

03_the-rise-of-cryptojacking.mp4

24.8 MB

/.../03_web-based-exploits/

01_cross-site-scripting.en.srt

7.5 KB

01_cross-site-scripting.en.txt

4.6 KB

01_cross-site-scripting.mp4

22.5 MB

02_exploitable-gaps-in-databases.en.srt

5.2 KB

02_exploitable-gaps-in-databases.en.txt

3.3 KB

02_exploitable-gaps-in-databases.mp4

18.2 MB

/.../04_threat-modeling/

01_a-proactive-approach-to-security.en.srt

5.1 KB

01_a-proactive-approach-to-security.en.txt

3.2 KB

01_a-proactive-approach-to-security.mp4

17.9 MB

02_chantelle-the-value-of-diversity-in-cybersecurity.en.srt

3.8 KB

02_chantelle-the-value-of-diversity-in-cybersecurity.en.txt

2.0 KB

02_chantelle-the-value-of-diversity-in-cybersecurity.mp4

14.8 MB

03_pasta-the-process-for-attack-simulation-and-threat-analysis.en.srt

6.2 KB

03_pasta-the-process-for-attack-simulation-and-threat-analysis.en.txt

3.9 KB

03_pasta-the-process-for-attack-simulation-and-threat-analysis.mp4

18.7 MB

04_traits-of-an-effective-threat-model_instructions.html

123.8 KB

/.../05_review-threats-in-cybersecurity/

01_wrap-up.en.srt

2.9 KB

01_wrap-up.en.txt

1.5 KB

01_wrap-up.mp4

8.5 MB

02_glossary-terms-from-week-4_instructions.html

8.1 KB

/.../06_congratulations-on-completing-course-5/

01_course-wrap-up.en.srt

4.5 KB

01_course-wrap-up.en.txt

2.8 KB

01_course-wrap-up.mp4

18.5 MB

02_course-5-glossary_Course_5_glossary.docx

883.1 KB

02_course-5-glossary_instructions.html

6.6 KB

03_get-started-on-the-next-course_instructions.html

813.8 KB

/.../01_frequently-asked-questions/

01__resources.html

19.0 KB

/.../02_google-cybersecurity-certificate-glossary/

01__Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

01__resources.html

6.7 KB

/.../03_resources-for-completing-labs/

01__resources.html

111.1 KB

/.../04_course-5-resources-and-citations/

01__16-software-updates.html

26.1 KB

01__2-4-3.html

8.8 KB

01__5-signs-youve-been-hit-with-an-apt.html

176.6 KB

01__5.2

5.5 KB

01__7.5

8.4 KB

01__FULL_TEXT.pdf

1.5 MB

01__NIST.FIPS.140-3.pdf

310.6 KB

01__Trend_Report_-_Why_Businesses_are_Moving_to_the_Cloud.pdf

1.3 MB

01__csos-guide-to-phishing-and-phishing-kits.html

159.6 KB

01__encryption-explained.html

46.3 KB

01__gdpr-tldr-what-security-pros-need-to-know-about-the-new-era-of-privacy-regulations.html

159.2 KB

01__hashing-explained-why-its-your-best-bet-to-protect-stored-passwords.html

163.4 KB

01__hipaa.html

200.6 KB

01__malware.html

216.8 KB

01__paper.pdf

201.5 KB

01__resources.html

61.6 KB

01__sql_injection.asp

112.8 KB

01__ssrf-attacks-explained-and-how-to-defend-against-them.html

159.3 KB

01__vulnerability-vs-threat-vs-risk.html

78.6 KB

01__what-is-cve-its-definition-and-purpose.html

173.2 KB

01__what-is-owasp-top-10.html

253.5 KB

01__what-is-phishing-examples-types-and-techniques.html

165.3 KB

/.../05_course-5-glossary/

01__Course_5_glossary.docx

883.1 KB

01__resources.html

6.6 KB

/.../06_frequently-asked-questions/

01__resources.html

16.3 KB

/.../07_create-a-cybersecurity-portfolio/

01__resources.html

9.0 KB

/.../01_get-started-with-the-course/

01_introduction-to-course-7.en.srt

4.9 KB

01_introduction-to-course-7.en.txt

3.1 KB

01_introduction-to-course-7.mp4

18.9 MB

02_course-7-overview_instructions.html

1.3 MB

03_angel-my-personal-career-journey.en.srt

5.0 KB

03_angel-my-personal-career-journey.en.txt

2.7 KB

03_angel-my-personal-career-journey.mp4

17.3 MB

04_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

04_helpful-resources-and-tips_instructions.html

11.5 KB

/.../02_introduction-to-python-programming-in-cybersecurity/

01_welcome-to-week-1.en.srt

2.9 KB

01_welcome-to-week-1.en.txt

1.5 KB

01_welcome-to-week-1.mp4

8.2 MB

02_python-and-cybersecurity.en.srt

5.3 KB

02_python-and-cybersecurity.en.txt

3.4 KB

02_python-and-cybersecurity.mp4

21.1 MB

03_get-to-know-python_instructions.html

4.4 KB

04_create-a-basic-python-script.en.srt

3.8 KB

04_create-a-basic-python-script.en.txt

2.0 KB

04_create-a-basic-python-script.mp4

8.8 MB

05_python-environments_instructions.html

4.3 KB

06_akash-python-and-the-cybersecurity-professional.en.srt

2.1 KB

06_akash-python-and-the-cybersecurity-professional.en.txt

1.3 KB

06_akash-python-and-the-cybersecurity-professional.mp4

6.0 MB

/.../03_core-python-components/

01_data-types-in-python.en.srt

7.8 KB

01_data-types-in-python.en.txt

4.0 KB

01_data-types-in-python.mp4

20.3 MB

02_more-about-data-types_instructions.html

12.5 KB

03_work-with-variables-in-python.en.srt

10.2 KB

03_work-with-variables-in-python.en.txt

5.4 KB

03_work-with-variables-in-python.mp4

22.7 MB

04_assign-and-reassign-variables-in-python_instructions.html

8.4 KB

/.../04_conditional-and-iterative-statements/

01_conditional-statements-in-python.en.srt

9.9 KB

01_conditional-statements-in-python.en.txt

6.3 KB

01_conditional-statements-in-python.mp4

18.5 MB

02_more-on-conditionals-in-python_instructions.html

15.5 KB

03_for-loops.en.srt

7.8 KB

03_for-loops.en.txt

4.1 KB

03_for-loops.mp4

12.8 MB

04_while-loops.en.srt

8.3 KB

04_while-loops.en.txt

4.4 KB

04_while-loops.mp4

10.7 MB

05_more-on-loops-in-python_instructions.html

16.0 KB

/.../05_review-introduction-to-python/

01_wrap-up.en.srt

1.6 KB

01_wrap-up.en.txt

0.9 KB

01_wrap-up.mp4

3.6 MB

02_glossary-terms-from-week-1_instructions.html

4.1 KB

/.../01_introduction-to-functions/

01_welcome-to-week-2.en.srt

2.2 KB

01_welcome-to-week-2.en.txt

1.2 KB

01_welcome-to-week-2.mp4

5.2 MB

02_introduction-to-functions.en.srt

4.1 KB

02_introduction-to-functions.en.txt

2.2 KB

02_introduction-to-functions.mp4

14.5 MB

03_create-a-basic-function.en.srt

3.8 KB

03_create-a-basic-function.en.txt

1.9 KB

03_create-a-basic-function.mp4

7.5 MB

04_python-functions-in-cybersecurity_instructions.html

7.0 KB

/.../02_work-with-functions/

01_use-parameters-in-functions.en.srt

5.6 KB

01_use-parameters-in-functions.en.txt

3.4 KB

01_use-parameters-in-functions.mp4

11.1 MB

02_return-statements.en.srt

4.9 KB

02_return-statements.en.txt

3.1 KB

02_return-statements.mp4

14.4 MB

03_functions-and-variables_instructions.html

11.1 KB

04_explore-built-in-functions.en.srt

8.7 KB

04_explore-built-in-functions.en.txt

4.6 KB

04_explore-built-in-functions.mp4

22.0 MB

05_work-with-built-in-functions_functions.html

275.6 KB

05_work-with-built-in-functions_instructions.html

7.6 KB

/.../03_learn-from-the-python-community/

01_modules-and-libraries.en.srt

3.3 KB

01_modules-and-libraries.en.txt

2.1 KB

01_modules-and-libraries.mp4

11.9 MB

02_code-readability.en.srt

6.3 KB

02_code-readability.en.txt

3.9 KB

02_code-readability.mp4

20.0 MB

03_ensure-proper-syntax-and-readability-in-python_instructions.html

9.8 KB

04_dorsa-use-python-efficiently-on-a-cybersecurity-team.en.srt

4.4 KB

04_dorsa-use-python-efficiently-on-a-cybersecurity-team.en.txt

2.3 KB

04_dorsa-use-python-efficiently-on-a-cybersecurity-team.mp4

11.9 MB

/.../04_review-write-effective-python-code/

01_wrap-up.en.srt

1.8 KB

01_wrap-up.en.txt

1.0 KB

01_wrap-up.mp4

3.9 MB

02_glossary-terms-from-week-2_instructions.html

3.1 KB

/.../01_working-with-strings/

01_welcome-to-week-3.en.srt

2.0 KB

01_welcome-to-week-3.en.txt

1.1 KB

01_welcome-to-week-3.mp4

5.1 MB

02_string-operations.en.srt

8.0 KB

02_string-operations.en.txt

4.2 KB

02_string-operations.mp4

22.3 MB

03_string-indices-and-slices.en.srt

8.7 KB

03_string-indices-and-slices.en.txt

4.6 KB

03_string-indices-and-slices.mp4

21.3 MB

04_strings-and-the-security-analyst_instructions.html

13.8 KB

/.../02_work-with-lists-and-develop-algorithms/

01_list-operations-in-python.en.srt

8.5 KB

01_list-operations-in-python.en.txt

5.3 KB

01_list-operations-in-python.mp4

20.3 MB

02_write-a-simple-algorithm.en.srt

8.6 KB

02_write-a-simple-algorithm.en.txt

4.5 KB

02_write-a-simple-algorithm.mp4

18.4 MB

03_lists-and-the-security-analyst_instructions.html

13.4 KB

/.../03_regular-expressions/

01_regular-expressions-in-python.en.srt

10.6 KB

01_regular-expressions-in-python.en.txt

6.6 KB

01_regular-expressions-in-python.mp4

22.9 MB

02_more-about-regular-expressions_instructions.html

11.7 KB

/.../04_review-work-with-strings-and-lists/

01_wrap-up.en.srt

1.8 KB

01_wrap-up.en.txt

1.0 KB

01_wrap-up.mp4

3.8 MB

02_glossary-terms-from-week-3_instructions.html

2.6 KB

/.../01_python-for-automation/

01_welcome-to-week-4.en.srt

2.0 KB

01_welcome-to-week-4.en.txt

1.1 KB

01_welcome-to-week-4.mp4

5.4 MB

02_automate-cybersecurity-tasks-with-python.en.srt

5.9 KB

02_automate-cybersecurity-tasks-with-python.en.txt

3.1 KB

02_automate-cybersecurity-tasks-with-python.mp4

20.0 MB

03_essential-python-components-for-automation_instructions.html

8.4 KB

04_clancy-continual-learning-and-python.en.srt

3.7 KB

04_clancy-continual-learning-and-python.en.txt

1.9 KB

04_clancy-continual-learning-and-python.mp4

11.9 MB

/.../02_work-with-files-in-python/

01_access-a-text-file-in-python.en.srt

4.1 KB

01_access-a-text-file-in-python.en.txt

2.6 KB

01_access-a-text-file-in-python.mp4

11.0 MB

02_import-files-into-python_instructions.html

109.9 KB

03_parse-a-text-file-in-python.en.srt

3.6 KB

03_parse-a-text-file-in-python.en.txt

1.9 KB

03_parse-a-text-file-in-python.mp4

10.5 MB

04_develop-a-parsing-algorithm-in-python.en.srt

7.0 KB

04_develop-a-parsing-algorithm-in-python.en.txt

4.4 KB

04_develop-a-parsing-algorithm-in-python.mp4

16.0 MB

/.../03_debug-python-code/

01_debugging-strategies.en.srt

8.7 KB

01_debugging-strategies.en.txt

4.5 KB

01_debugging-strategies.mp4

24.2 MB

02_apply-debugging-strategies.en.srt

8.1 KB

02_apply-debugging-strategies.en.txt

4.3 KB

02_apply-debugging-strategies.mp4

14.2 MB

03_explore-debugging-techniques_instructions.html

13.3 KB

/.../04_review-python-in-practice/

01_wrap-up.en.srt

1.5 KB

01_wrap-up.en.txt

0.8 KB

01_wrap-up.mp4

3.0 MB

02_glossary-terms-from-week-4_instructions.html

3.0 KB

/.../05_congratulations-on-completing-course-7/

01_course-wrap-up.en.srt

3.6 KB

01_course-wrap-up.en.txt

1.9 KB

01_course-wrap-up.mp4

12.4 MB

02_course-7-glossary_Course_7_glossary.docx

890.7 KB

02_course-7-glossary_instructions.html

6.6 KB

03_get-started-on-the-next-course_instructions.html

825.4 KB

/.../01_frequently-asked-questions/

01__resources.html

19.1 KB

/.../02_google-cybersecurity-certificate-glossary/

01__Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

01__resources.html

6.7 KB

/.../03_course-7-glossary/

01__Course_7_glossary.docx

890.7 KB

01__resources.html

6.6 KB

/.../04_course-7-resources-and-citations/

01__functions.html

275.6 KB

01__resources.html

7.2 KB

/.../05_frequently-asked-questions/

01__resources.html

16.3 KB

/.../06_create-a-cybersecurity-portfolio/

01__resources.html

9.0 KB

/.../0. Websites you may like/

[CourserHub.com].url

0.1 KB

/.../01_get-started-with-the-course/

01_introduction-to-course-6.en.srt

4.2 KB

01_introduction-to-course-6.en.txt

2.2 KB

01_introduction-to-course-6.mp4

7.6 MB

02_course-6-overview_instructions.html

1.3 MB

03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

03_helpful-resources-and-tips_instructions.html

11.5 KB

04_dave-grow-your-cybersecurity-career-with-mentors.en.srt

4.4 KB

04_dave-grow-your-cybersecurity-career-with-mentors.en.txt

2.4 KB

04_dave-grow-your-cybersecurity-career-with-mentors.mp4

14.6 MB

/.../02_the-incident-response-lifecycle/

01_welcome-to-week-1.en.srt

2.6 KB

01_welcome-to-week-1.en.txt

1.6 KB

01_welcome-to-week-1.mp4

6.1 MB

02_introduction-to-the-incident-response-lifecycle.en.srt

6.6 KB

02_introduction-to-the-incident-response-lifecycle.en.txt

4.1 KB

02_introduction-to-the-incident-response-lifecycle.mp4

16.8 MB

/.../03_incident-response-operations/

01_incident-response-teams.en.srt

4.7 KB

01_incident-response-teams.en.txt

3.0 KB

01_incident-response-teams.mp4

13.0 MB

02_fatima-the-importance-of-communication-during-incident-response.en.srt

4.7 KB

02_fatima-the-importance-of-communication-during-incident-response.en.txt

2.4 KB

02_fatima-the-importance-of-communication-during-incident-response.mp4

15.9 MB

03_roles-in-response_instructions.html

86.4 KB

04_incident-response-plans.en.srt

3.7 KB

04_incident-response-plans.en.txt

2.3 KB

04_incident-response-plans.mp4

9.8 MB

/.../04_incident-response-tools/

01_incident-response-tools.en.srt

2.9 KB

01_incident-response-tools.en.txt

1.6 KB

01_incident-response-tools.mp4

5.7 MB

02_the-value-of-documentation.en.srt

4.7 KB

02_the-value-of-documentation.en.txt

3.0 KB

02_the-value-of-documentation.mp4

11.5 MB

03_intrusion-detection-systems.en.srt

3.2 KB

03_intrusion-detection-systems.en.txt

1.7 KB

03_intrusion-detection-systems.mp4

5.6 MB

04_overview-of-detection-tools_instructions.html

9.7 KB

05_alert-and-event-management-with-siem-and-soar-tools.en.srt

6.1 KB

05_alert-and-event-management-with-siem-and-soar-tools.en.txt

3.8 KB

05_alert-and-event-management-with-siem-and-soar-tools.mp4

15.2 MB

/.../05_review-introduction-to-detection-and-incident-response/

01_wrap-up.en.srt

1.4 KB

01_wrap-up.en.txt

0.8 KB

01_wrap-up.mp4

2.5 MB

02_glossary-terms-from-week-1_instructions.html

4.2 KB

/.../01_understand-network-traffic/

01_welcome-to-week-2.en.srt

1.9 KB

01_welcome-to-week-2.en.txt

1.0 KB

01_welcome-to-week-2.mp4

3.9 MB

02_casey-apply-soft-skills-in-cybersecurity.en.srt

2.8 KB

02_casey-apply-soft-skills-in-cybersecurity.en.txt

1.5 KB

02_casey-apply-soft-skills-in-cybersecurity.mp4

14.6 MB

03_the-importance-of-network-traffic-flows.en.srt

4.6 KB

03_the-importance-of-network-traffic-flows.en.txt

3.0 KB

03_the-importance-of-network-traffic-flows.mp4

13.4 MB

04_maintain-awareness-with-network-monitoring_instructions.html

300.8 KB

05_data-exfiltration-attacks.en.srt

7.4 KB

05_data-exfiltration-attacks.en.txt

4.0 KB

05_data-exfiltration-attacks.mp4

16.3 MB

/.../02_capture-and-view-network-traffic/

01_packets-and-packet-captures.en.srt

5.2 KB

01_packets-and-packet-captures.en.txt

2.8 KB

01_packets-and-packet-captures.mp4

10.7 MB

02_learn-more-about-packet-captures_instructions.html

753.5 KB

03_interpret-network-communications-with-packets.en.srt

2.8 KB

03_interpret-network-communications-with-packets.en.txt

1.7 KB

03_interpret-network-communications-with-packets.mp4

8.0 MB

04_reexamine-the-fields-of-a-packet-header.en.srt

8.0 KB

04_reexamine-the-fields-of-a-packet-header.en.txt

4.3 KB

04_reexamine-the-fields-of-a-packet-header.mp4

14.3 MB

05_investigate-packet-details_instructions.html

3.8 MB

06_resources-for-completing-labs_instructions.html

111.1 KB

/.../03_packet-inspection/

01_packet-captures-with-tcpdump.en.srt

7.2 KB

01_packet-captures-with-tcpdump.en.txt

3.8 KB

01_packet-captures-with-tcpdump.mp4

9.8 MB

02_overview-of-tcpdump_instructions.html

135.7 KB

02_overview-of-tcpdump_tcpdump.1.html

74.3 KB

/.../04_review-network-monitoring-and-analysis/

01_wrap-up.en.srt

1.6 KB

01_wrap-up.en.txt

0.9 KB

01_wrap-up.mp4

3.4 MB

02_glossary-terms-from-week-2_instructions.html

4.1 KB

/.../01_incident-detection-and-verification/

01_welcome-to-week-3.en.srt

1.6 KB

01_welcome-to-week-3.en.txt

1.0 KB

01_welcome-to-week-3.mp4

3.7 MB

02_the-detection-and-analysis-phase-of-the-lifecycle.en.srt

3.1 KB

02_the-detection-and-analysis-phase-of-the-lifecycle.en.txt

2.1 KB

02_the-detection-and-analysis-phase-of-the-lifecycle.mp4

9.0 MB

03_cybersecurity-incident-detection-methods_instructions.html

7.9 KB

04_mk-changes-in-the-cybersecurity-industry.en.srt

4.4 KB

04_mk-changes-in-the-cybersecurity-industry.en.txt

2.8 KB

04_mk-changes-in-the-cybersecurity-industry.mp4

14.0 MB

05_indicators-of-compromise_instructions.html

130.8 KB

05_indicators-of-compromise_the-pyramid-of-pain.html

68.7 KB

06_analyze-indicators-of-compromise-with-investigative-tools_instructions.html

1.5 MB

/.../02_create-and-use-documentation/

01_the-benefits-of-documentation.en.srt

3.7 KB

01_the-benefits-of-documentation.en.txt

2.3 KB

01_the-benefits-of-documentation.mp4

9.8 MB

02_document-evidence-with-chain-of-custody-forms.en.srt

5.7 KB

02_document-evidence-with-chain-of-custody-forms.en.txt

3.6 KB

02_document-evidence-with-chain-of-custody-forms.mp4

13.7 MB

03_best-practices-for-effective-documentation_instructions.html

6.0 KB

04_the-value-of-cybersecurity-playbooks.en.srt

6.2 KB

04_the-value-of-cybersecurity-playbooks.en.txt

3.3 KB

04_the-value-of-cybersecurity-playbooks.mp4

13.6 MB

/.../03_response-and-recovery/

01_the-role-of-triage-in-incident-response.en.srt

6.2 KB

01_the-role-of-triage-in-incident-response.en.txt

3.3 KB

01_the-role-of-triage-in-incident-response.mp4

12.1 MB

02_robin-foster-cross-team-collaboration.en.srt

3.9 KB

02_robin-foster-cross-team-collaboration.en.txt

2.4 KB

02_robin-foster-cross-team-collaboration.mp4

14.8 MB

03_the-triage-process_instructions.html

8.5 KB

04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.en.srt

4.5 KB

04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.en.txt

2.5 KB

04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.mp4

10.3 MB

05_business-continuity-considerations_instructions.html

6.4 KB

/.../04_post-incident-actions/

01_the-post-incident-activity-phase-of-the-lifecycle.en.srt

3.6 KB

01_the-post-incident-activity-phase-of-the-lifecycle.en.txt

2.3 KB

01_the-post-incident-activity-phase-of-the-lifecycle.mp4

8.6 MB

02_post-incident-review_instructions.html

239.0 KB

/.../05_review-incident-investigation-and-response/

01_wrap-up.en.srt

1.7 KB

01_wrap-up.en.txt

1.1 KB

01_wrap-up.mp4

3.0 MB

02_glossary-terms-from-week-3_instructions.html

4.9 KB

/.../01_overview-of-logs/

01_welcome-to-week-4.en.srt

2.2 KB

01_welcome-to-week-4.en.txt

1.3 KB

01_welcome-to-week-4.mp4

5.2 MB

02_the-importance-of-logs.en.srt

6.1 KB

02_the-importance-of-logs.en.txt

3.8 KB

02_the-importance-of-logs.mp4

13.4 MB

03_best-practices-for-log-collection-and-management_instructions.html

8.5 KB

04_rebecca-learn-new-tools-and-technologies.en.srt

3.1 KB

04_rebecca-learn-new-tools-and-technologies.en.txt

1.9 KB

04_rebecca-learn-new-tools-and-technologies.mp4

9.8 MB

05_variations-of-logs.en.srt

6.9 KB

05_variations-of-logs.en.txt

3.7 KB

05_variations-of-logs.mp4

12.5 MB

06_overview-of-log-file-formats_instructions.html

16.8 KB

/.../02_overview-of-intrusion-detection-systems-ids/

01_security-monitoring-with-detection-tools.en.srt

6.2 KB

01_security-monitoring-with-detection-tools.en.txt

3.3 KB

01_security-monitoring-with-detection-tools.mp4

15.4 MB

02_detection-tools-and-techniques_instructions.html

351.0 KB

03_components-of-a-detection-signature.en.srt

6.8 KB

03_components-of-a-detection-signature.en.txt

3.6 KB

03_components-of-a-detection-signature.mp4

13.4 MB

04_examine-signatures-with-suricata.en.srt

6.1 KB

04_examine-signatures-with-suricata.en.txt

3.9 KB

04_examine-signatures-with-suricata.mp4

8.8 MB

05_examine-suricata-logs.en.srt

3.3 KB

05_examine-suricata-logs.en.txt

2.1 KB

05_examine-suricata-logs.mp4

7.7 MB

06_overview-of-suricata_eve-json-examplesjq.html

23.5 KB

06_overview-of-suricata_index.html

33.3 KB

06_overview-of-suricata_instructions.html

127.4 KB

06_overview-of-suricata_suricata-update.html

24.0 KB

06_overview-of-suricata_suricata-yaml.html

242.3 KB

/.../03_overview-of-security-information-event-management-siem/

01_reexamine-siem-tools.en.srt

3.7 KB

01_reexamine-siem-tools.en.txt

2.3 KB

01_reexamine-siem-tools.mp4

9.5 MB

02_query-for-events-with-splunk.en.srt

7.2 KB

02_query-for-events-with-splunk.en.txt

3.9 KB

02_query-for-events-with-splunk.mp4

9.7 MB

03_query-for-events-with-chronicle.en.srt

6.8 KB

03_query-for-events-with-chronicle.en.txt

3.6 KB

03_query-for-events-with-chronicle.mp4

8.6 MB

04_search-methods-with-siem-tools_instructions.html

425.5 KB

/.../04_review-network-traffic-and-logs-using-ids-and-siem-tools/

01_wrap-up.en.srt

1.9 KB

01_wrap-up.en.txt

1.2 KB

01_wrap-up.mp4

3.6 MB

02_glossary-terms-from-week-4_instructions.html

4.6 KB

/.../05_congratulations-on-completing-course-6/

01_course-wrap-up.en.srt

3.7 KB

01_course-wrap-up.en.txt

1.9 KB

01_course-wrap-up.mp4

6.1 MB

02_course-6-glossary_Course_6_glossary.docx

880.3 KB

02_course-6-glossary_instructions.html

6.6 KB

03_get-started-on-the-next-course_instructions.html

808.4 KB

/.../01_frequently-asked-questions/

01__resources.html

19.0 KB

/.../02_google-cybersecurity-certificate-glossary/

01__Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

01__resources.html

6.7 KB

/.../03_resources-for-completing-labs/

01__resources.html

111.1 KB

/.../04_course-6-glossary/

01__Course_6_glossary.docx

880.4 KB

01__resources.html

6.6 KB

/.../05_course-6-resources-and-citations/

01__Bryan_Nolen_-_Surviving_Your_First_Incident_Purplecon_2018.pdf

145.8 KB

01__RAID4.pdf

291.5 KB

01__cisa-insights_chain-of-custody-and-ci-systems_508.pdf

368.9 KB

01__index.html

33.3 KB

01__network-operations-center.html

224.9 KB

01__nist.sp.800-61r2.pdf

1.5 MB

01__nistspecialpublication800-92.pdf

1.8 MB

01__question525.htm

174.4 KB

01__resources.html

37.9 KB

01__suricata-update.html

24.0 KB

01__suricata-yaml.html

242.3 KB

01__tcpdump.1.html

74.3 KB

01__the-pyramid-of-pain.html

68.7 KB

01__xml_whatis.asp

91.5 KB

/.../06_frequently-asked-questions/

01__resources.html

16.3 KB

/.../07_create-a-cybersecurity-portfolio/

01__resources.html

9.0 KB

/detection-and-response/

Readme.txt

0.1 KB

/.../01_get-started-with-the-certificate-program/

01_welcome-to-the-google-cybersecurity-certificate.en.srt

15.6 KB

01_welcome-to-the-google-cybersecurity-certificate.en.txt

8.2 KB

01_welcome-to-the-google-cybersecurity-certificate.mp4

49.6 MB

02_google-cybersecurity-certificate-overview_instructions.html

512.5 KB

03_course-1-overview_instructions.html

1.3 MB

04_welcome-to-week-1.en.srt

2.0 KB

04_welcome-to-week-1.en.txt

1.1 KB

04_welcome-to-week-1.mp4

4.9 MB

05_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

05_helpful-resources-and-tips_instructions.html

11.5 KB

06_participate-in-program-surveys_instructions.html

3.8 KB

/.../02_introduction-to-cybersecurity/

01_introduction-to-cybersecurity.en.srt

7.3 KB

01_introduction-to-cybersecurity.en.txt

3.9 KB

01_introduction-to-cybersecurity.mp4

24.2 MB

02_toni-my-path-to-cybersecurity.en.srt

5.7 KB

02_toni-my-path-to-cybersecurity.en.txt

3.0 KB

02_toni-my-path-to-cybersecurity.mp4

21.0 MB

03_responsibilities-of-an-entry-level-cybersecurity-analyst.en.srt

4.6 KB

03_responsibilities-of-an-entry-level-cybersecurity-analyst.en.txt

2.5 KB

03_responsibilities-of-an-entry-level-cybersecurity-analyst.mp4

15.2 MB

04_nikki-a-day-in-the-life-of-a-security-engineer.en.srt

3.9 KB

04_nikki-a-day-in-the-life-of-a-security-engineer.en.txt

2.5 KB

04_nikki-a-day-in-the-life-of-a-security-engineer.mp4

16.8 MB

05_common-cybersecurity-terminology_instructions.html

5.7 KB

/.../03_core-skills-for-cybersecurity-professionals/

01_core-skills-for-cybersecurity-professionals.en.srt

7.8 KB

01_core-skills-for-cybersecurity-professionals.en.txt

4.2 KB

01_core-skills-for-cybersecurity-professionals.mp4

20.3 MB

02_veronica-my-path-to-working-in-cybersecurity.en.srt

3.2 KB

02_veronica-my-path-to-working-in-cybersecurity.en.txt

1.6 KB

02_veronica-my-path-to-working-in-cybersecurity.mp4

11.5 MB

03_transferable-and-technical-cybersecurity-skills_instructions.html

7.5 KB

04_the-importance-of-cybersecurity.en.srt

4.2 KB

04_the-importance-of-cybersecurity.en.txt

2.6 KB

04_the-importance-of-cybersecurity.mp4

18.7 MB

/.../04_review-welcome-to-the-exciting-world-of-cybersecurity/

01_wrap-up.en.srt

1.7 KB

01_wrap-up.en.txt

0.9 KB

01_wrap-up.mp4

4.2 MB

02_glossary-terms-from-week-1_instructions.html

2.8 KB

/.../01_the-history-of-cybersecurity/

01_welcome-to-week-2.en.srt

2.2 KB

01_welcome-to-week-2.en.txt

1.2 KB

01_welcome-to-week-2.mp4

7.0 MB

02_past-cybersecurity-attacks.en.srt

6.5 KB

02_past-cybersecurity-attacks.en.txt

3.4 KB

02_past-cybersecurity-attacks.mp4

23.1 MB

03_attacks-in-the-digital-age.en.srt

6.7 KB

03_attacks-in-the-digital-age.en.txt

4.3 KB

03_attacks-in-the-digital-age.mp4

26.8 MB

04_common-attacks-and-their-effectiveness_instructions.html

8.6 KB

05_sean-keep-your-cool-during-a-data-breach.en.srt

2.9 KB

05_sean-keep-your-cool-during-a-data-breach.en.txt

1.5 KB

05_sean-keep-your-cool-during-a-data-breach.mp4

14.6 MB

/.../02_the-eight-cissp-security-domains/

01_introduction-to-the-eight-cissp-security-domains-part-1.en.srt

5.4 KB

01_introduction-to-the-eight-cissp-security-domains-part-1.en.txt

3.4 KB

01_introduction-to-the-eight-cissp-security-domains-part-1.mp4

19.2 MB

02_introduction-to-the-eight-cissp-security-domains-part-2.en.srt

5.8 KB

02_introduction-to-the-eight-cissp-security-domains-part-2.en.txt

3.1 KB

02_introduction-to-the-eight-cissp-security-domains-part-2.mp4

18.2 MB

03_determine-the-type-of-attack_instructions.html

230.4 KB

04_understand-attackers_instructions.html

320.8 KB

/.../03_review-the-evolution-of-cybersecurity/

01_wrap-up.en.srt

2.3 KB

01_wrap-up.en.txt

1.5 KB

01_wrap-up.mp4

7.7 MB

02_glossary-terms-from-week-2_instructions.html

4.3 KB

/.../01_frameworks-and-controls/

01_welcome-to-week-3.en.srt

3.9 KB

01_welcome-to-week-3.en.txt

2.4 KB

01_welcome-to-week-3.mp4

15.2 MB

02_introduction-to-security-frameworks-and-controls.en.srt

7.7 KB

02_introduction-to-security-frameworks-and-controls.en.txt

4.1 KB

02_introduction-to-security-frameworks-and-controls.mp4

24.5 MB

03_secure-design.en.srt

7.0 KB

03_secure-design.en.txt

3.7 KB

03_secure-design.mp4

20.1 MB

04_controls-frameworks-and-compliance_instructions.html

155.5 KB

05_heather-protect-sensitive-data-and-information.en.srt

3.2 KB

05_heather-protect-sensitive-data-and-information.en.txt

2.0 KB

05_heather-protect-sensitive-data-and-information.mp4

17.6 MB

/.../02_ethics-in-cybersecurity/

01_ethics-in-cybersecurity.en.srt

6.7 KB

01_ethics-in-cybersecurity.en.txt

4.2 KB

01_ethics-in-cybersecurity.mp4

23.6 MB

02_ethical-concepts-that-guide-cybersecurity-decisions_instructions.html

8.1 KB

03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.en.srt

4.2 KB

03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.en.txt

2.3 KB

03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.mp4

15.3 MB

/.../03_review-protect-against-threats-risks-and-vulnerabilities/

01_wrap-up.en.srt

1.7 KB

01_wrap-up.en.txt

1.0 KB

01_wrap-up.mp4

4.9 MB

02_glossary-terms-from-week-3_instructions.html

4.0 KB

/.../01_important-cybersecurity-tools/

01_welcome-to-week-4.en.srt

2.6 KB

01_welcome-to-week-4.en.txt

1.4 KB

01_welcome-to-week-4.mp4

7.4 MB

02_common-cybersecurity-tools.en.srt

7.3 KB

02_common-cybersecurity-tools.en.txt

3.9 KB

02_common-cybersecurity-tools.mp4

21.2 MB

03_tools-for-protecting-business-operations_gcat_threathorizons_full_sept2022.pdf

3.1 MB

03_tools-for-protecting-business-operations_instructions.html

667.2 KB

/.../02_core-cybersecurity-knowledge-and-skills/

01_introduction-to-linux-sql-and-python.en.srt

5.3 KB

01_introduction-to-linux-sql-and-python.en.txt

2.8 KB

01_introduction-to-linux-sql-and-python.mp4

15.2 MB

02_use-tools-to-protect-business-operations_instructions.html

6.7 KB

03_create-a-cybersecurity-portfolio_instructions.html

8.9 KB

/.../03_review-cybersecurity-tools-and-programming-languages/

01_wrap-up.en.srt

1.0 KB

01_wrap-up.en.txt

0.6 KB

01_wrap-up.mp4

2.2 MB

02_glossary-terms-from-week-4_instructions.html

2.9 KB

/.../04_congratulations-on-completing-course-1/

01_course-wrap-up.en.srt

3.0 KB

01_course-wrap-up.en.txt

1.7 KB

01_course-wrap-up.mp4

8.1 MB

02_course-1-glossary_Course_1_glossary.docx

879.5 KB

02_course-1-glossary_instructions.html

6.6 KB

03_get-started-on-the-next-course_instructions.html

815.3 KB

/.../01_frequently-asked-questions/

01__resources.html

19.9 KB

/.../02_course-1-glossary/

01__Course_1_glossary.docx

879.3 KB

01__resources.html

6.6 KB

/.../03_course-1-resources-and-citations/

01__55.html

43.5 KB

01__IntroToCybersecurityEthics.pdf

592.2 KB

01__R46536.pdf

1.4 MB

01__cis-controls-and-the-hph.pdf

1.6 MB

01__display.cfm

37.9 KB

01__gcat_threathorizons_full_sept2022.pdf

3.1 MB

01__hipaa.html

200.6 KB

01__index.html

1.7 MB

01__ncsam_eskimming_508.pdf

799.6 KB

01__nist_small_business_fundamentals_july_2019.pptx

4.4 MB

01__resources.html

28.8 KB

01__rules-and-security-requirements.html

76.6 KB

01__why-splunk.html

232.9 KB

/.../04_google-cybersecurity-certificate-glossary/

01__Google_Cybersecurity_Certificate_glossary.docx

900.2 KB

01__resources.html

6.7 KB

/.../05_frequently-asked-questions/

01__resources.html

16.3 KB

/.../01_get-started-with-the-course/

01_introduction-to-course-4.en.srt

4.0 KB

01_introduction-to-course-4.en.txt

2.1 KB

01_introduction-to-course-4.mp4

9.1 MB

02_course-4-overview_instructions.html

1.3 MB

03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

03_helpful-resources-and-tips_instructions.html

11.4 KB

/.../02_the-wonderful-world-of-operating-systems/

01_welcome-to-week-1.en.srt

1.6 KB

01_welcome-to-week-1.en.txt

0.9 KB

01_welcome-to-week-1.mp4

3.1 MB

02_kim-my-journey-into-computing.en.srt

3.5 KB

02_kim-my-journey-into-computing.en.txt

1.9 KB

02_kim-my-journey-into-computing.mp4

11.4 MB

03_introduction-to-operating-systems.en.srt

4.4 KB

03_introduction-to-operating-systems.en.txt

2.9 KB

03_introduction-to-operating-systems.mp4

12.1 MB

04_compare-operating-systems_instructions.html

6.4 KB

/.../03_the-operating-system-at-work/

01_inside-the-operating-system.en.srt

5.9 KB

01_inside-the-operating-system.en.txt

3.2 KB

01_inside-the-operating-system.mp4

11.0 MB

02_requests-to-the-operating-system_instructions.html

137.1 KB

03_resource-allocation-via-the-os.en.srt

4.0 KB

03_resource-allocation-via-the-os.en.txt

2.1 KB

03_resource-allocation-via-the-os.mp4

9.9 MB

/.../04_the-user-interface/

01_gui-versus-cli.en.srt

7.1 KB

01_gui-versus-cli.en.txt

3.8 KB

01_gui-versus-cli.mp4

14.8 MB

02_the-command-line-in-use_instructions.html

201.8 KB

03_ellen-my-path-into-cybersecurity.en.srt

3.8 KB

03_ellen-my-path-into-cybersecurity.en.txt

2.5 KB

03_ellen-my-path-into-cybersecurity.mp4

13.0 MB

/.../05_review-introduction-to-operating-systems/

01_wrap-up.en.srt

1.9 KB

01_wrap-up.en.txt

1.1 KB

01_wrap-up.mp4

3.3 MB

02_glossary-terms-from-week-1_instructions.html

2.5 KB

/.../01_all-about-linux/

01_welcome-to-week-2.en.srt

1.6 KB

01_welcome-to-week-2.en.txt

0.9 KB

01_welcome-to-week-2.mp4

3.4 MB

02_introduction-to-linux.en.srt

5.1 KB

02_introduction-to-linux.en.txt

3.2 KB

02_introduction-to-linux.mp4

13.2 MB

03_phil-learn-and-grow-in-the-cybersecurity-field.en.srt

4.2 KB

03_phil-learn-and-grow-in-the-cybersecurity-field.en.txt

2.3 KB

03_phil-learn-and-grow-in-the-cybersecurity-field.mp4

13.2 MB

04_linux-architecture.en.srt

5.9 KB

04_linux-architecture.en.txt

3.1 KB

04_linux-architecture.mp4

12.4 MB

05_linux-architecture-explained_instructions.html

6.7 KB

/.../02_linux-distributions/

01_linux-distributions.en.srt

4.4 KB

01_linux-distributions.en.txt

2.7 KB

01_linux-distributions.mp4

10.8 MB

02_kali-linux-tm.en.srt

3.6 KB

02_kali-linux-tm.en.txt

2.3 KB

02_kali-linux-tm.mp4

7.5 MB

03_more-linux-distributions_instructions.html

4.5 KB

04_resources-for-completing-linux-labs_instructions.html

111.1 KB

/.../03_the-shell/

01_introduction-to-the-shell.en.srt

2.7 KB

01_introduction-to-the-shell.en.txt

1.7 KB

01_introduction-to-the-shell.mp4

6.3 MB

02_input-and-output-in-the-shell.en.srt

5.0 KB

02_input-and-output-in-the-shell.en.txt

2.7 KB

02_input-and-output-in-the-shell.mp4

9.0 MB

/.../04_review-the-linux-operating-system/

01_wrap-up.en.srt

1.4 KB

01_wrap-up.en.txt

0.7 KB

01_wrap-up.mp4

3.0 MB

02_glossary-terms-from-week-2_instructions.html

5.1 KB

/.../01_navigate-the-linux-file-system/

01_welcome-to-week-3.en.srt

2.7 KB

01_welcome-to-week-3.en.txt

1.4 KB

01_welcome-to-week-3.mp4

5.4 MB

02_linux-commands-via-the-bash-shell.en.srt

5.2 KB

02_linux-commands-via-the-bash-shell.en.txt

2.9 KB

02_linux-commands-via-the-bash-shell.mp4

10.7 MB

03_core-commands-for-navigation-and-reading-files.en.srt

7.8 KB

03_core-commands-for-navigation-and-reading-files.en.txt

4.1 KB

03_core-commands-for-navigation-and-reading-files.mp4

11.8 MB

04_navigate-linux-and-read-file-content_instructions.html

107.4 KB

/.../02_manage-file-content-in-bash/

01_find-what-you-need-with-linux.en.srt

7.7 KB

01_find-what-you-need-with-linux.en.txt

4.0 KB

01_find-what-you-need-with-linux.mp4

11.2 MB

02_filter-content-in-linux_instructions.html

8.9 KB

03_create-and-modify-directories-and-files.en.srt

11.4 KB

03_create-and-modify-directories-and-files.en.txt

6.0 KB

03_create-and-modify-directories-and-files.mp4

18.7 MB

04_manage-directories-and-files_instructions.html

9.9 KB

/.../03_authenticate-and-authorize-users/

01_file-permissions-and-ownership.en.srt

11.3 KB

01_file-permissions-and-ownership.en.txt

5.9 KB

01_file-permissions-and-ownership.mp4

17.5 MB

02_change-permissions.en.srt

7.3 KB

02_change-permissions.en.txt

3.9 KB

02_change-permissions.mp4

9.9 MB

03_permission-commands_instructions.html

15.9 KB

04_add-and-delete-users.en.srt

9.1 KB

04_add-and-delete-users.en.txt

4.8 KB

04_add-and-delete-users.mp4

15.4 MB

05_responsible-use-of-sudo_instructions.html

11.4 KB

/.../04_get-help-in-linux/

01_damar-my-journey-into-linux-commands.en.srt

3.8 KB

01_damar-my-journey-into-linux-commands.en.txt

2.3 KB

01_damar-my-journey-into-linux-commands.mp4

14.2 MB

02_the-linux-community.en.srt

2.6 KB

02_the-linux-community.en.txt

1.4 KB

02_the-linux-community.mp4

6.3 MB

03_man-pages-within-the-shell.en.srt

4.1 KB

03_man-pages-within-the-shell.en.txt

2.2 KB

03_man-pages-within-the-shell.mp4

6.9 MB

04_linux-resources_instructions.html

5.2 KB

/.../05_review-linux-commands-in-the-bash-shell/

01_wrap-up.en.srt

1.4 KB

01_wrap-up.en.txt

0.9 KB

01_wrap-up.mp4

3.5 MB

02_glossary-terms-from-week-3_instructions.html

3.3 KB

/.../01_introduction-to-sql-and-databases/

01_welcome-to-week-4.en.srt

2.6 KB

01_welcome-to-week-4.en.txt

1.4 KB

01_welcome-to-week-4.mp4

5.5 MB

02_introduction-to-databases.en.srt

6.1 KB

02_introduction-to-databases.en.txt

3.8 KB

02_introduction-to-databases.mp4

10.9 MB

03_query-databases-with-sql.en.srt

4.0 KB

03_query-databases-with-sql.en.txt

2.5 KB

03_query-databases-with-sql.mp4

8.9 MB

04_sql-filtering-versus-linux-filtering_instructions.html

4.3 KB

05_adedayo-sql-in-cybersecurity.en.srt

3.9 KB

05_adedayo-sql-in-cybersecurity.en.txt

2.1 KB

05_adedayo-sql-in-cybersecurity.mp4

14.4 MB

/.../02_sql-queries/

01_basic-queries.en.srt

4.8 KB

01_basic-queries.en.txt

2.5 KB

01_basic-queries.mp4

9.4 MB

02_query-a-database_instructions.html

9.0 KB

03_resources-for-completing-sql-labs_instructions.html

111.1 KB

04_basic-filters-on-sql-queries.en.srt

6.6 KB

04_basic-filters-on-sql-queries.en.txt

4.1 KB

04_basic-filters-on-sql-queries.mp4

15.5 MB

05_the-where-clause-and-basic-operators_instructions.html

8.3 KB

/.../03_more-sql-filters/

01_filter-dates-and-numbers.en.srt

5.3 KB

01_filter-dates-and-numbers.en.txt

3.3 KB

01_filter-dates-and-numbers.mp4

11.5 MB

02_operators-for-filtering-dates-and-numbers_instructions.html

6.9 KB

03_filters-with-and-or-and-not.en.srt

8.4 KB

03_filters-with-and-or-and-not.en.txt

4.5 KB

03_filters-with-and-or-and-not.mp4

16.9 MB

04_more-on-filters-with-and-or-and-not_instructions.html

6.5 KB

/.../04_sql-joins/

01_join-tables-in-sql.en.srt

8.7 KB

01_join-tables-in-sql.en.txt

4.7 KB

01_join-tables-in-sql.mp4

12.9 MB

02_types-of-joins.en.srt

5.2 KB

02_types-of-joins.en.txt

2.8 KB

02_types-of-joins.mp4

8.4 MB

03_compare-types-of-joins_instructions.html

1.6 MB

04_continuous-learning-in-sql_instructions.html

5.5 KB

/.../05_review-databases-and-sql/

01_wrap-up.en.srt

2.3 KB

01_wrap-up.en.txt

1.2 KB

01_wrap-up.mp4

3.5 MB

02_glossary-terms-from-week-4_instructions.html

3.1 KB

/.../06_congratulations-on-completing-course-4/

01_course-wrap-up.en.srt

2.4 KB

01_course-wrap-up.en.txt

1.3 KB

01_course-wrap-up.mp4

3.9 MB

02_course-4-glossary_Course_4_glossary.docx

1.2 MB

02_course-4-glossary_instructions.html

6.6 KB

03_get-started-on-the-next-course_instructions.html

803.0 KB

/.../01_frequently-asked-questions/

01__resources.html

19.0 KB

/.../02_google-cybersecurity-certificate-glossary/

01__Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

01__resources.html

6.7 KB

/.../03_resources-for-completing-linux-labs/

01__resources.html

111.1 KB

/.../04_resources-for-completing-sql-labs/

01__resources.html

111.1 KB

/.../05_course-4-glossary/

01__Course_4_glossary.docx

1.2 MB

01__resources.html

6.6 KB

/.../06_course-4-resources-and-citations/

01__01-intro.html

64.8 KB

01__Linux-in-a-Nutshell-6th-Edition.pdf

13.0 MB

01__ShellIntro.pdf

127.2 KB

01__bootup.html

8.3 KB

01__operating-system2.htm

157.3 KB

01__resources.html

20.2 KB

01__subsection3.1.html

4.4 KB

01__thegnuproject.html

66.6 KB

/.../07_frequently-asked-questions/

01__resources.html

16.3 KB

/.../08_create-a-cybersecurity-portfolio/

01__resources.html

9.0 KB

/.../01_get-started-with-the-course/

01_introduction-to-course-2.en.srt

2.4 KB

01_introduction-to-course-2.en.txt

1.5 KB

01_introduction-to-course-2.mp4

8.3 MB

02_course-2-overview_instructions.html

1.9 MB

03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

03_helpful-resources-and-tips_instructions.html

11.5 KB

/.../02_more-about-the-cissp-security-domains/

01_welcome-to-week-1.en.srt

1.7 KB

01_welcome-to-week-1.en.txt

1.1 KB

01_welcome-to-week-1.mp4

4.7 MB

02_explore-the-cissp-security-domains-part-1.en.srt

6.3 KB

02_explore-the-cissp-security-domains-part-1.en.txt

4.1 KB

02_explore-the-cissp-security-domains-part-1.mp4

20.1 MB

03_explore-the-cissp-security-domains-part-2.en.srt

6.9 KB

03_explore-the-cissp-security-domains-part-2.en.txt

4.5 KB

03_explore-the-cissp-security-domains-part-2.mp4

19.1 MB

04_security-domains-cybersecurity-analysts-need-to-know_instructions.html

200.0 KB

05_ashley-my-path-to-cybersecurity.en.srt

5.9 KB

05_ashley-my-path-to-cybersecurity.en.txt

3.1 KB

05_ashley-my-path-to-cybersecurity.mp4

20.8 MB

/.../03_navigate-threats-risks-and-vulnerabilities/

01_threats-risks-and-vulnerabilities.en.srt

6.0 KB

01_threats-risks-and-vulnerabilities.en.txt

3.8 KB

01_threats-risks-and-vulnerabilities.mp4

17.9 MB

02_key-impacts-of-threats-risks-and-vulnerabilities.en.srt

5.3 KB

02_key-impacts-of-threats-risks-and-vulnerabilities.en.txt

3.5 KB

02_key-impacts-of-threats-risks-and-vulnerabilities.mp4

18.1 MB

03_herbert-manage-threats-risks-and-vulnerabilities.en.srt

3.1 KB

03_herbert-manage-threats-risks-and-vulnerabilities.en.txt

2.0 KB

03_herbert-manage-threats-risks-and-vulnerabilities.mp4

10.1 MB

04_nist-s-risk-management-framework.en.srt

6.6 KB

04_nist-s-risk-management-framework.en.txt

3.5 KB

04_nist-s-risk-management-framework.mp4

17.1 MB

05_manage-common-threats-risks-and-vulnerabilities_instructions.html

797.8 KB

/.../04_review-security-domains/

01_wrap-up.en.srt

1.5 KB

01_wrap-up.en.txt

0.9 KB

01_wrap-up.mp4

4.1 MB

02_glossary-terms-from-week-1_instructions.html

4.0 KB

/.../01_more-about-frameworks-and-controls/

01_welcome-to-week-2.en.srt

1.7 KB

01_welcome-to-week-2.en.txt

1.0 KB

01_welcome-to-week-2.mp4

5.7 MB

02_frameworks.en.srt

3.5 KB

02_frameworks.en.txt

1.9 KB

02_frameworks.mp4

10.8 MB

03_controls.en.srt

5.5 KB

03_controls.en.txt

3.0 KB

03_controls.mp4

14.8 MB

04_the-relationship-between-frameworks-and-controls_instructions.html

6.7 KB

04_the-relationship-between-frameworks-and-controls_physical-access-control.pdf

7.3 MB

/.../02_the-cia-triad-confidentiality-integrity-and-availability/

01_explore-the-cia-triad.en.srt

4.9 KB

01_explore-the-cia-triad.en.txt

3.2 KB

01_explore-the-cia-triad.mp4

15.5 MB

02_use-the-cia-triad-to-protect-organizations_instructions.html

4.4 KB

/.../03_nist-frameworks/

01_nist-frameworks.en.srt

7.0 KB

01_nist-frameworks.en.txt

3.7 KB

01_nist-frameworks.mp4

18.9 MB

02_explore-the-five-functions-of-the-nist-cybersecurity-framework.en.srt

6.2 KB

02_explore-the-five-functions-of-the-nist-cybersecurity-framework.en.txt

3.3 KB

02_explore-the-five-functions-of-the-nist-cybersecurity-framework.mp4

15.9 MB

/.../04_owasp-principles-and-security-audits/

01_owasp-security-principles.en.srt

6.7 KB

01_owasp-security-principles.en.txt

3.6 KB

01_owasp-security-principles.mp4

20.0 MB

02_more-about-owasp-security-principles_instructions.html

5.5 KB

03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.en.srt

3.1 KB

03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.en.txt

1.9 KB

03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.mp4

10.4 MB

04_plan-a-security-audit.en.srt

7.1 KB

04_plan-a-security-audit.en.txt

3.7 KB

04_plan-a-security-audit.mp4

17.5 MB

05_complete-a-security-audit.en.srt

5.4 KB

05_complete-a-security-audit.en.txt

3.5 KB

05_complete-a-security-audit.mp4

17.8 MB

06_more-about-security-audits_Audit_and_Accountability_AU_CIO-IT_Security_01-08_Rev_6_12-03-2020docx.pdf

1.3 MB

06_more-about-security-audits_Control_categories.docx

858.1 KB

06_more-about-security-audits_instructions.html

9.0 KB

/.../05_review-security-frameworks-and-controls/

01_wrap-up.en.srt

2.9 KB

01_wrap-up.en.txt

1.5 KB

01_wrap-up.mp4

7.4 MB

02_glossary-terms-from-week-2_instructions.html

5.1 KB

/.../01_security-information-and-event-management-siem-dashboards/

01_welcome-to-week-3.en.srt

1.3 KB

01_welcome-to-week-3.en.txt

0.8 KB

01_welcome-to-week-3.mp4

4.5 MB

02_logs-and-siem-tools.en.srt

4.1 KB

02_logs-and-siem-tools.en.txt

2.2 KB

02_logs-and-siem-tools.mp4

9.3 MB

03_siem-dashboards.en.srt

4.5 KB

03_siem-dashboards.en.txt

2.4 KB

03_siem-dashboards.mp4

11.3 MB

04_the-future-of-siem-tools_instructions.html

5.2 KB

05_parisa-the-parallels-of-accessibility-and-security.en.srt

3.9 KB

05_parisa-the-parallels-of-accessibility-and-security.en.txt

2.5 KB

05_parisa-the-parallels-of-accessibility-and-security.mp4

17.2 MB

/.../02_explore-security-information-and-event-management-siem-tools/

01_explore-common-siem-tools.en.srt

4.5 KB

01_explore-common-siem-tools.en.txt

2.9 KB

01_explore-common-siem-tools.mp4

15.4 MB

02_more-about-cybersecurity-tools_instructions.html

5.6 KB

03_talya-myths-about-the-cybersecurity-field.en.srt

3.2 KB

03_talya-myths-about-the-cybersecurity-field.en.txt

1.6 KB

03_talya-myths-about-the-cybersecurity-field.mp4

10.0 MB

04_use-siem-tools-to-protect-organizations_instructions.html

8.8 KB

/.../03_review-introduction-to-cybersecurity-tools/

01_wrap-up.en.srt

1.2 KB

01_wrap-up.en.txt

0.8 KB

01_wrap-up.mp4

2.7 MB

02_glossary-terms-from-week-3_instructions.html

2.7 KB

/.../01_phases-of-incident-response-playbooks/

01_welcome-to-week-4.en.srt

0.9 KB

01_welcome-to-week-4.en.txt

0.5 KB

01_welcome-to-week-4.mp4

3.1 MB

02_phases-of-an-incident-response-playbook.en.srt

8.1 KB

02_phases-of-an-incident-response-playbook.en.txt

4.3 KB

02_phases-of-an-incident-response-playbook.mp4

25.5 MB

03_more-about-playbooks_guidelines.html

17.8 KB

03_more-about-playbooks_instructions.html

205.2 KB

/.../02_explore-incident-response/

01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.en.srt

6.0 KB

01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.en.txt

3.3 KB

01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.mp4

20.0 MB

02_erin-the-importance-of-diversity-of-perspective-on-a-security-team.en.srt

4.5 KB

02_erin-the-importance-of-diversity-of-perspective-on-a-security-team.en.txt

2.8 KB

02_erin-the-importance-of-diversity-of-perspective-on-a-security-team.mp4

20.8 MB

03_playbooks-siem-tools-and-soar-tools_instructions.html

3.2 KB

/.../03_review-use-playbooks-to-respond-to-incidents/

01_wrap-up.en.srt

1.3 KB

01_wrap-up.en.txt

0.8 KB

01_wrap-up.mp4

4.6 MB

02_glossary-terms-from-week-4_instructions.html

1.5 KB

/.../04_congratulations-on-completing-course-2/

01_course-wrap-up.en.srt

2.0 KB

01_course-wrap-up.en.txt

1.3 KB

01_course-wrap-up.mp4

5.5 MB

02_course-2-glossary_Course_2_glossary.docx

879.1 KB

02_course-2-glossary_instructions.html

6.6 KB

03_get-started-on-the-next-course_instructions.html

812.2 KB

/.../01_frequently-asked-questions/

01__resources.html

19.0 KB

/.../02_google-cybersecurity-certificate-glossary/

01__Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

01__resources.html

6.7 KB

/.../03_course-2-glossary/

01__Course_2_glossary.docx

879.1 KB

01__resources.html

6.6 KB

/.../04_course-2-resources-and-citations/

01__Audit_and_Accountability_AU_CIO-IT_Security_01-08_Rev_6_12-03-2020docx.pdf

1.3 MB

01__Cyber-Incident-Response-Standard.docx

64.8 KB

01__Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response_Playbooks_508C.pdf

1.1 MB

01__Format-Security-plus-Study-Guide.pdf

17.2 KB

01__NIST.SP.800-218.pdf

739.9 KB

01__NIST.SP.800-53r5.pdf

6.1 MB

01__dod85.pdf

245.5 KB

01__guidelines.html

17.8 KB

01__index.html

21.8 KB

01__physical-access-control.pdf

7.3 MB

01__resources.html

33.8 KB

01__why-splunk.html

232.9 KB

/.../05_frequently-asked-questions/

01__resources.html

16.3 KB

/.../06_create-a-cybersecurity-portfolio/

01__resources.html

9.0 KB

/.../01_get-started-with-the-course/

01_introduction-to-course-3.en.srt

1.8 KB

01_introduction-to-course-3.en.txt

1.1 KB

01_introduction-to-course-3.mp4

3.8 MB

02_course-3-overview_instructions.html

1.3 MB

03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

03_helpful-resources-and-tips_instructions.html

11.5 KB

/.../02_introduction-to-networks/

01_welcome-to-week-1.en.srt

0.9 KB

01_welcome-to-week-1.en.txt

0.5 KB

01_welcome-to-week-1.mp4

2.4 MB

02_chris-my-path-to-cybersecurity.en.srt

5.0 KB

02_chris-my-path-to-cybersecurity.en.txt

2.7 KB

02_chris-my-path-to-cybersecurity.mp4

19.8 MB

03_what-are-networks.en.srt

2.7 KB

03_what-are-networks.en.txt

1.7 KB

03_what-are-networks.mp4

6.5 MB

04_tina-working-in-network-security.en.srt

3.1 KB

04_tina-working-in-network-security.en.txt

1.7 KB

04_tina-working-in-network-security.mp4

11.9 MB

05_emmanuel-useful-skills-for-network-security.en.srt

5.0 KB

05_emmanuel-useful-skills-for-network-security.en.txt

2.6 KB

05_emmanuel-useful-skills-for-network-security.mp4

14.1 MB

06_network-tools.en.srt

4.6 KB

06_network-tools.en.txt

2.5 KB

06_network-tools.mp4

7.4 MB

07_network-components-devices-and-diagrams_instructions.html

1.8 MB

08_cloud-networks.en.srt

3.7 KB

08_cloud-networks.en.txt

2.4 KB

08_cloud-networks.mp4

9.2 MB

09_cloud-computing-and-software-defined-networks_instructions.html

710.8 KB

10_test-your-knowledge-introduction-to-networks_quiz.html

3.6 KB

/.../03_network-communication/

01_introduction-to-network-communication.en.srt

3.8 KB

01_introduction-to-network-communication.en.txt

2.4 KB

01_introduction-to-network-communication.mp4

7.6 MB

02_the-tcp-ip-model.en.srt

4.5 KB

02_the-tcp-ip-model.en.txt

2.4 KB

02_the-tcp-ip-model.mp4

9.4 MB

03_the-four-layers-of-the-tcp-ip-model.en.srt

3.5 KB

03_the-four-layers-of-the-tcp-ip-model.en.txt

1.9 KB

03_the-four-layers-of-the-tcp-ip-model.mp4

6.8 MB

04_learn-more-about-the-tcp-ip-model_instructions.html

1.6 MB

05_the-osi-model_instructions.html

310.1 KB

06_test-your-knowledge-network-communication_quiz.html

5.0 KB

/.../04_local-and-wide-network-communication/

01_ip-addresses-and-network-communication.en.srt

4.3 KB

01_ip-addresses-and-network-communication.en.txt

2.3 KB

01_ip-addresses-and-network-communication.mp4

7.7 MB

02_components-of-network-layer-communication_instructions.html

657.6 KB

03_test-your-knowledge-local-and-wide-network-communication_quiz.html

3.8 KB

/.../05_review-network-architecture/

01_wrap-up.en.srt

1.1 KB

01_wrap-up.en.txt

0.6 KB

01_wrap-up.mp4

1.8 MB

02_glossary-terms-from-week-1_instructions.html

4.6 KB

03_weekly-challenge-1_exam.html

8.6 KB

/.../01_introduction-to-network-protocols/

01_welcome-to-week-2.en.srt

2.0 KB

01_welcome-to-week-2.en.txt

1.1 KB

01_welcome-to-week-2.mp4

4.8 MB

02_network-protocols.en.srt

6.2 KB

02_network-protocols.en.txt

3.3 KB

02_network-protocols.mp4

11.8 MB

03_common-network-protocols_instructions.html

8.9 KB

04_additional-network-protocols_instructions.html

11.3 KB

05_test-your-knowledge-recognize-different-network-protocols_quiz.html

3.5 KB

06_wireless-protocols.en.srt

2.2 KB

06_wireless-protocols.en.txt

1.1 KB

06_wireless-protocols.mp4

5.4 MB

07_the-evolution-of-wireless-security-protocols_instructions.html

163.0 KB

/.../02_system-identification/

01_firewalls-and-network-security-measures.en.srt

7.6 KB

01_firewalls-and-network-security-measures.en.txt

4.0 KB

01_firewalls-and-network-security-measures.mp4

17.6 MB

02_virtual-private-networks-vpns.en.srt

4.4 KB

02_virtual-private-networks-vpns.en.txt

2.3 KB

02_virtual-private-networks-vpns.mp4

8.5 MB

03_security-zones.en.srt

6.2 KB

03_security-zones.en.txt

3.3 KB

03_security-zones.mp4

12.6 MB

04_subnetting-and-cidr_instructions.html

137.1 KB

05_proxy-servers.en.srt

5.1 KB

05_proxy-servers.en.txt

3.2 KB

05_proxy-servers.mp4

11.8 MB

06_virtual-networks-and-privacy_instructions.html

8.6 KB

07_test-your-knowledge-system-identification_quiz.html

4.4 KB

/.../03_review-network-operations/

01_wrap-up.en.srt

1.1 KB

01_wrap-up.en.txt

0.7 KB

01_wrap-up.mp4

2.9 MB

02_glossary-terms-from-week-2_instructions.html

5.2 KB

03_weekly-challenge-2_exam.html

8.7 KB

/.../01_introduction-to-network-intrusion-tactics/

01_welcome-to-week-3.en.srt

0.7 KB

01_welcome-to-week-3.en.txt

0.4 KB

01_welcome-to-week-3.mp4

1.4 MB

02_the-case-for-securing-networks.en.srt

2.3 KB

02_the-case-for-securing-networks.en.txt

1.4 KB

02_the-case-for-securing-networks.mp4

5.8 MB

03_how-intrusions-compromise-your-system_instructions.html

6.8 KB

/.../02_secure-networks-against-denial-of-service-dos-attacks/

01_denial-of-service-dos-attacks.en.srt

8.0 KB

01_denial-of-service-dos-attacks.en.txt

4.3 KB

01_denial-of-service-dos-attacks.mp4

19.5 MB

02_read-tcpdump-logs_instructions.html

150.2 KB

03_activity-analyze-network-layer-communication_quiz.html

1.3 KB

04_real-life-ddos-attack_instructions.html

5.2 KB

05_test-your-knowledge-secure-networks-against-denial-of-service-dos-attacks_quiz.html

3.9 KB

/.../03_network-attack-tactics-and-defense/

01_malicious-packet-sniffing.en.srt

8.2 KB

01_malicious-packet-sniffing.en.txt

4.4 KB

01_malicious-packet-sniffing.mp4

20.3 MB

02_ip-spoofing.en.srt

5.3 KB

02_ip-spoofing.en.txt

2.8 KB

02_ip-spoofing.mp4

12.1 MB

03_overview-of-interception-tactics_instructions.html

7.4 KB

04_activity-analyze-network-attacks_quiz.html

1.3 KB

05_test-your-knowledge-network-interception-attack-tactics_quiz.html

4.1 KB

/.../04_review-secure-against-network-intrusion/

01_wrap-up.en.srt

1.4 KB

01_wrap-up.en.txt

0.7 KB

01_wrap-up.mp4

3.1 MB

02_glossary-terms-from-week-3_instructions.html

3.8 KB

03_weekly-challenge-3_exam.html

9.5 KB

/.../01_introduction-to-security-hardening/

01_welcome-to-week-4.en.srt

1.5 KB

01_welcome-to-week-4.en.txt

0.9 KB

01_welcome-to-week-4.mp4

4.0 MB

02_security-hardening.en.srt

4.7 KB

02_security-hardening.en.txt

3.0 KB

02_security-hardening.mp4

12.8 MB

/.../02_os-hardening/

01_os-hardening-practices.en.srt

7.7 KB

01_os-hardening-practices.en.txt

4.1 KB

01_os-hardening-practices.mp4

18.9 MB

02_brute-force-attacks-and-os-hardening_instructions.html

8.3 KB

03_activity-apply-os-hardening-techniques_quiz.html

1.3 KB

04_test-your-knowledge-os-hardening_quiz.html

3.8 KB

/.../03_network-hardening/

01_network-hardening-practices.en.srt

6.3 KB

01_network-hardening-practices.en.txt

3.4 KB

01_network-hardening-practices.mp4

17.7 MB

02_network-security-applications_instructions.html

3.0 MB

03_activity-analysis-of-network-hardening_quiz.html

1.3 KB

04_test-your-knowledge-network-hardening_quiz.html

3.9 KB

/.../04_cloud-hardening/

01_network-security-in-the-cloud.en.srt

2.9 KB

01_network-security-in-the-cloud.en.txt

1.9 KB

01_network-security-in-the-cloud.mp4

10.2 MB

02_kelsey-cloud-security-explained.en.srt

3.9 KB

02_kelsey-cloud-security-explained.en.txt

2.4 KB

02_kelsey-cloud-security-explained.mp4

23.0 MB

03_secure-the-cloud_instructions.html

9.2 KB

04_test-your-knowledge-cloud-hardening_quiz.html

3.7 KB

/.../05_review-security-hardening/

01_wrap-up.en.srt

1.6 KB

01_wrap-up.en.txt

0.9 KB

01_wrap-up.mp4

3.3 MB

02_glossary-terms-from-week-4_instructions.html

2.9 KB

03_weekly-challenge-4_exam.html

9.7 KB

04_portfolio-activity-use-the-nist-cybersecurity-framework-to-respond-to-a-security_exam.html

3.5 KB

/.../06_congratulations-on-completing-course-3/

01_course-wrap-up.en.srt

3.0 KB

01_course-wrap-up.en.txt

1.9 KB

01_course-wrap-up.mp4

7.0 MB

02_course-3-glossary_Course_3_glossary.docx

878.1 KB

02_course-3-glossary_instructions.html

6.6 KB

03_get-started-on-the-next-course_instructions.html

805.3 KB

/.../01_frequently-asked-questions/

01__resources.html

19.0 KB

/.../02_google-cybersecurity-certificate-glossary/

01__Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

01__resources.html

6.7 KB

/.../03_course-3-glossary/

01__Course_3_glossary.docx

878.1 KB

01__resources.html

6.6 KB

/.../04_course-3-resources-and-citations/

01__7.1

11.9 KB

01__7.2

7.7 KB

01__aa494182vexchg.140

34.8 KB

01__article.asp

64.3 KB

01__index.html

23.5 KB

01__resources.html

18.0 KB

01__sp800-179r1-draft.pdf

1.9 MB

01__what-is-a-firewall.html

62.8 KB

/.../05_frequently-asked-questions/

01__resources.html

16.3 KB

/.../06_create-a-cybersecurity-portfolio/

01__resources.html

9.0 KB

/.../01_get-started-with-the-course/

01_introduction-to-course-8.en.srt

3.9 KB

01_introduction-to-course-8.en.txt

2.5 KB

01_introduction-to-course-8.mp4

13.8 MB

02_course-8-overview_instructions.html

1.4 MB

03_dion-my-personal-career-journey.en.srt

3.8 KB

03_dion-my-personal-career-journey.en.txt

2.3 KB

03_dion-my-personal-career-journey.mp4

17.7 MB

04_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

04_helpful-resources-and-tips_instructions.html

11.5 KB

/.../02_event-and-incident-detection/

01_welcome-to-week-1.en.srt

1.0 KB

01_welcome-to-week-1.en.txt

0.5 KB

01_welcome-to-week-1.mp4

1.9 MB

02_security-as-a-mindset.en.srt

5.2 KB

02_security-as-a-mindset.en.txt

2.8 KB

02_security-as-a-mindset.mp4

17.8 MB

03_data-and-asset-classification_instructions.html

5.9 KB

/.../03_your-impact-on-data-protection/

01_detect-and-protect-without-neglect.en.srt

5.9 KB

01_detect-and-protect-without-neglect.en.txt

3.2 KB

01_detect-and-protect-without-neglect.mp4

19.5 MB

02_disaster-recovery-and-business-continuity_instructions.html

5.6 KB

03_julianas-story-asset-protection_instructions.html

5.1 KB

/.../04_review-protect-assets-and-communicate-incidents/

01_wrap-up.en.srt

1.6 KB

01_wrap-up.en.txt

1.0 KB

01_wrap-up.mp4

4.3 MB

02_glossary-terms-from-week-1_instructions.html

2.4 KB

/.../01_escalation-in-cybersecurity/

01_welcome-to-week-2.en.srt

2.4 KB

01_welcome-to-week-2.en.txt

1.2 KB

01_welcome-to-week-2.mp4

6.4 MB

02_the-importance-of-escalation.en.srt

6.8 KB

02_the-importance-of-escalation.en.txt

3.6 KB

02_the-importance-of-escalation.mp4

19.9 MB

03_escalate-with-a-purpose_instructions.html

5.0 KB

/.../02_to-escalate-or-not-to-escalate/

01_prepare-to-escalate-through-security-recognition.en.srt

5.7 KB

01_prepare-to-escalate-through-security-recognition.en.txt

3.0 KB

01_prepare-to-escalate-through-security-recognition.mp4

18.1 MB

02_recognize-roles-and-responsibilities-during-escalation_instructions.html

4.4 KB

/.../03_timing-is-everything/

01_from-simple-activity-to-major-data-breach.en.srt

5.6 KB

01_from-simple-activity-to-major-data-breach.en.txt

3.0 KB

01_from-simple-activity-to-major-data-breach.mp4

19.2 MB

02_when-and-how-to-escalate-a-security-incident.en.srt

3.5 KB

02_when-and-how-to-escalate-a-security-incident.en.txt

2.2 KB

02_when-and-how-to-escalate-a-security-incident.mp4

13.5 MB

03_escalation-timing_instructions.html

5.7 KB

04_julianas-story-attention-to-detail_instructions.html

4.9 KB

/.../04_review-escalate-incidents/

01_wrap-up.en.srt

1.6 KB

01_wrap-up.en.txt

1.0 KB

01_wrap-up.mp4

4.7 MB

02_glossary-terms-from-week-2_instructions.html

2.5 KB

/.../01_understand-your-stakeholders/

01_welcome-to-week-3.en.srt

1.2 KB

01_welcome-to-week-3.en.txt

0.7 KB

01_welcome-to-week-3.mp4

3.9 MB

02_stakeholders-in-cybersecurity.en.srt

6.9 KB

02_stakeholders-in-cybersecurity.en.txt

3.7 KB

02_stakeholders-in-cybersecurity.mp4

15.9 MB

03_the-purpose-and-impact-of-stakeholders_instructions.html

5.8 KB

/.../02_communicate-for-impact/

01_clear-and-concise-communication.en.srt

3.7 KB

01_clear-and-concise-communication.en.txt

2.0 KB

01_clear-and-concise-communication.mp4

12.7 MB

02_building-blocks-of-cybersecurity-communications.en.srt

6.0 KB

02_building-blocks-of-cybersecurity-communications.en.txt

3.1 KB

02_building-blocks-of-cybersecurity-communications.mp4

17.8 MB

03_communicate-effectively-with-stakeholders_instructions.html

5.2 KB

/.../03_visual-communication-using-a-dashboard/

01_visual-storytelling-in-cybersecurity.en.srt

3.9 KB

01_visual-storytelling-in-cybersecurity.en.txt

2.4 KB

01_visual-storytelling-in-cybersecurity.mp4

16.9 MB

02_create-visual-dashboards-for-impactful-cybersecurity-communications_instructions.html

5.1 KB

03_how-to-create-a-visual-dashboard.en.srt

5.4 KB

03_how-to-create-a-visual-dashboard.en.txt

3.2 KB

03_how-to-create-a-visual-dashboard.mp4

19.0 MB

04_julianas-story-effective-communication_instructions.html

4.6 KB

/.../04_review-communicate-effectively-to-influence-stakeholders/

01_wrap-up.en.srt

3.0 KB

01_wrap-up.en.txt

1.5 KB

01_wrap-up.mp4

9.5 MB

02_glossary-terms-from-week-3_instructions.html

1.3 KB

/.../01_reliable-sources-go-a-long-way/

01_welcome-to-week-4.en.srt

2.2 KB

01_welcome-to-week-4.en.txt

1.4 KB

01_welcome-to-week-4.mp4

7.2 MB

02_helpful-cybersecurity-resources.en.srt

4.3 KB

02_helpful-cybersecurity-resources.en.txt

2.2 KB

02_helpful-cybersecurity-resources.mp4

16.0 MB

03_strategies-for-engaging-with-the-cybersecurity-community_instructions.html

5.6 KB

04_victoria-continue-your-learning-journey.en.srt

4.0 KB

04_victoria-continue-your-learning-journey.en.txt

2.5 KB

04_victoria-continue-your-learning-journey.mp4

16.2 MB

/.../02_build-your-cybersecurity-network/

01_engage-with-the-cybersecurity-community-in-a-meaningful-way.en.srt

4.8 KB

01_engage-with-the-cybersecurity-community-in-a-meaningful-way.en.txt

3.2 KB

01_engage-with-the-cybersecurity-community-in-a-meaningful-way.mp4

15.4 MB

02_connect-with-other-cybersecurity-professionals_instructions.html

4.3 KB

03_sarah-network-in-the-cybersecurity-community.en.srt

3.6 KB

03_sarah-network-in-the-cybersecurity-community.en.txt

2.3 KB

03_sarah-network-in-the-cybersecurity-community.mp4

10.8 MB

/.../03_review-engage-with-the-cybersecurity-community/

01_wrap-up.en.srt

1.4 KB

01_wrap-up.en.txt

0.9 KB

01_wrap-up.mp4

4.0 MB

02_glossary-terms-from-week-4_instructions.html

1.2 KB

/.../01_find-and-prepare-for-a-job-in-cybersecurity/

01_welcome-to-week-5.en.srt

2.7 KB

01_welcome-to-week-5.en.txt

1.5 KB

01_welcome-to-week-5.mp4

7.9 MB

02_find-cybersecurity-jobs.en.srt

5.7 KB

02_find-cybersecurity-jobs.en.txt

3.0 KB

02_find-cybersecurity-jobs.mp4

17.1 MB

03_create-a-resume.en.srt

6.3 KB

03_create-a-resume.en.txt

4.0 KB

03_create-a-resume.mp4

12.5 MB

04_tips-for-finding-and-applying-for-a-job_instructions.html

4.3 KB

05_garvey-cover-letter-tips.en.srt

5.1 KB

05_garvey-cover-letter-tips.en.txt

3.1 KB

05_garvey-cover-letter-tips.mp4

12.2 MB

/.../02_the-cybersecurity-job-interview-process/

01_explore-the-interview-process.en.srt

6.5 KB

01_explore-the-interview-process.en.txt

3.5 KB

01_explore-the-interview-process.mp4

14.7 MB

02_the-interview-process_instructions.html

5.4 KB

03_garvey-technical-interview-tips.en.srt

4.8 KB

03_garvey-technical-interview-tips.en.txt

3.0 KB

03_garvey-technical-interview-tips.mp4

11.8 MB

04_prepare-for-technical-interviews_instructions.html

5.8 KB

05_conduct-pre-interview-research.en.srt

5.2 KB

05_conduct-pre-interview-research.en.txt

2.8 KB

05_conduct-pre-interview-research.mp4

13.2 MB

06_build-rapport-with-interviewers.en.srt

6.1 KB

06_build-rapport-with-interviewers.en.txt

3.3 KB

06_build-rapport-with-interviewers.mp4

14.3 MB

/.../03_answer-interview-questions/

01_use-strategies-to-answer-interview-questions.en.srt

4.4 KB

01_use-strategies-to-answer-interview-questions.en.txt

2.8 KB

01_use-strategies-to-answer-interview-questions.mp4

12.6 MB

02_apply-the-star-method-during-interviews_instructions.html

52.2 KB

03_prepare-for-interviews_instructions.html

5.6 KB

03_prepare-for-interviews_vol01iss13.cfm

46.6 KB

04_ask-the-interviewer-questions.en.srt

2.5 KB

04_ask-the-interviewer-questions.en.txt

1.7 KB

04_ask-the-interviewer-questions.mp4

8.3 MB

05_karan-interview-tips-from-a-hiring-manager.en.srt

5.0 KB

05_karan-interview-tips-from-a-hiring-manager.en.txt

2.7 KB

05_karan-interview-tips-from-a-hiring-manager.mp4

19.4 MB

06_prepare-for-interviews-with-interview-warmup_instructions.html

187.5 KB

/.../04_develop-an-elevator-pitch/

01_develop-an-elevator-pitch.en.srt

4.6 KB

01_develop-an-elevator-pitch.en.txt

2.9 KB

01_develop-an-elevator-pitch.mp4

13.6 MB

02_learn-more-about-developing-an-elevator-pitch_instructions.html

5.1 KB

03_tips-for-interviewing-remotely_instructions.html

5.7 KB

04_emily-overcome-imposter-syndrome.en.srt

4.8 KB

04_emily-overcome-imposter-syndrome.en.txt

2.6 KB

04_emily-overcome-imposter-syndrome.mp4

14.6 MB

/.../05_review-find-and-apply-for-cybersecurity-jobs/

01_wrap-up.en.srt

1.1 KB

01_wrap-up.en.txt

0.6 KB

01_wrap-up.mp4

2.1 MB

02_glossary-terms-from-week-5_instructions.html

1.4 KB

03_course-wrap-up.en.srt

1.8 KB

03_course-wrap-up.en.txt

1.2 KB

03_course-wrap-up.mp4

2.9 MB

04_course-8-glossary_Course_8_glossary.docx

1.2 MB

04_course-8-glossary_instructions.html

6.6 KB

/.../06_certificate-wrap-up/

01_recap-of-the-google-cybersecurity-certificate-program.en.srt

4.0 KB

01_recap-of-the-google-cybersecurity-certificate-program.en.txt

2.2 KB

01_recap-of-the-google-cybersecurity-certificate-program.mp4

9.3 MB

02_congratulations-on-completing-the-google-cybersecurity-certificate-program.en.srt

2.9 KB

02_congratulations-on-completing-the-google-cybersecurity-certificate-program.en.txt

1.4 KB

02_congratulations-on-completing-the-google-cybersecurity-certificate-program.mp4

9.9 MB

03_showcase-your-work_instructions.html

920.8 KB

03_showcase-your-work_overview.html

651.7 KB

04_claim-your-google-cybersecurity-certificate-badge_instructions.html

4.6 KB

05_google-cybersecurity-certificate-glossary_Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

05_google-cybersecurity-certificate-glossary_instructions.html

6.7 KB

/.../01_frequently-asked-questions/

01__resources.html

19.0 KB

/.../02_course-8-glossary/

01__Course_8_glossary.docx

1.2 MB

01__resources.html

6.6 KB

/.../03_course-8-resources-and-citations/

01__R0239.pdf

225.9 KB

01__nist.sp.800-61r2.pdf

1.5 MB

01__overview.html

651.7 KB

01__resources.html

11.8 KB

01__vol01iss13.cfm

46.6 KB

/.../04_google-cybersecurity-certificate-glossary/

01__Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

01__resources.html

6.7 KB

/.../05_frequently-asked-questions/

01__resources.html

16.3 KB

/.../06_create-a-cybersecurity-portfolio/

01__resources.html

9.0 KB

 

Total files 1330


Copyright © 2024 FileMood.com