CourserHub com Coursera Google Cybersecurity Professional Certificate |
||
Name |
[CourserHub.com] Coursera - Google Cybersecurity Professional Certificate |
DOWNLOAD Copy Link |
Total Size |
4.1 GB |
|
Total Files |
1330 |
|
Last Seen |
2024-12-21 23:33 |
|
Hash |
FEFA0EA64A939F45215B17E226DBA7EBB2C1B171 |
/0. Websites you may like/ |
|
|
0.1 KB |
/ |
|
|
0.1 KB |
/.../01_get-started-with-the-course/ |
|
|
4.5 KB |
|
2.8 KB |
|
16.8 MB |
|
1.3 MB |
03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx |
900.4 KB |
|
11.5 KB |
|
4.5 KB |
|
2.3 KB |
|
14.6 MB |
/.../02_introduction-to-assets/ |
|
|
3.4 KB |
|
2.1 KB |
|
10.7 MB |
|
7.1 KB |
|
4.4 KB |
|
21.8 MB |
03_understand-risks-threats-and-vulnerabilities_instructions.html |
6.6 KB |
|
3.9 KB |
|
2.4 KB |
|
17.8 MB |
|
6.8 KB |
|
3.7 KB |
|
17.7 MB |
|
108.8 KB |
/.../03_digital-and-physical-assets/ |
|
|
6.8 KB |
|
3.6 KB |
|
18.8 MB |
|
144.7 KB |
/.../04_risk-and-asset-security/ |
|
|
6.3 KB |
|
4.1 KB |
|
21.2 MB |
|
5.9 KB |
|
3.7 KB |
|
21.3 MB |
|
1.6 MB |
|
483.8 KB |
/.../05_review-introduction-to-asset-security/ |
|
|
3.1 KB |
|
1.7 KB |
|
7.2 MB |
|
3.5 KB |
/.../01_safeguard-information/ |
|
|
3.2 KB |
|
1.7 KB |
|
10.3 MB |
|
5.3 KB |
|
3.4 KB |
|
20.5 MB |
|
7.9 KB |
04_information-privacy-regulations-and-compliance_instructions.html |
132.3 KB |
|
3.4 KB |
|
1.8 KB |
|
15.3 MB |
/.../02_encryption-methods/ |
|
|
6.1 KB |
|
3.8 KB |
|
23.7 MB |
|
8.9 KB |
|
4.6 KB |
|
22.2 MB |
|
9.4 KB |
|
111.1 KB |
|
5.1 KB |
|
3.2 KB |
|
14.2 MB |
|
599.4 KB |
/.../03_authentication-authorization-and-accounting/ |
|
|
6.3 KB |
|
4.0 KB |
|
19.2 MB |
|
378.4 KB |
|
8.3 KB |
|
4.4 KB |
|
26.4 MB |
|
5.6 KB |
|
3.0 KB |
|
17.0 MB |
|
2.1 KB |
|
1.3 KB |
|
7.3 MB |
|
310.1 KB |
/.../04_review-protect-organizational-assets/ |
|
|
2.4 KB |
|
1.6 KB |
|
8.6 MB |
|
7.2 KB |
/.../01_flaws-in-the-system/ |
|
|
2.9 KB |
|
1.7 KB |
|
9.6 MB |
|
6.1 KB |
|
3.9 KB |
|
23.0 MB |
|
6.4 KB |
|
3.4 KB |
|
20.9 MB |
|
8.3 KB |
|
4.4 KB |
|
29.2 MB |
|
145.3 KB |
/.../02_identify-system-vulnerabilities/ |
|
|
6.0 KB |
|
3.2 KB |
|
20.4 MB |
|
7.6 KB |
|
7.3 KB |
|
4.5 KB |
|
2.8 KB |
|
10.4 MB |
/.../03_cyber-attacker-mindset/ |
|
|
5.9 KB |
|
3.7 KB |
|
23.6 MB |
02_approach-cybersecurity-with-an-attacker-mindset_instructions.html |
210.9 KB |
|
505.2 KB |
|
4.7 KB |
|
3.0 KB |
|
19.0 MB |
|
7.6 KB |
|
4.0 KB |
|
23.5 MB |
06_fortify-against-brute-force-cyber-attacks_NIST.SP.800-63b.pdf |
1.3 MB |
06_fortify-against-brute-force-cyber-attacks_instructions.html |
156.8 KB |
/.../04_review-vulnerabilities-in-systems/ |
|
|
3.7 KB |
|
2.0 KB |
|
12.4 MB |
|
3.7 KB |
/.../01_social-engineering/ |
|
|
3.1 KB |
|
1.7 KB |
|
9.0 MB |
|
7.5 KB |
|
4.1 KB |
|
22.7 MB |
|
179.5 KB |
|
7.0 KB |
|
4.4 KB |
|
25.2 MB |
|
347.5 KB |
/.../04_threats-to-asset-security/02_malware/ |
|
|
7.8 KB |
|
4.2 KB |
|
25.7 MB |
|
167.8 KB |
|
6.8 KB |
|
3.7 KB |
|
24.8 MB |
/.../03_web-based-exploits/ |
|
|
7.5 KB |
|
4.6 KB |
|
22.5 MB |
|
5.2 KB |
|
3.3 KB |
|
18.2 MB |
/.../04_threat-modeling/ |
|
|
5.1 KB |
|
3.2 KB |
|
17.9 MB |
|
3.8 KB |
|
2.0 KB |
|
14.8 MB |
03_pasta-the-process-for-attack-simulation-and-threat-analysis.en.srt |
6.2 KB |
03_pasta-the-process-for-attack-simulation-and-threat-analysis.en.txt |
3.9 KB |
03_pasta-the-process-for-attack-simulation-and-threat-analysis.mp4 |
18.7 MB |
|
123.8 KB |
/.../05_review-threats-in-cybersecurity/ |
|
|
2.9 KB |
|
1.5 KB |
|
8.5 MB |
|
8.1 KB |
/.../06_congratulations-on-completing-course-5/ |
|
|
4.5 KB |
|
2.8 KB |
|
18.5 MB |
|
883.1 KB |
|
6.6 KB |
|
813.8 KB |
/.../01_frequently-asked-questions/ |
|
|
19.0 KB |
/.../02_google-cybersecurity-certificate-glossary/ |
|
|
900.4 KB |
|
6.7 KB |
/.../03_resources-for-completing-labs/ |
|
|
111.1 KB |
/.../04_course-5-resources-and-citations/ |
|
|
26.1 KB |
|
8.8 KB |
|
176.6 KB |
|
5.5 KB |
|
8.4 KB |
|
1.5 MB |
|
310.6 KB |
01__Trend_Report_-_Why_Businesses_are_Moving_to_the_Cloud.pdf |
1.3 MB |
|
159.6 KB |
|
46.3 KB |
01__gdpr-tldr-what-security-pros-need-to-know-about-the-new-era-of-privacy-regulations.html |
159.2 KB |
01__hashing-explained-why-its-your-best-bet-to-protect-stored-passwords.html |
163.4 KB |
|
200.6 KB |
|
216.8 KB |
|
201.5 KB |
|
61.6 KB |
|
112.8 KB |
01__ssrf-attacks-explained-and-how-to-defend-against-them.html |
159.3 KB |
|
78.6 KB |
|
173.2 KB |
|
253.5 KB |
|
165.3 KB |
/.../05_course-5-glossary/ |
|
|
883.1 KB |
|
6.6 KB |
/.../06_frequently-asked-questions/ |
|
|
16.3 KB |
/.../07_create-a-cybersecurity-portfolio/ |
|
|
9.0 KB |
/.../01_get-started-with-the-course/ |
|
|
4.9 KB |
|
3.1 KB |
|
18.9 MB |
|
1.3 MB |
|
5.0 KB |
|
2.7 KB |
|
17.3 MB |
04_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx |
900.4 KB |
|
11.5 KB |
/.../02_introduction-to-python-programming-in-cybersecurity/ |
|
|
2.9 KB |
|
1.5 KB |
|
8.2 MB |
|
5.3 KB |
|
3.4 KB |
|
21.1 MB |
|
4.4 KB |
|
3.8 KB |
|
2.0 KB |
|
8.8 MB |
|
4.3 KB |
|
2.1 KB |
|
1.3 KB |
|
6.0 MB |
/.../03_core-python-components/ |
|
|
7.8 KB |
|
4.0 KB |
|
20.3 MB |
|
12.5 KB |
|
10.2 KB |
|
5.4 KB |
|
22.7 MB |
04_assign-and-reassign-variables-in-python_instructions.html |
8.4 KB |
/.../04_conditional-and-iterative-statements/ |
|
|
9.9 KB |
|
6.3 KB |
|
18.5 MB |
|
15.5 KB |
|
7.8 KB |
|
4.1 KB |
|
12.8 MB |
|
8.3 KB |
|
4.4 KB |
|
10.7 MB |
|
16.0 KB |
/.../05_review-introduction-to-python/ |
|
|
1.6 KB |
|
0.9 KB |
|
3.6 MB |
|
4.1 KB |
/.../01_introduction-to-functions/ |
|
|
2.2 KB |
|
1.2 KB |
|
5.2 MB |
|
4.1 KB |
|
2.2 KB |
|
14.5 MB |
|
3.8 KB |
|
1.9 KB |
|
7.5 MB |
|
7.0 KB |
/.../02_work-with-functions/ |
|
|
5.6 KB |
|
3.4 KB |
|
11.1 MB |
|
4.9 KB |
|
3.1 KB |
|
14.4 MB |
|
11.1 KB |
|
8.7 KB |
|
4.6 KB |
|
22.0 MB |
|
275.6 KB |
|
7.6 KB |
/.../03_learn-from-the-python-community/ |
|
|
3.3 KB |
|
2.1 KB |
|
11.9 MB |
|
6.3 KB |
|
3.9 KB |
|
20.0 MB |
03_ensure-proper-syntax-and-readability-in-python_instructions.html |
9.8 KB |
04_dorsa-use-python-efficiently-on-a-cybersecurity-team.en.srt |
4.4 KB |
04_dorsa-use-python-efficiently-on-a-cybersecurity-team.en.txt |
2.3 KB |
|
11.9 MB |
/.../04_review-write-effective-python-code/ |
|
|
1.8 KB |
|
1.0 KB |
|
3.9 MB |
|
3.1 KB |
/.../01_working-with-strings/ |
|
|
2.0 KB |
|
1.1 KB |
|
5.1 MB |
|
8.0 KB |
|
4.2 KB |
|
22.3 MB |
|
8.7 KB |
|
4.6 KB |
|
21.3 MB |
|
13.8 KB |
/.../02_work-with-lists-and-develop-algorithms/ |
|
|
8.5 KB |
|
5.3 KB |
|
20.3 MB |
|
8.6 KB |
|
4.5 KB |
|
18.4 MB |
|
13.4 KB |
/.../03_regular-expressions/ |
|
|
10.6 KB |
|
6.6 KB |
|
22.9 MB |
|
11.7 KB |
/.../04_review-work-with-strings-and-lists/ |
|
|
1.8 KB |
|
1.0 KB |
|
3.8 MB |
|
2.6 KB |
/.../01_python-for-automation/ |
|
|
2.0 KB |
|
1.1 KB |
|
5.4 MB |
|
5.9 KB |
|
3.1 KB |
|
20.0 MB |
03_essential-python-components-for-automation_instructions.html |
8.4 KB |
|
3.7 KB |
|
1.9 KB |
|
11.9 MB |
/.../02_work-with-files-in-python/ |
|
|
4.1 KB |
|
2.6 KB |
|
11.0 MB |
|
109.9 KB |
|
3.6 KB |
|
1.9 KB |
|
10.5 MB |
|
7.0 KB |
|
4.4 KB |
|
16.0 MB |
/.../03_debug-python-code/ |
|
|
8.7 KB |
|
4.5 KB |
|
24.2 MB |
|
8.1 KB |
|
4.3 KB |
|
14.2 MB |
|
13.3 KB |
/.../04_review-python-in-practice/ |
|
|
1.5 KB |
|
0.8 KB |
|
3.0 MB |
|
3.0 KB |
/.../05_congratulations-on-completing-course-7/ |
|
|
3.6 KB |
|
1.9 KB |
|
12.4 MB |
|
890.7 KB |
|
6.6 KB |
|
825.4 KB |
/.../01_frequently-asked-questions/ |
|
|
19.1 KB |
/.../02_google-cybersecurity-certificate-glossary/ |
|
|
900.4 KB |
|
6.7 KB |
/.../03_course-7-glossary/ |
|
|
890.7 KB |
|
6.6 KB |
/.../04_course-7-resources-and-citations/ |
|
|
275.6 KB |
|
7.2 KB |
/.../05_frequently-asked-questions/ |
|
|
16.3 KB |
/.../06_create-a-cybersecurity-portfolio/ |
|
|
9.0 KB |
/.../0. Websites you may like/ |
|
|
0.1 KB |
/.../01_get-started-with-the-course/ |
|
|
4.2 KB |
|
2.2 KB |
|
7.6 MB |
|
1.3 MB |
03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx |
900.4 KB |
|
11.5 KB |
|
4.4 KB |
|
2.4 KB |
|
14.6 MB |
/.../02_the-incident-response-lifecycle/ |
|
|
2.6 KB |
|
1.6 KB |
|
6.1 MB |
|
6.6 KB |
|
4.1 KB |
|
16.8 MB |
/.../03_incident-response-operations/ |
|
|
4.7 KB |
|
3.0 KB |
|
13.0 MB |
02_fatima-the-importance-of-communication-during-incident-response.en.srt |
4.7 KB |
02_fatima-the-importance-of-communication-during-incident-response.en.txt |
2.4 KB |
02_fatima-the-importance-of-communication-during-incident-response.mp4 |
15.9 MB |
|
86.4 KB |
|
3.7 KB |
|
2.3 KB |
|
9.8 MB |
/.../04_incident-response-tools/ |
|
|
2.9 KB |
|
1.6 KB |
|
5.7 MB |
|
4.7 KB |
|
3.0 KB |
|
11.5 MB |
|
3.2 KB |
|
1.7 KB |
|
5.6 MB |
|
9.7 KB |
05_alert-and-event-management-with-siem-and-soar-tools.en.srt |
6.1 KB |
05_alert-and-event-management-with-siem-and-soar-tools.en.txt |
3.8 KB |
|
15.2 MB |
/.../05_review-introduction-to-detection-and-incident-response/ |
|
|
1.4 KB |
|
0.8 KB |
|
2.5 MB |
|
4.2 KB |
/.../01_understand-network-traffic/ |
|
|
1.9 KB |
|
1.0 KB |
|
3.9 MB |
|
2.8 KB |
|
1.5 KB |
|
14.6 MB |
|
4.6 KB |
|
3.0 KB |
|
13.4 MB |
04_maintain-awareness-with-network-monitoring_instructions.html |
300.8 KB |
|
7.4 KB |
|
4.0 KB |
|
16.3 MB |
/.../02_capture-and-view-network-traffic/ |
|
|
5.2 KB |
|
2.8 KB |
|
10.7 MB |
|
753.5 KB |
|
2.8 KB |
|
1.7 KB |
|
8.0 MB |
|
8.0 KB |
|
4.3 KB |
|
14.3 MB |
|
3.8 MB |
|
111.1 KB |
/.../03_packet-inspection/ |
|
|
7.2 KB |
|
3.8 KB |
|
9.8 MB |
|
135.7 KB |
|
74.3 KB |
/.../04_review-network-monitoring-and-analysis/ |
|
|
1.6 KB |
|
0.9 KB |
|
3.4 MB |
|
4.1 KB |
/.../01_incident-detection-and-verification/ |
|
|
1.6 KB |
|
1.0 KB |
|
3.7 MB |
|
3.1 KB |
|
2.1 KB |
|
9.0 MB |
03_cybersecurity-incident-detection-methods_instructions.html |
7.9 KB |
|
4.4 KB |
|
2.8 KB |
|
14.0 MB |
|
130.8 KB |
|
68.7 KB |
06_analyze-indicators-of-compromise-with-investigative-tools_instructions.html |
1.5 MB |
/.../02_create-and-use-documentation/ |
|
|
3.7 KB |
|
2.3 KB |
|
9.8 MB |
|
5.7 KB |
|
3.6 KB |
|
13.7 MB |
03_best-practices-for-effective-documentation_instructions.html |
6.0 KB |
|
6.2 KB |
|
3.3 KB |
|
13.6 MB |
/.../03_response-and-recovery/ |
|
|
6.2 KB |
|
3.3 KB |
|
12.1 MB |
|
3.9 KB |
|
2.4 KB |
|
14.8 MB |
|
8.5 KB |
04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.en.srt |
4.5 KB |
04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.en.txt |
2.5 KB |
04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.mp4 |
10.3 MB |
|
6.4 KB |
/.../04_post-incident-actions/ |
|
|
3.6 KB |
|
2.3 KB |
|
8.6 MB |
|
239.0 KB |
/.../05_review-incident-investigation-and-response/ |
|
|
1.7 KB |
|
1.1 KB |
|
3.0 MB |
|
4.9 KB |
/.../01_overview-of-logs/ |
|
|
2.2 KB |
|
1.3 KB |
|
5.2 MB |
|
6.1 KB |
|
3.8 KB |
|
13.4 MB |
03_best-practices-for-log-collection-and-management_instructions.html |
8.5 KB |
|
3.1 KB |
|
1.9 KB |
|
9.8 MB |
|
6.9 KB |
|
3.7 KB |
|
12.5 MB |
|
16.8 KB |
/.../02_overview-of-intrusion-detection-systems-ids/ |
|
|
6.2 KB |
|
3.3 KB |
|
15.4 MB |
|
351.0 KB |
|
6.8 KB |
|
3.6 KB |
|
13.4 MB |
|
6.1 KB |
|
3.9 KB |
|
8.8 MB |
|
3.3 KB |
|
2.1 KB |
|
7.7 MB |
|
23.5 KB |
|
33.3 KB |
|
127.4 KB |
|
24.0 KB |
|
242.3 KB |
/.../03_overview-of-security-information-event-management-siem/ |
|
|
3.7 KB |
|
2.3 KB |
|
9.5 MB |
|
7.2 KB |
|
3.9 KB |
|
9.7 MB |
|
6.8 KB |
|
3.6 KB |
|
8.6 MB |
|
425.5 KB |
/.../04_review-network-traffic-and-logs-using-ids-and-siem-tools/ |
|
|
1.9 KB |
|
1.2 KB |
|
3.6 MB |
|
4.6 KB |
/.../05_congratulations-on-completing-course-6/ |
|
|
3.7 KB |
|
1.9 KB |
|
6.1 MB |
|
880.3 KB |
|
6.6 KB |
|
808.4 KB |
/.../01_frequently-asked-questions/ |
|
|
19.0 KB |
/.../02_google-cybersecurity-certificate-glossary/ |
|
|
900.4 KB |
|
6.7 KB |
/.../03_resources-for-completing-labs/ |
|
|
111.1 KB |
/.../04_course-6-glossary/ |
|
|
880.4 KB |
|
6.6 KB |
/.../05_course-6-resources-and-citations/ |
|
01__Bryan_Nolen_-_Surviving_Your_First_Incident_Purplecon_2018.pdf |
145.8 KB |
|
291.5 KB |
|
368.9 KB |
|
33.3 KB |
|
224.9 KB |
|
1.5 MB |
|
1.8 MB |
|
174.4 KB |
|
37.9 KB |
|
24.0 KB |
|
242.3 KB |
|
74.3 KB |
|
68.7 KB |
|
91.5 KB |
/.../06_frequently-asked-questions/ |
|
|
16.3 KB |
/.../07_create-a-cybersecurity-portfolio/ |
|
|
9.0 KB |
/detection-and-response/ |
|
|
0.1 KB |
/.../01_get-started-with-the-certificate-program/ |
|
|
15.6 KB |
|
8.2 KB |
|
49.6 MB |
02_google-cybersecurity-certificate-overview_instructions.html |
512.5 KB |
|
1.3 MB |
|
2.0 KB |
|
1.1 KB |
|
4.9 MB |
05_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx |
900.4 KB |
|
11.5 KB |
|
3.8 KB |
/.../02_introduction-to-cybersecurity/ |
|
|
7.3 KB |
|
3.9 KB |
|
24.2 MB |
|
5.7 KB |
|
3.0 KB |
|
21.0 MB |
03_responsibilities-of-an-entry-level-cybersecurity-analyst.en.srt |
4.6 KB |
03_responsibilities-of-an-entry-level-cybersecurity-analyst.en.txt |
2.5 KB |
03_responsibilities-of-an-entry-level-cybersecurity-analyst.mp4 |
15.2 MB |
|
3.9 KB |
|
2.5 KB |
|
16.8 MB |
|
5.7 KB |
/.../03_core-skills-for-cybersecurity-professionals/ |
|
|
7.8 KB |
|
4.2 KB |
|
20.3 MB |
|
3.2 KB |
|
1.6 KB |
|
11.5 MB |
03_transferable-and-technical-cybersecurity-skills_instructions.html |
7.5 KB |
|
4.2 KB |
|
2.6 KB |
|
18.7 MB |
/.../04_review-welcome-to-the-exciting-world-of-cybersecurity/ |
|
|
1.7 KB |
|
0.9 KB |
|
4.2 MB |
|
2.8 KB |
/.../01_the-history-of-cybersecurity/ |
|
|
2.2 KB |
|
1.2 KB |
|
7.0 MB |
|
6.5 KB |
|
3.4 KB |
|
23.1 MB |
|
6.7 KB |
|
4.3 KB |
|
26.8 MB |
|
8.6 KB |
|
2.9 KB |
|
1.5 KB |
|
14.6 MB |
/.../02_the-eight-cissp-security-domains/ |
|
01_introduction-to-the-eight-cissp-security-domains-part-1.en.srt |
5.4 KB |
01_introduction-to-the-eight-cissp-security-domains-part-1.en.txt |
3.4 KB |
01_introduction-to-the-eight-cissp-security-domains-part-1.mp4 |
19.2 MB |
02_introduction-to-the-eight-cissp-security-domains-part-2.en.srt |
5.8 KB |
02_introduction-to-the-eight-cissp-security-domains-part-2.en.txt |
3.1 KB |
02_introduction-to-the-eight-cissp-security-domains-part-2.mp4 |
18.2 MB |
|
230.4 KB |
|
320.8 KB |
/.../03_review-the-evolution-of-cybersecurity/ |
|
|
2.3 KB |
|
1.5 KB |
|
7.7 MB |
|
4.3 KB |
/.../01_frameworks-and-controls/ |
|
|
3.9 KB |
|
2.4 KB |
|
15.2 MB |
|
7.7 KB |
|
4.1 KB |
|
24.5 MB |
|
7.0 KB |
|
3.7 KB |
|
20.1 MB |
|
155.5 KB |
|
3.2 KB |
|
2.0 KB |
|
17.6 MB |
/.../02_ethics-in-cybersecurity/ |
|
|
6.7 KB |
|
4.2 KB |
|
23.6 MB |
02_ethical-concepts-that-guide-cybersecurity-decisions_instructions.html |
8.1 KB |
03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.en.srt |
4.2 KB |
03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.en.txt |
2.3 KB |
03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.mp4 |
15.3 MB |
/.../03_review-protect-against-threats-risks-and-vulnerabilities/ |
|
|
1.7 KB |
|
1.0 KB |
|
4.9 MB |
|
4.0 KB |
/.../01_important-cybersecurity-tools/ |
|
|
2.6 KB |
|
1.4 KB |
|
7.4 MB |
|
7.3 KB |
|
3.9 KB |
|
21.2 MB |
03_tools-for-protecting-business-operations_gcat_threathorizons_full_sept2022.pdf |
3.1 MB |
03_tools-for-protecting-business-operations_instructions.html |
667.2 KB |
/.../02_core-cybersecurity-knowledge-and-skills/ |
|
|
5.3 KB |
|
2.8 KB |
|
15.2 MB |
02_use-tools-to-protect-business-operations_instructions.html |
6.7 KB |
|
8.9 KB |
/.../03_review-cybersecurity-tools-and-programming-languages/ |
|
|
1.0 KB |
|
0.6 KB |
|
2.2 MB |
|
2.9 KB |
/.../04_congratulations-on-completing-course-1/ |
|
|
3.0 KB |
|
1.7 KB |
|
8.1 MB |
|
879.5 KB |
|
6.6 KB |
|
815.3 KB |
/.../01_frequently-asked-questions/ |
|
|
19.9 KB |
/.../02_course-1-glossary/ |
|
|
879.3 KB |
|
6.6 KB |
/.../03_course-1-resources-and-citations/ |
|
|
43.5 KB |
|
592.2 KB |
|
1.4 MB |
|
1.6 MB |
|
37.9 KB |
|
3.1 MB |
|
200.6 KB |
|
1.7 MB |
|
799.6 KB |
|
4.4 MB |
|
28.8 KB |
|
76.6 KB |
|
232.9 KB |
/.../04_google-cybersecurity-certificate-glossary/ |
|
|
900.2 KB |
|
6.7 KB |
/.../05_frequently-asked-questions/ |
|
|
16.3 KB |
/.../01_get-started-with-the-course/ |
|
|
4.0 KB |
|
2.1 KB |
|
9.1 MB |
|
1.3 MB |
03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx |
900.4 KB |
|
11.4 KB |
/.../02_the-wonderful-world-of-operating-systems/ |
|
|
1.6 KB |
|
0.9 KB |
|
3.1 MB |
|
3.5 KB |
|
1.9 KB |
|
11.4 MB |
|
4.4 KB |
|
2.9 KB |
|
12.1 MB |
|
6.4 KB |
/.../03_the-operating-system-at-work/ |
|
|
5.9 KB |
|
3.2 KB |
|
11.0 MB |
|
137.1 KB |
|
4.0 KB |
|
2.1 KB |
|
9.9 MB |
/.../04_the-user-interface/ |
|
|
7.1 KB |
|
3.8 KB |
|
14.8 MB |
|
201.8 KB |
|
3.8 KB |
|
2.5 KB |
|
13.0 MB |
/.../05_review-introduction-to-operating-systems/ |
|
|
1.9 KB |
|
1.1 KB |
|
3.3 MB |
|
2.5 KB |
/.../01_all-about-linux/ |
|
|
1.6 KB |
|
0.9 KB |
|
3.4 MB |
|
5.1 KB |
|
3.2 KB |
|
13.2 MB |
|
4.2 KB |
|
2.3 KB |
|
13.2 MB |
|
5.9 KB |
|
3.1 KB |
|
12.4 MB |
|
6.7 KB |
/.../02_linux-distributions/ |
|
|
4.4 KB |
|
2.7 KB |
|
10.8 MB |
|
3.6 KB |
|
2.3 KB |
|
7.5 MB |
|
4.5 KB |
|
111.1 KB |
/.../03_the-shell/ |
|
|
2.7 KB |
|
1.7 KB |
|
6.3 MB |
|
5.0 KB |
|
2.7 KB |
|
9.0 MB |
/.../04_review-the-linux-operating-system/ |
|
|
1.4 KB |
|
0.7 KB |
|
3.0 MB |
|
5.1 KB |
/.../01_navigate-the-linux-file-system/ |
|
|
2.7 KB |
|
1.4 KB |
|
5.4 MB |
|
5.2 KB |
|
2.9 KB |
|
10.7 MB |
|
7.8 KB |
|
4.1 KB |
|
11.8 MB |
|
107.4 KB |
/.../02_manage-file-content-in-bash/ |
|
|
7.7 KB |
|
4.0 KB |
|
11.2 MB |
|
8.9 KB |
|
11.4 KB |
|
6.0 KB |
|
18.7 MB |
|
9.9 KB |
/.../03_authenticate-and-authorize-users/ |
|
|
11.3 KB |
|
5.9 KB |
|
17.5 MB |
|
7.3 KB |
|
3.9 KB |
|
9.9 MB |
|
15.9 KB |
|
9.1 KB |
|
4.8 KB |
|
15.4 MB |
|
11.4 KB |
/.../04_get-help-in-linux/ |
|
|
3.8 KB |
|
2.3 KB |
|
14.2 MB |
|
2.6 KB |
|
1.4 KB |
|
6.3 MB |
|
4.1 KB |
|
2.2 KB |
|
6.9 MB |
|
5.2 KB |
/.../05_review-linux-commands-in-the-bash-shell/ |
|
|
1.4 KB |
|
0.9 KB |
|
3.5 MB |
|
3.3 KB |
/.../01_introduction-to-sql-and-databases/ |
|
|
2.6 KB |
|
1.4 KB |
|
5.5 MB |
|
6.1 KB |
|
3.8 KB |
|
10.9 MB |
|
4.0 KB |
|
2.5 KB |
|
8.9 MB |
|
4.3 KB |
|
3.9 KB |
|
2.1 KB |
|
14.4 MB |
/.../02_sql-queries/ |
|
|
4.8 KB |
|
2.5 KB |
|
9.4 MB |
|
9.0 KB |
|
111.1 KB |
|
6.6 KB |
|
4.1 KB |
|
15.5 MB |
|
8.3 KB |
/.../03_more-sql-filters/ |
|
|
5.3 KB |
|
3.3 KB |
|
11.5 MB |
02_operators-for-filtering-dates-and-numbers_instructions.html |
6.9 KB |
|
8.4 KB |
|
4.5 KB |
|
16.9 MB |
|
6.5 KB |
/.../04_sql-joins/ |
|
|
8.7 KB |
|
4.7 KB |
|
12.9 MB |
|
5.2 KB |
|
2.8 KB |
|
8.4 MB |
|
1.6 MB |
|
5.5 KB |
/.../05_review-databases-and-sql/ |
|
|
2.3 KB |
|
1.2 KB |
|
3.5 MB |
|
3.1 KB |
/.../06_congratulations-on-completing-course-4/ |
|
|
2.4 KB |
|
1.3 KB |
|
3.9 MB |
|
1.2 MB |
|
6.6 KB |
|
803.0 KB |
/.../01_frequently-asked-questions/ |
|
|
19.0 KB |
/.../02_google-cybersecurity-certificate-glossary/ |
|
|
900.4 KB |
|
6.7 KB |
/.../03_resources-for-completing-linux-labs/ |
|
|
111.1 KB |
/.../04_resources-for-completing-sql-labs/ |
|
|
111.1 KB |
/.../05_course-4-glossary/ |
|
|
1.2 MB |
|
6.6 KB |
/.../06_course-4-resources-and-citations/ |
|
|
64.8 KB |
|
13.0 MB |
|
127.2 KB |
|
8.3 KB |
|
157.3 KB |
|
20.2 KB |
|
4.4 KB |
|
66.6 KB |
/.../07_frequently-asked-questions/ |
|
|
16.3 KB |
/.../08_create-a-cybersecurity-portfolio/ |
|
|
9.0 KB |
/.../01_get-started-with-the-course/ |
|
|
2.4 KB |
|
1.5 KB |
|
8.3 MB |
|
1.9 MB |
03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx |
900.4 KB |
|
11.5 KB |
/.../02_more-about-the-cissp-security-domains/ |
|
|
1.7 KB |
|
1.1 KB |
|
4.7 MB |
|
6.3 KB |
|
4.1 KB |
|
20.1 MB |
|
6.9 KB |
|
4.5 KB |
|
19.1 MB |
04_security-domains-cybersecurity-analysts-need-to-know_instructions.html |
200.0 KB |
|
5.9 KB |
|
3.1 KB |
|
20.8 MB |
/.../03_navigate-threats-risks-and-vulnerabilities/ |
|
|
6.0 KB |
|
3.8 KB |
|
17.9 MB |
|
5.3 KB |
|
3.5 KB |
|
18.1 MB |
|
3.1 KB |
|
2.0 KB |
|
10.1 MB |
|
6.6 KB |
|
3.5 KB |
|
17.1 MB |
05_manage-common-threats-risks-and-vulnerabilities_instructions.html |
797.8 KB |
/.../04_review-security-domains/ |
|
|
1.5 KB |
|
0.9 KB |
|
4.1 MB |
|
4.0 KB |
/.../01_more-about-frameworks-and-controls/ |
|
|
1.7 KB |
|
1.0 KB |
|
5.7 MB |
|
3.5 KB |
|
1.9 KB |
|
10.8 MB |
|
5.5 KB |
|
3.0 KB |
|
14.8 MB |
04_the-relationship-between-frameworks-and-controls_instructions.html |
6.7 KB |
04_the-relationship-between-frameworks-and-controls_physical-access-control.pdf |
7.3 MB |
/.../02_the-cia-triad-confidentiality-integrity-and-availability/ |
|
|
4.9 KB |
|
3.2 KB |
|
15.5 MB |
02_use-the-cia-triad-to-protect-organizations_instructions.html |
4.4 KB |
/.../03_nist-frameworks/ |
|
|
7.0 KB |
|
3.7 KB |
|
18.9 MB |
02_explore-the-five-functions-of-the-nist-cybersecurity-framework.en.srt |
6.2 KB |
02_explore-the-five-functions-of-the-nist-cybersecurity-framework.en.txt |
3.3 KB |
02_explore-the-five-functions-of-the-nist-cybersecurity-framework.mp4 |
15.9 MB |
/.../04_owasp-principles-and-security-audits/ |
|
|
6.7 KB |
|
3.6 KB |
|
20.0 MB |
|
5.5 KB |
03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.en.srt |
3.1 KB |
03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.en.txt |
1.9 KB |
03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.mp4 |
10.4 MB |
|
7.1 KB |
|
3.7 KB |
|
17.5 MB |
|
5.4 KB |
|
3.5 KB |
|
17.8 MB |
|
1.3 MB |
|
858.1 KB |
|
9.0 KB |
/.../05_review-security-frameworks-and-controls/ |
|
|
2.9 KB |
|
1.5 KB |
|
7.4 MB |
|
5.1 KB |
/.../01_security-information-and-event-management-siem-dashboards/ |
|
|
1.3 KB |
|
0.8 KB |
|
4.5 MB |
|
4.1 KB |
|
2.2 KB |
|
9.3 MB |
|
4.5 KB |
|
2.4 KB |
|
11.3 MB |
|
5.2 KB |
05_parisa-the-parallels-of-accessibility-and-security.en.srt |
3.9 KB |
05_parisa-the-parallels-of-accessibility-and-security.en.txt |
2.5 KB |
|
17.2 MB |
/.../02_explore-security-information-and-event-management-siem-tools/ |
|
|
4.5 KB |
|
2.9 KB |
|
15.4 MB |
|
5.6 KB |
|
3.2 KB |
|
1.6 KB |
|
10.0 MB |
04_use-siem-tools-to-protect-organizations_instructions.html |
8.8 KB |
/.../03_review-introduction-to-cybersecurity-tools/ |
|
|
1.2 KB |
|
0.8 KB |
|
2.7 MB |
|
2.7 KB |
/.../01_phases-of-incident-response-playbooks/ |
|
|
0.9 KB |
|
0.5 KB |
|
3.1 MB |
|
8.1 KB |
|
4.3 KB |
|
25.5 MB |
|
17.8 KB |
|
205.2 KB |
/.../02_explore-incident-response/ |
|
01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.en.srt |
6.0 KB |
01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.en.txt |
3.3 KB |
01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.mp4 |
20.0 MB |
02_erin-the-importance-of-diversity-of-perspective-on-a-security-team.en.srt |
4.5 KB |
02_erin-the-importance-of-diversity-of-perspective-on-a-security-team.en.txt |
2.8 KB |
02_erin-the-importance-of-diversity-of-perspective-on-a-security-team.mp4 |
20.8 MB |
|
3.2 KB |
/.../03_review-use-playbooks-to-respond-to-incidents/ |
|
|
1.3 KB |
|
0.8 KB |
|
4.6 MB |
|
1.5 KB |
/.../04_congratulations-on-completing-course-2/ |
|
|
2.0 KB |
|
1.3 KB |
|
5.5 MB |
|
879.1 KB |
|
6.6 KB |
|
812.2 KB |
/.../01_frequently-asked-questions/ |
|
|
19.0 KB |
/.../02_google-cybersecurity-certificate-glossary/ |
|
|
900.4 KB |
|
6.7 KB |
/.../03_course-2-glossary/ |
|
|
879.1 KB |
|
6.6 KB |
/.../04_course-2-resources-and-citations/ |
|
01__Audit_and_Accountability_AU_CIO-IT_Security_01-08_Rev_6_12-03-2020docx.pdf |
1.3 MB |
|
64.8 KB |
01__Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response_Playbooks_508C.pdf |
1.1 MB |
|
17.2 KB |
|
739.9 KB |
|
6.1 MB |
|
245.5 KB |
|
17.8 KB |
|
21.8 KB |
|
7.3 MB |
|
33.8 KB |
|
232.9 KB |
/.../05_frequently-asked-questions/ |
|
|
16.3 KB |
/.../06_create-a-cybersecurity-portfolio/ |
|
|
9.0 KB |
/.../01_get-started-with-the-course/ |
|
|
1.8 KB |
|
1.1 KB |
|
3.8 MB |
|
1.3 MB |
03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx |
900.4 KB |
|
11.5 KB |
/.../02_introduction-to-networks/ |
|
|
0.9 KB |
|
0.5 KB |
|
2.4 MB |
|
5.0 KB |
|
2.7 KB |
|
19.8 MB |
|
2.7 KB |
|
1.7 KB |
|
6.5 MB |
|
3.1 KB |
|
1.7 KB |
|
11.9 MB |
|
5.0 KB |
|
2.6 KB |
|
14.1 MB |
|
4.6 KB |
|
2.5 KB |
|
7.4 MB |
07_network-components-devices-and-diagrams_instructions.html |
1.8 MB |
|
3.7 KB |
|
2.4 KB |
|
9.2 MB |
09_cloud-computing-and-software-defined-networks_instructions.html |
710.8 KB |
|
3.6 KB |
/.../03_network-communication/ |
|
|
3.8 KB |
|
2.4 KB |
|
7.6 MB |
|
4.5 KB |
|
2.4 KB |
|
9.4 MB |
|
3.5 KB |
|
1.9 KB |
|
6.8 MB |
|
1.6 MB |
|
310.1 KB |
|
5.0 KB |
/.../04_local-and-wide-network-communication/ |
|
|
4.3 KB |
|
2.3 KB |
|
7.7 MB |
02_components-of-network-layer-communication_instructions.html |
657.6 KB |
03_test-your-knowledge-local-and-wide-network-communication_quiz.html |
3.8 KB |
/.../05_review-network-architecture/ |
|
|
1.1 KB |
|
0.6 KB |
|
1.8 MB |
|
4.6 KB |
|
8.6 KB |
/.../01_introduction-to-network-protocols/ |
|
|
2.0 KB |
|
1.1 KB |
|
4.8 MB |
|
6.2 KB |
|
3.3 KB |
|
11.8 MB |
|
8.9 KB |
|
11.3 KB |
05_test-your-knowledge-recognize-different-network-protocols_quiz.html |
3.5 KB |
|
2.2 KB |
|
1.1 KB |
|
5.4 MB |
07_the-evolution-of-wireless-security-protocols_instructions.html |
163.0 KB |
/.../02_system-identification/ |
|
|
7.6 KB |
|
4.0 KB |
|
17.6 MB |
|
4.4 KB |
|
2.3 KB |
|
8.5 MB |
|
6.2 KB |
|
3.3 KB |
|
12.6 MB |
|
137.1 KB |
|
5.1 KB |
|
3.2 KB |
|
11.8 MB |
|
8.6 KB |
|
4.4 KB |
/.../03_review-network-operations/ |
|
|
1.1 KB |
|
0.7 KB |
|
2.9 MB |
|
5.2 KB |
|
8.7 KB |
/.../01_introduction-to-network-intrusion-tactics/ |
|
|
0.7 KB |
|
0.4 KB |
|
1.4 MB |
|
2.3 KB |
|
1.4 KB |
|
5.8 MB |
|
6.8 KB |
/.../02_secure-networks-against-denial-of-service-dos-attacks/ |
|
|
8.0 KB |
|
4.3 KB |
|
19.5 MB |
|
150.2 KB |
|
1.3 KB |
|
5.2 KB |
05_test-your-knowledge-secure-networks-against-denial-of-service-dos-attacks_quiz.html |
3.9 KB |
/.../03_network-attack-tactics-and-defense/ |
|
|
8.2 KB |
|
4.4 KB |
|
20.3 MB |
|
5.3 KB |
|
2.8 KB |
|
12.1 MB |
|
7.4 KB |
|
1.3 KB |
05_test-your-knowledge-network-interception-attack-tactics_quiz.html |
4.1 KB |
/.../04_review-secure-against-network-intrusion/ |
|
|
1.4 KB |
|
0.7 KB |
|
3.1 MB |
|
3.8 KB |
|
9.5 KB |
/.../01_introduction-to-security-hardening/ |
|
|
1.5 KB |
|
0.9 KB |
|
4.0 MB |
|
4.7 KB |
|
3.0 KB |
|
12.8 MB |
/.../02_os-hardening/ |
|
|
7.7 KB |
|
4.1 KB |
|
18.9 MB |
|
8.3 KB |
|
1.3 KB |
|
3.8 KB |
/.../03_network-hardening/ |
|
|
6.3 KB |
|
3.4 KB |
|
17.7 MB |
|
3.0 MB |
|
1.3 KB |
|
3.9 KB |
/.../04_cloud-hardening/ |
|
|
2.9 KB |
|
1.9 KB |
|
10.2 MB |
|
3.9 KB |
|
2.4 KB |
|
23.0 MB |
|
9.2 KB |
|
3.7 KB |
/.../05_review-security-hardening/ |
|
|
1.6 KB |
|
0.9 KB |
|
3.3 MB |
|
2.9 KB |
|
9.7 KB |
04_portfolio-activity-use-the-nist-cybersecurity-framework-to-respond-to-a-security_exam.html |
3.5 KB |
/.../06_congratulations-on-completing-course-3/ |
|
|
3.0 KB |
|
1.9 KB |
|
7.0 MB |
|
878.1 KB |
|
6.6 KB |
|
805.3 KB |
/.../01_frequently-asked-questions/ |
|
|
19.0 KB |
/.../02_google-cybersecurity-certificate-glossary/ |
|
|
900.4 KB |
|
6.7 KB |
/.../03_course-3-glossary/ |
|
|
878.1 KB |
|
6.6 KB |
/.../04_course-3-resources-and-citations/ |
|
|
11.9 KB |
|
7.7 KB |
|
34.8 KB |
|
64.3 KB |
|
23.5 KB |
|
18.0 KB |
|
1.9 MB |
|
62.8 KB |
/.../05_frequently-asked-questions/ |
|
|
16.3 KB |
/.../06_create-a-cybersecurity-portfolio/ |
|
|
9.0 KB |
/.../01_get-started-with-the-course/ |
|
|
3.9 KB |
|
2.5 KB |
|
13.8 MB |
|
1.4 MB |
|
3.8 KB |
|
2.3 KB |
|
17.7 MB |
04_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx |
900.4 KB |
|
11.5 KB |
/.../02_event-and-incident-detection/ |
|
|
1.0 KB |
|
0.5 KB |
|
1.9 MB |
|
5.2 KB |
|
2.8 KB |
|
17.8 MB |
|
5.9 KB |
/.../03_your-impact-on-data-protection/ |
|
|
5.9 KB |
|
3.2 KB |
|
19.5 MB |
02_disaster-recovery-and-business-continuity_instructions.html |
5.6 KB |
|
5.1 KB |
/.../04_review-protect-assets-and-communicate-incidents/ |
|
|
1.6 KB |
|
1.0 KB |
|
4.3 MB |
|
2.4 KB |
/.../01_escalation-in-cybersecurity/ |
|
|
2.4 KB |
|
1.2 KB |
|
6.4 MB |
|
6.8 KB |
|
3.6 KB |
|
19.9 MB |
|
5.0 KB |
/.../02_to-escalate-or-not-to-escalate/ |
|
|
5.7 KB |
|
3.0 KB |
|
18.1 MB |
02_recognize-roles-and-responsibilities-during-escalation_instructions.html |
4.4 KB |
/.../03_timing-is-everything/ |
|
|
5.6 KB |
|
3.0 KB |
|
19.2 MB |
|
3.5 KB |
|
2.2 KB |
|
13.5 MB |
|
5.7 KB |
|
4.9 KB |
/.../04_review-escalate-incidents/ |
|
|
1.6 KB |
|
1.0 KB |
|
4.7 MB |
|
2.5 KB |
/.../01_understand-your-stakeholders/ |
|
|
1.2 KB |
|
0.7 KB |
|
3.9 MB |
|
6.9 KB |
|
3.7 KB |
|
15.9 MB |
|
5.8 KB |
/.../02_communicate-for-impact/ |
|
|
3.7 KB |
|
2.0 KB |
|
12.7 MB |
|
6.0 KB |
|
3.1 KB |
|
17.8 MB |
03_communicate-effectively-with-stakeholders_instructions.html |
5.2 KB |
/.../03_visual-communication-using-a-dashboard/ |
|
|
3.9 KB |
|
2.4 KB |
|
16.9 MB |
02_create-visual-dashboards-for-impactful-cybersecurity-communications_instructions.html |
5.1 KB |
|
5.4 KB |
|
3.2 KB |
|
19.0 MB |
|
4.6 KB |
/.../04_review-communicate-effectively-to-influence-stakeholders/ |
|
|
3.0 KB |
|
1.5 KB |
|
9.5 MB |
|
1.3 KB |
/.../01_reliable-sources-go-a-long-way/ |
|
|
2.2 KB |
|
1.4 KB |
|
7.2 MB |
|
4.3 KB |
|
2.2 KB |
|
16.0 MB |
03_strategies-for-engaging-with-the-cybersecurity-community_instructions.html |
5.6 KB |
|
4.0 KB |
|
2.5 KB |
|
16.2 MB |
/.../02_build-your-cybersecurity-network/ |
|
01_engage-with-the-cybersecurity-community-in-a-meaningful-way.en.srt |
4.8 KB |
01_engage-with-the-cybersecurity-community-in-a-meaningful-way.en.txt |
3.2 KB |
01_engage-with-the-cybersecurity-community-in-a-meaningful-way.mp4 |
15.4 MB |
02_connect-with-other-cybersecurity-professionals_instructions.html |
4.3 KB |
|
3.6 KB |
|
2.3 KB |
|
10.8 MB |
/.../03_review-engage-with-the-cybersecurity-community/ |
|
|
1.4 KB |
|
0.9 KB |
|
4.0 MB |
|
1.2 KB |
/.../01_find-and-prepare-for-a-job-in-cybersecurity/ |
|
|
2.7 KB |
|
1.5 KB |
|
7.9 MB |
|
5.7 KB |
|
3.0 KB |
|
17.1 MB |
|
6.3 KB |
|
4.0 KB |
|
12.5 MB |
04_tips-for-finding-and-applying-for-a-job_instructions.html |
4.3 KB |
|
5.1 KB |
|
3.1 KB |
|
12.2 MB |
/.../02_the-cybersecurity-job-interview-process/ |
|
|
6.5 KB |
|
3.5 KB |
|
14.7 MB |
|
5.4 KB |
|
4.8 KB |
|
3.0 KB |
|
11.8 MB |
|
5.8 KB |
|
5.2 KB |
|
2.8 KB |
|
13.2 MB |
|
6.1 KB |
|
3.3 KB |
|
14.3 MB |
/.../03_answer-interview-questions/ |
|
|
4.4 KB |
|
2.8 KB |
|
12.6 MB |
02_apply-the-star-method-during-interviews_instructions.html |
52.2 KB |
|
5.6 KB |
|
46.6 KB |
|
2.5 KB |
|
1.7 KB |
|
8.3 MB |
|
5.0 KB |
|
2.7 KB |
|
19.4 MB |
06_prepare-for-interviews-with-interview-warmup_instructions.html |
187.5 KB |
/.../04_develop-an-elevator-pitch/ |
|
|
4.6 KB |
|
2.9 KB |
|
13.6 MB |
02_learn-more-about-developing-an-elevator-pitch_instructions.html |
5.1 KB |
|
5.7 KB |
|
4.8 KB |
|
2.6 KB |
|
14.6 MB |
/.../05_review-find-and-apply-for-cybersecurity-jobs/ |
|
|
1.1 KB |
|
0.6 KB |
|
2.1 MB |
|
1.4 KB |
|
1.8 KB |
|
1.2 KB |
|
2.9 MB |
|
1.2 MB |
|
6.6 KB |
/.../06_certificate-wrap-up/ |
|
01_recap-of-the-google-cybersecurity-certificate-program.en.srt |
4.0 KB |
01_recap-of-the-google-cybersecurity-certificate-program.en.txt |
2.2 KB |
01_recap-of-the-google-cybersecurity-certificate-program.mp4 |
9.3 MB |
02_congratulations-on-completing-the-google-cybersecurity-certificate-program.en.srt |
2.9 KB |
02_congratulations-on-completing-the-google-cybersecurity-certificate-program.en.txt |
1.4 KB |
02_congratulations-on-completing-the-google-cybersecurity-certificate-program.mp4 |
9.9 MB |
|
920.8 KB |
|
651.7 KB |
04_claim-your-google-cybersecurity-certificate-badge_instructions.html |
4.6 KB |
05_google-cybersecurity-certificate-glossary_Google_Cybersecurity_Certificate_glossary.docx |
900.4 KB |
05_google-cybersecurity-certificate-glossary_instructions.html |
6.7 KB |
/.../01_frequently-asked-questions/ |
|
|
19.0 KB |
/.../02_course-8-glossary/ |
|
|
1.2 MB |
|
6.6 KB |
/.../03_course-8-resources-and-citations/ |
|
|
225.9 KB |
|
1.5 MB |
|
651.7 KB |
|
11.8 KB |
|
46.6 KB |
/.../04_google-cybersecurity-certificate-glossary/ |
|
|
900.4 KB |
|
6.7 KB |
/.../05_frequently-asked-questions/ |
|
|
16.3 KB |
/.../06_create-a-cybersecurity-portfolio/ |
|
|
9.0 KB |
Total files 1330 |
Copyright © 2024 FileMood.com