Torrent details for "Coursera Google Cybersecurity Professional Certificate" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
3.8 GB
Info Hash:
FEFA0EA64A939F45215B17E226DBA7EBB2C1B171
Added By:
Added:
Oct. 22, 2023, 5:30 a.m.
Stats:
|
(Last updated: Jan. 8, 2026, 11:13 a.m.)
| File | Size |
|---|---|
| [CourserHub.com].url | 123 bytes |
| Readme.txt | 51 bytes |
| 01_introduction-to-course-5.en.srt | 4.4 KB |
| 01_introduction-to-course-5.en.txt | 2.8 KB |
| 01_introduction-to-course-5.mp4 | 16.1 MB |
| 02_course-5-overview_instructions.html | 1.3 MB |
| 03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx | 879.3 KB |
| 03_helpful-resources-and-tips_instructions.html | 11.3 KB |
| 04_da-queshia-my-path-to-cybersecurity.en.srt | 4.4 KB |
| 04_da-queshia-my-path-to-cybersecurity.en.txt | 2.3 KB |
| 04_da-queshia-my-path-to-cybersecurity.mp4 | 13.9 MB |
| 01_welcome-to-week-1.en.srt | 3.3 KB |
| 01_welcome-to-week-1.en.txt | 2.1 KB |
| 01_welcome-to-week-1.mp4 | 10.2 MB |
| 02_the-what-why-and-how-of-asset-security.en.srt | 6.9 KB |
| 02_the-what-why-and-how-of-asset-security.en.txt | 4.3 KB |
| 02_the-what-why-and-how-of-asset-security.mp4 | 20.8 MB |
| 03_understand-risks-threats-and-vulnerabilities_instructions.html | 6.4 KB |
| 04_tri-life-in-asset-security.en.srt | 3.8 KB |
| 04_tri-life-in-asset-security.en.txt | 2.3 KB |
| 04_tri-life-in-asset-security.mp4 | 17.0 MB |
| 05_security-starts-with-asset-classification.en.srt | 6.6 KB |
| 05_security-starts-with-asset-classification.en.txt | 3.6 KB |
| 05_security-starts-with-asset-classification.mp4 | 16.9 MB |
| 06_common-classification-requirements_instructions.html | 106.3 KB |
| 01_assets-in-a-digital-world.en.srt | 6.6 KB |
| 01_assets-in-a-digital-world.en.txt | 3.5 KB |
| 01_assets-in-a-digital-world.mp4 | 18.0 MB |
| 02_the-emergence-of-cloud-security_instructions.html | 141.3 KB |
| 01_elements-of-a-security-plan.en.srt | 6.2 KB |
| 01_elements-of-a-security-plan.en.txt | 4.0 KB |
| 01_elements-of-a-security-plan.mp4 | 20.2 MB |
| 02_the-nist-cybersecurity-framework.en.srt | 5.8 KB |
| 02_the-nist-cybersecurity-framework.en.txt | 3.6 KB |
| 02_the-nist-cybersecurity-framework.mp4 | 20.3 MB |
| 03_security-guidelines-in-action_Commercial_Facilities_Sector_Cybersecurity_Framework_Implementation_Guidance_FINAL_508.pdf | 1.5 MB |
| 03_security-guidelines-in-action_instructions.html | 472.5 KB |
| 01_wrap-up.en.srt | 3.0 KB |
| 01_wrap-up.en.txt | 1.6 KB |
| 01_wrap-up.mp4 | 6.8 MB |
| 02_glossary-terms-from-week-1_instructions.html | 3.4 KB |
| 01_welcome-to-week-2.en.srt | 3.1 KB |
| 01_welcome-to-week-2.en.txt | 1.7 KB |
| 01_welcome-to-week-2.mp4 | 9.8 MB |
| 02_security-controls.en.srt | 5.2 KB |
| 02_security-controls.en.txt | 3.3 KB |
| 02_security-controls.mp4 | 19.6 MB |
| 03_principle-of-least-privilege_instructions.html | 7.7 KB |
| 04_information-privacy-regulations-and-compliance_instructions.html | 129.2 KB |
| 05_heather-the-importance-of-protecting-pii.en.srt | 3.3 KB |
| 05_heather-the-importance-of-protecting-pii.en.txt | 1.8 KB |
| 05_heather-the-importance-of-protecting-pii.mp4 | 14.5 MB |
| 01_fundamentals-of-cryptography.en.srt | 5.9 KB |
| 01_fundamentals-of-cryptography.en.txt | 3.8 KB |
| 01_fundamentals-of-cryptography.mp4 | 22.6 MB |
| 02_public-key-infrastructure.en.srt | 8.7 KB |
| 02_public-key-infrastructure.en.txt | 4.5 KB |
| 02_public-key-infrastructure.mp4 | 21.2 MB |
| 03_symmetric-and-asymmetric-encryption_instructions.html | 9.2 KB |
| 04_resources-for-completing-labs_instructions.html | 108.5 KB |
| 05_non-repudiation-and-hashing.en.srt | 5.0 KB |
| 05_non-repudiation-and-hashing.en.txt | 3.1 KB |
| 05_non-repudiation-and-hashing.mp4 | 13.5 MB |
| 06_the-evolution-of-hash-functions_instructions.html | 585.4 KB |
| 01_access-controls-and-authentication-systems.en.srt | 6.2 KB |
| 01_access-controls-and-authentication-systems.en.txt | 3.9 KB |
| 01_access-controls-and-authentication-systems.mp4 | 18.3 MB |
| 02_the-rise-of-sso-and-mfa_instructions.html | 369.5 KB |
| 03_the-mechanisms-of-authorization.en.srt | 8.1 KB |
| 03_the-mechanisms-of-authorization.en.txt | 4.3 KB |
| 03_the-mechanisms-of-authorization.mp4 | 25.2 MB |
| 04_why-we-audit-user-activity.en.srt | 5.5 KB |
| 04_why-we-audit-user-activity.en.txt | 2.9 KB |
| 04_why-we-audit-user-activity.mp4 | 16.2 MB |
| 05_tim-finding-purpose-in-protecting-assets.en.srt | 2.0 KB |
| 05_tim-finding-purpose-in-protecting-assets.en.txt | 1.2 KB |
| 05_tim-finding-purpose-in-protecting-assets.mp4 | 7.0 MB |
| 06_identity-and-access-management_instructions.html | 302.9 KB |
| 01_wrap-up.en.srt | 2.4 KB |
| 01_wrap-up.en.txt | 1.5 KB |
| 01_wrap-up.mp4 | 8.2 MB |
| 02_glossary-terms-from-week-2_instructions.html | 7.1 KB |
| 01_welcome-to-week-3.en.srt | 2.8 KB |
| 01_welcome-to-week-3.en.txt | 1.7 KB |
| 01_welcome-to-week-3.mp4 | 9.2 MB |
| 02_vulnerability-management.en.srt | 6.0 KB |
| 02_vulnerability-management.en.txt | 3.8 KB |
| 02_vulnerability-management.mp4 | 22.0 MB |
| 03_defense-in-depth-strategy.en.srt | 6.2 KB |
| 03_defense-in-depth-strategy.en.txt | 3.3 KB |
| 03_defense-in-depth-strategy.mp4 | 19.9 MB |
| 04_common-vulnerabilities-and-exposures.en.srt | 8.1 KB |
| 04_common-vulnerabilities-and-exposures.en.txt | 4.3 KB |
| 04_common-vulnerabilities-and-exposures.mp4 | 27.9 MB |
| 05_the-owasp-top-10_instructions.html | 141.9 KB |
| 01_vulnerability-assessments.en.srt | 5.9 KB |
| 01_vulnerability-assessments.en.txt | 3.1 KB |
| 01_vulnerability-assessments.mp4 | 19.5 MB |
| 02_approaches-to-vulnerability-scanning_instructions.html | 7.4 KB |
| 03_the-importance-of-updates_instructions.html | 7.2 KB |
| 04_omad-my-learning-journey-into-cybersecurity.en.srt | 4.4 KB |
| 04_omad-my-learning-journey-into-cybersecurity.en.txt | 2.8 KB |
| 04_omad-my-learning-journey-into-cybersecurity.mp4 | 9.9 MB |
| 01_protect-all-entry-points.en.srt | 5.7 KB |
| 01_protect-all-entry-points.en.txt | 3.6 KB |
| 01_protect-all-entry-points.mp4 | 22.5 MB |
| 02_approach-cybersecurity-with-an-attacker-mindset_instructions.html | 206.0 KB |
| 03_types-of-threat-actors_instructions.html | 493.4 KB |
| 04_niru-adopt-an-attacker-mindset.en.srt | 4.6 KB |
| 04_niru-adopt-an-attacker-mindset.en.txt | 2.9 KB |
| 04_niru-adopt-an-attacker-mindset.mp4 | 18.1 MB |
| 05_pathways-through-defenses.en.srt | 7.4 KB |
| 05_pathways-through-defenses.en.txt | 3.9 KB |
| 05_pathways-through-defenses.mp4 | 22.4 MB |
| 06_fortify-against-brute-force-cyber-attacks_NIST.SP.800-63b.pdf | 1.2 MB |
| 06_fortify-against-brute-force-cyber-attacks_instructions.html | 153.1 KB |
| 01_wrap-up.en.srt | 3.6 KB |
| 01_wrap-up.en.txt | 1.9 KB |
| 01_wrap-up.mp4 | 11.8 MB |
| 02_glossary-terms-from-week-3_instructions.html | 3.6 KB |
| 01_welcome-to-week-4.en.srt | 3.0 KB |
| 01_welcome-to-week-4.en.txt | 1.6 KB |
| 01_welcome-to-week-4.mp4 | 8.6 MB |
| 02_the-criminal-art-of-persuasion.en.srt | 7.4 KB |
| 02_the-criminal-art-of-persuasion.en.txt | 4.0 KB |
| 02_the-criminal-art-of-persuasion.mp4 | 21.7 MB |
| 03_social-engineering-tactics_instructions.html | 175.3 KB |
| 04_phishing-for-information.en.srt | 6.8 KB |
| 04_phishing-for-information.en.txt | 4.3 KB |
| 04_phishing-for-information.mp4 | 24.0 MB |
| 05_types-of-phishing_instructions.html | 339.4 KB |
| 01_malicious-software.en.srt | 7.6 KB |
| 01_malicious-software.en.txt | 4.1 KB |
| 01_malicious-software.mp4 | 24.5 MB |
| 02_an-introduction-to-malware_instructions.html | 163.9 KB |
| 03_the-rise-of-cryptojacking.en.srt | 6.6 KB |
| 03_the-rise-of-cryptojacking.en.txt | 3.6 KB |
| 03_the-rise-of-cryptojacking.mp4 | 23.7 MB |
| 01_cross-site-scripting.en.srt | 7.3 KB |
| 01_cross-site-scripting.en.txt | 4.5 KB |
| 01_cross-site-scripting.mp4 | 21.5 MB |
| 02_exploitable-gaps-in-databases.en.srt | 5.1 KB |
| 02_exploitable-gaps-in-databases.en.txt | 3.2 KB |
| 02_exploitable-gaps-in-databases.mp4 | 17.4 MB |
| 01_a-proactive-approach-to-security.en.srt | 4.9 KB |
| 01_a-proactive-approach-to-security.en.txt | 3.1 KB |
| 01_a-proactive-approach-to-security.mp4 | 17.1 MB |
| 02_chantelle-the-value-of-diversity-in-cybersecurity.en.srt | 3.7 KB |
| 02_chantelle-the-value-of-diversity-in-cybersecurity.en.txt | 2.0 KB |
| 02_chantelle-the-value-of-diversity-in-cybersecurity.mp4 | 14.1 MB |
| 03_pasta-the-process-for-attack-simulation-and-threat-analysis.en.srt | 6.1 KB |
| 03_pasta-the-process-for-attack-simulation-and-threat-analysis.en.txt | 3.8 KB |
| 03_pasta-the-process-for-attack-simulation-and-threat-analysis.mp4 | 17.8 MB |
| 04_traits-of-an-effective-threat-model_instructions.html | 120.9 KB |
| 01_wrap-up.en.srt | 2.8 KB |
| 01_wrap-up.en.txt | 1.5 KB |
| 01_wrap-up.mp4 | 8.1 MB |
| 02_glossary-terms-from-week-4_instructions.html | 7.9 KB |
| 01_course-wrap-up.en.srt | 4.4 KB |
| 01_course-wrap-up.en.txt | 2.7 KB |
| 01_course-wrap-up.mp4 | 17.7 MB |
| 02_course-5-glossary_Course_5_glossary.docx | 862.4 KB |
| 02_course-5-glossary_instructions.html | 6.5 KB |
| 03_get-started-on-the-next-course_instructions.html | 794.7 KB |
| 01__resources.html | 18.6 KB |
| 01__Google_Cybersecurity_Certificate_glossary.docx | 879.3 KB |
| 01__resources.html | 6.5 KB |
| 01__resources.html | 108.5 KB |
| 01__16-software-updates.html | 25.5 KB |
| 01__2-4-3.html | 8.6 KB |
| 01__5-signs-youve-been-hit-with-an-apt.html | 172.5 KB |
| 01__5.2 | 5.4 KB |
| 01__7.5 | 8.2 KB |
| 01__FULL_TEXT.pdf | 1.4 MB |
| 01__NIST.FIPS.140-3.pdf | 303.3 KB |
| 01__Trend_Report_-_Why_Businesses_are_Moving_to_the_Cloud.pdf | 1.2 MB |
| 01__csos-guide-to-phishing-and-phishing-kits.html | 155.8 KB |
| 01__encryption-explained.html | 45.2 KB |
| 01__gdpr-tldr-what-security-pros-need-to-know-about-the-new-era-of-privacy-regulations.html | 155.4 KB |
| 01__hashing-explained-why-its-your-best-bet-to-protect-stored-passwords.html | 159.5 KB |
| 01__hipaa.html | 195.9 KB |
| 01__malware.html | 211.7 KB |
| 01__paper.pdf | 196.7 KB |
| 01__resources.html | 60.2 KB |
| 01__sql_injection.asp | 110.1 KB |
| 01__ssrf-attacks-explained-and-how-to-defend-against-them.html | 155.6 KB |
| 01__vulnerability-vs-threat-vs-risk.html | 76.7 KB |
| 01__what-is-cve-its-definition-and-purpose.html | 169.2 KB |
| 01__what-is-owasp-top-10.html | 247.5 KB |
| 01__what-is-phishing-examples-types-and-techniques.html | 161.5 KB |
| 01__Course_5_glossary.docx | 862.4 KB |
| 01__resources.html | 6.5 KB |
| 01__resources.html | 16.0 KB |
| 01__resources.html | 8.8 KB |
| 01_introduction-to-course-7.en.srt | 4.8 KB |
| 01_introduction-to-course-7.en.txt | 3.0 KB |
| 01_introduction-to-course-7.mp4 | 18.0 MB |
| 02_course-7-overview_instructions.html | 1.2 MB |
| 03_angel-my-personal-career-journey.en.srt | 4.8 KB |
| 03_angel-my-personal-career-journey.en.txt | 2.6 KB |
| 03_angel-my-personal-career-journey.mp4 | 16.5 MB |
| 04_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx | 879.3 KB |
| 04_helpful-resources-and-tips_instructions.html | 11.3 KB |
| 01_welcome-to-week-1.en.srt | 2.9 KB |
| 01_welcome-to-week-1.en.txt | 1.5 KB |
| 01_welcome-to-week-1.mp4 | 7.8 MB |
| 02_python-and-cybersecurity.en.srt | 5.2 KB |
| 02_python-and-cybersecurity.en.txt | 3.3 KB |
| 02_python-and-cybersecurity.mp4 | 20.1 MB |
| 03_get-to-know-python_instructions.html | 4.3 KB |
| 04_create-a-basic-python-script.en.srt | 3.7 KB |
| 04_create-a-basic-python-script.en.txt | 2.0 KB |
| 04_create-a-basic-python-script.mp4 | 8.4 MB |
| 05_python-environments_instructions.html | 4.2 KB |
| 06_akash-python-and-the-cybersecurity-professional.en.srt | 2.0 KB |
| 06_akash-python-and-the-cybersecurity-professional.en.txt | 1.3 KB |
| 06_akash-python-and-the-cybersecurity-professional.mp4 | 5.7 MB |
| 01_data-types-in-python.en.srt | 7.6 KB |
| 01_data-types-in-python.en.txt | 3.9 KB |
| 01_data-types-in-python.mp4 | 19.4 MB |
| 02_more-about-data-types_instructions.html | 12.2 KB |
| 03_work-with-variables-in-python.en.srt | 10.0 KB |
| 03_work-with-variables-in-python.en.txt | 5.2 KB |
| 03_work-with-variables-in-python.mp4 | 21.7 MB |
| 04_assign-and-reassign-variables-in-python_instructions.html | 8.2 KB |
| 01_conditional-statements-in-python.en.srt | 9.7 KB |
| 01_conditional-statements-in-python.en.txt | 6.2 KB |
| 01_conditional-statements-in-python.mp4 | 17.7 MB |
| 02_more-on-conditionals-in-python_instructions.html | 15.1 KB |
| 03_for-loops.en.srt | 7.6 KB |
| 03_for-loops.en.txt | 4.0 KB |
| 03_for-loops.mp4 | 12.2 MB |
| 04_while-loops.en.srt | 8.1 KB |
| 04_while-loops.en.txt | 4.3 KB |
| 04_while-loops.mp4 | 10.2 MB |
| 05_more-on-loops-in-python_instructions.html | 15.6 KB |
| 01_wrap-up.en.srt | 1.6 KB |
| 01_wrap-up.en.txt | 949 bytes |
| 01_wrap-up.mp4 | 3.4 MB |
| 02_glossary-terms-from-week-1_instructions.html | 4.0 KB |
| 01_welcome-to-week-2.en.srt | 2.2 KB |
| 01_welcome-to-week-2.en.txt | 1.2 KB |
| 01_welcome-to-week-2.mp4 | 5.0 MB |
| 02_introduction-to-functions.en.srt | 4.0 KB |
| 02_introduction-to-functions.en.txt | 2.1 KB |
| 02_introduction-to-functions.mp4 | 13.8 MB |
| 03_create-a-basic-function.en.srt | 3.7 KB |
| 03_create-a-basic-function.en.txt | 1.9 KB |
| 03_create-a-basic-function.mp4 | 7.1 MB |
| 04_python-functions-in-cybersecurity_instructions.html | 6.8 KB |
| 01_use-parameters-in-functions.en.srt | 5.4 KB |
| 01_use-parameters-in-functions.en.txt | 3.3 KB |
| 01_use-parameters-in-functions.mp4 | 10.6 MB |
| 02_return-statements.en.srt | 4.8 KB |
| 02_return-statements.en.txt | 3.0 KB |
| 02_return-statements.mp4 | 13.7 MB |
| 03_functions-and-variables_instructions.html | 10.8 KB |
| 04_explore-built-in-functions.en.srt | 8.5 KB |
| 04_explore-built-in-functions.en.txt | 4.5 KB |
| 04_explore-built-in-functions.mp4 | 21.0 MB |
| 05_work-with-built-in-functions_functions.html | 269.1 KB |
| 05_work-with-built-in-functions_instructions.html | 7.4 KB |
| 01_modules-and-libraries.en.srt | 3.3 KB |
| 01_modules-and-libraries.en.txt | 2.0 KB |
| 01_modules-and-libraries.mp4 | 11.3 MB |
| 02_code-readability.en.srt | 6.1 KB |
| 02_code-readability.en.txt | 3.9 KB |
| 02_code-readability.mp4 | 19.0 MB |
| 03_ensure-proper-syntax-and-readability-in-python_instructions.html | 9.6 KB |
| 04_dorsa-use-python-efficiently-on-a-cybersecurity-team.en.srt | 4.3 KB |
| 04_dorsa-use-python-efficiently-on-a-cybersecurity-team.en.txt | 2.3 KB |
| 04_dorsa-use-python-efficiently-on-a-cybersecurity-team.mp4 | 11.4 MB |
| 01_wrap-up.en.srt | 1.8 KB |
| 01_wrap-up.en.txt | 952 bytes |
| 01_wrap-up.mp4 | 3.7 MB |
| 02_glossary-terms-from-week-2_instructions.html | 3.0 KB |
| 01_welcome-to-week-3.en.srt | 1.9 KB |
| 01_welcome-to-week-3.en.txt | 1.0 KB |
| 01_welcome-to-week-3.mp4 | 4.9 MB |
| 02_string-operations.en.srt | 7.8 KB |
| 02_string-operations.en.txt | 4.1 KB |
| 02_string-operations.mp4 | 21.3 MB |
| 03_string-indices-and-slices.en.srt | 8.5 KB |
| 03_string-indices-and-slices.en.txt | 4.5 KB |
| 03_string-indices-and-slices.mp4 | 20.3 MB |
| 04_strings-and-the-security-analyst_instructions.html | 13.5 KB |
| 01_list-operations-in-python.en.srt | 8.3 KB |
| 01_list-operations-in-python.en.txt | 5.1 KB |
| 01_list-operations-in-python.mp4 | 19.3 MB |
| 02_write-a-simple-algorithm.en.srt | 8.4 KB |
| 02_write-a-simple-algorithm.en.txt | 4.3 KB |
| 02_write-a-simple-algorithm.mp4 | 17.6 MB |
| 03_lists-and-the-security-analyst_instructions.html | 13.1 KB |
| 01_regular-expressions-in-python.en.srt | 10.4 KB |
| 01_regular-expressions-in-python.en.txt | 6.4 KB |
| 01_regular-expressions-in-python.mp4 | 21.9 MB |
| 02_more-about-regular-expressions_instructions.html | 11.4 KB |
| 01_wrap-up.en.srt | 1.8 KB |
| 01_wrap-up.en.txt | 992 bytes |
| 01_wrap-up.mp4 | 3.7 MB |
| 02_glossary-terms-from-week-3_instructions.html | 2.6 KB |
| 01_welcome-to-week-4.en.srt | 1.9 KB |
| 01_welcome-to-week-4.en.txt | 1.0 KB |
| 01_welcome-to-week-4.mp4 | 5.1 MB |
| 02_automate-cybersecurity-tasks-with-python.en.srt | 5.7 KB |
| 02_automate-cybersecurity-tasks-with-python.en.txt | 3.0 KB |
| 02_automate-cybersecurity-tasks-with-python.mp4 | 19.1 MB |
| 03_essential-python-components-for-automation_instructions.html | 8.2 KB |
| 04_clancy-continual-learning-and-python.en.srt | 3.6 KB |
| 04_clancy-continual-learning-and-python.en.txt | 1.9 KB |
| 04_clancy-continual-learning-and-python.mp4 | 11.3 MB |
| 01_access-a-text-file-in-python.en.srt | 4.0 KB |
| 01_access-a-text-file-in-python.en.txt | 2.5 KB |
| 01_access-a-text-file-in-python.mp4 | 10.5 MB |
| 02_import-files-into-python_instructions.html | 107.3 KB |
| 03_parse-a-text-file-in-python.en.srt | 3.5 KB |
| 03_parse-a-text-file-in-python.en.txt | 1.9 KB |
| 03_parse-a-text-file-in-python.mp4 | 10.0 MB |
| 04_develop-a-parsing-algorithm-in-python.en.srt | 6.9 KB |
| 04_develop-a-parsing-algorithm-in-python.en.txt | 4.3 KB |
| 04_develop-a-parsing-algorithm-in-python.mp4 | 15.2 MB |
| 01_debugging-strategies.en.srt | 8.5 KB |
| 01_debugging-strategies.en.txt | 4.4 KB |
| 01_debugging-strategies.mp4 | 23.1 MB |
| 02_apply-debugging-strategies.en.srt | 7.9 KB |
| 02_apply-debugging-strategies.en.txt | 4.2 KB |
| 02_apply-debugging-strategies.mp4 | 13.6 MB |
| 03_explore-debugging-techniques_instructions.html | 13.0 KB |
| 01_wrap-up.en.srt | 1.5 KB |
| 01_wrap-up.en.txt | 806 bytes |
| 01_wrap-up.mp4 | 2.9 MB |
| 02_glossary-terms-from-week-4_instructions.html | 2.9 KB |
| 01_course-wrap-up.en.srt | 3.5 KB |
| 01_course-wrap-up.en.txt | 1.9 KB |
| 01_course-wrap-up.mp4 | 11.8 MB |
| 02_course-7-glossary_Course_7_glossary.docx | 869.9 KB |
| 02_course-7-glossary_instructions.html | 6.5 KB |
| 03_get-started-on-the-next-course_instructions.html | 806.1 KB |
| 01__resources.html | 18.7 KB |
| 01__Google_Cybersecurity_Certificate_glossary.docx | 879.3 KB |
| 01__resources.html | 6.5 KB |
| 01__Course_7_glossary.docx | 869.9 KB |
| 01__resources.html | 6.5 KB |
| 01__functions.html | 269.1 KB |
| 01__resources.html | 7.0 KB |
| 01__resources.html | 16.0 KB |
| 01__resources.html | 8.8 KB |
| [CourserHub.com].url | 123 bytes |
| 01_introduction-to-course-6.en.srt | 4.1 KB |
| 01_introduction-to-course-6.en.txt | 2.2 KB |
| 01_introduction-to-course-6.mp4 | 7.2 MB |
| 02_course-6-overview_instructions.html | 1.3 MB |
| 03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx | 879.3 KB |
| 03_helpful-resources-and-tips_instructions.html | 11.3 KB |
| 04_dave-grow-your-cybersecurity-career-with-mentors.en.srt | 4.3 KB |
| 04_dave-grow-your-cybersecurity-career-with-mentors.en.txt | 2.3 KB |
| 04_dave-grow-your-cybersecurity-career-with-mentors.mp4 | 13.9 MB |
| 01_welcome-to-week-1.en.srt | 2.5 KB |
| 01_welcome-to-week-1.en.txt | 1.6 KB |
| 01_welcome-to-week-1.mp4 | 5.8 MB |
| 02_introduction-to-the-incident-response-lifecycle.en.srt | 6.4 KB |
| 02_introduction-to-the-incident-response-lifecycle.en.txt | 4.0 KB |
| 02_introduction-to-the-incident-response-lifecycle.mp4 | 16.0 MB |
| 01_incident-response-teams.en.srt | 4.6 KB |
| 01_incident-response-teams.en.txt | 2.9 KB |
| 01_incident-response-teams.mp4 | 12.4 MB |
| 02_fatima-the-importance-of-communication-during-incident-response.en.srt | 4.6 KB |
| 02_fatima-the-importance-of-communication-during-incident-response.en.txt | 2.4 KB |
| 02_fatima-the-importance-of-communication-during-incident-response.mp4 | 15.2 MB |
| 03_roles-in-response_instructions.html | 84.3 KB |
| 04_incident-response-plans.en.srt | 3.6 KB |
| 04_incident-response-plans.en.txt | 2.3 KB |
| 04_incident-response-plans.mp4 | 9.3 MB |
| 01_incident-response-tools.en.srt | 2.8 KB |
| 01_incident-response-tools.en.txt | 1.5 KB |
| 01_incident-response-tools.mp4 | 5.4 MB |
| 02_the-value-of-documentation.en.srt | 4.6 KB |
| 02_the-value-of-documentation.en.txt | 3.0 KB |
| 02_the-value-of-documentation.mp4 | 11.0 MB |
| 03_intrusion-detection-systems.en.srt | 3.1 KB |
| 03_intrusion-detection-systems.en.txt | 1.7 KB |
| 03_intrusion-detection-systems.mp4 | 5.4 MB |
| 04_overview-of-detection-tools_instructions.html | 9.4 KB |
| 05_alert-and-event-management-with-siem-and-soar-tools.en.srt | 6.0 KB |
| 05_alert-and-event-management-with-siem-and-soar-tools.en.txt | 3.7 KB |
| 05_alert-and-event-management-with-siem-and-soar-tools.mp4 | 14.5 MB |
| 01_wrap-up.en.srt | 1.4 KB |
| 01_wrap-up.en.txt | 788 bytes |
| 01_wrap-up.mp4 | 2.4 MB |
| 02_glossary-terms-from-week-1_instructions.html | 4.1 KB |
| 01_welcome-to-week-2.en.srt | 1.9 KB |
| 01_welcome-to-week-2.en.txt | 1023 bytes |
| 01_welcome-to-week-2.mp4 | 3.7 MB |
| 02_casey-apply-soft-skills-in-cybersecurity.en.srt | 2.7 KB |
| 02_casey-apply-soft-skills-in-cybersecurity.en.txt | 1.5 KB |
| 02_casey-apply-soft-skills-in-cybersecurity.mp4 | 13.9 MB |
| 03_the-importance-of-network-traffic-flows.en.srt | 4.5 KB |
| 03_the-importance-of-network-traffic-flows.en.txt | 2.9 KB |
| 03_the-importance-of-network-traffic-flows.mp4 | 12.8 MB |
| 04_maintain-awareness-with-network-monitoring_instructions.html | 293.7 KB |
| 05_data-exfiltration-attacks.en.srt | 7.2 KB |
| 05_data-exfiltration-attacks.en.txt | 3.9 KB |
| 05_data-exfiltration-attacks.mp4 | 15.5 MB |
| 01_packets-and-packet-captures.en.srt | 5.1 KB |
| 01_packets-and-packet-captures.en.txt | 2.8 KB |
| 01_packets-and-packet-captures.mp4 | 10.2 MB |
| 02_learn-more-about-packet-captures_instructions.html | 735.8 KB |
| 03_interpret-network-communications-with-packets.en.srt | 2.7 KB |
| 03_interpret-network-communications-with-packets.en.txt | 1.7 KB |
| 03_interpret-network-communications-with-packets.mp4 | 7.6 MB |
| 04_reexamine-the-fields-of-a-packet-header.en.srt | 7.8 KB |
| 04_reexamine-the-fields-of-a-packet-header.en.txt | 4.2 KB |
| 04_reexamine-the-fields-of-a-packet-header.mp4 | 13.6 MB |
| 05_investigate-packet-details_instructions.html | 3.6 MB |
| 06_resources-for-completing-labs_instructions.html | 108.5 KB |
| 01_packet-captures-with-tcpdump.en.srt | 7.0 KB |
| 01_packet-captures-with-tcpdump.en.txt | 3.7 KB |
| 01_packet-captures-with-tcpdump.mp4 | 9.3 MB |
| 02_overview-of-tcpdump_instructions.html | 132.5 KB |
| 02_overview-of-tcpdump_tcpdump.1.html | 72.6 KB |
| 01_wrap-up.en.srt | 1.6 KB |
| 01_wrap-up.en.txt | 872 bytes |
| 01_wrap-up.mp4 | 3.2 MB |
| 02_glossary-terms-from-week-2_instructions.html | 4.0 KB |
| 01_welcome-to-week-3.en.srt | 1.6 KB |
| 01_welcome-to-week-3.en.txt | 954 bytes |
| 01_welcome-to-week-3.mp4 | 3.5 MB |
| 02_the-detection-and-analysis-phase-of-the-lifecycle.en.srt | 3.1 KB |
| 02_the-detection-and-analysis-phase-of-the-lifecycle.en.txt | 2.0 KB |
| 02_the-detection-and-analysis-phase-of-the-lifecycle.mp4 | 8.5 MB |
| 03_cybersecurity-incident-detection-methods_instructions.html | 7.7 KB |
| 04_mk-changes-in-the-cybersecurity-industry.en.srt | 4.3 KB |
| 04_mk-changes-in-the-cybersecurity-industry.en.txt | 2.8 KB |
| 04_mk-changes-in-the-cybersecurity-industry.mp4 | 13.4 MB |
| 05_indicators-of-compromise_instructions.html | 127.7 KB |
| 05_indicators-of-compromise_the-pyramid-of-pain.html | 67.1 KB |
| 06_analyze-indicators-of-compromise-with-investigative-tools_instructions.html | 1.5 MB |
| 01_the-benefits-of-documentation.en.srt | 3.6 KB |
| 01_the-benefits-of-documentation.en.txt | 2.3 KB |
| 01_the-benefits-of-documentation.mp4 | 9.3 MB |
| 02_document-evidence-with-chain-of-custody-forms.en.srt | 5.6 KB |
| 02_document-evidence-with-chain-of-custody-forms.en.txt | 3.5 KB |
| 02_document-evidence-with-chain-of-custody-forms.mp4 | 13.1 MB |
| 03_best-practices-for-effective-documentation_instructions.html | 5.8 KB |
| 04_the-value-of-cybersecurity-playbooks.en.srt | 6.1 KB |
| 04_the-value-of-cybersecurity-playbooks.en.txt | 3.2 KB |
| 04_the-value-of-cybersecurity-playbooks.mp4 | 13.0 MB |
| 01_the-role-of-triage-in-incident-response.en.srt | 6.0 KB |
| 01_the-role-of-triage-in-incident-response.en.txt | 3.2 KB |
| 01_the-role-of-triage-in-incident-response.mp4 | 11.6 MB |
| 02_robin-foster-cross-team-collaboration.en.srt | 3.8 KB |
| 02_robin-foster-cross-team-collaboration.en.txt | 2.4 KB |
| 02_robin-foster-cross-team-collaboration.mp4 | 14.1 MB |
| 03_the-triage-process_instructions.html | 8.3 KB |
| 04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.en.srt | 4.4 KB |
| 04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.en.txt | 2.4 KB |
| 04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.mp4 | 9.9 MB |
| 05_business-continuity-considerations_instructions.html | 6.2 KB |
| 01_the-post-incident-activity-phase-of-the-lifecycle.en.srt | 3.5 KB |
| 01_the-post-incident-activity-phase-of-the-lifecycle.en.txt | 2.2 KB |
| 01_the-post-incident-activity-phase-of-the-lifecycle.mp4 | 8.2 MB |
| 02_post-incident-review_instructions.html | 233.4 KB |
| 01_wrap-up.en.srt | 1.6 KB |
| 01_wrap-up.en.txt | 1.1 KB |
| 01_wrap-up.mp4 | 2.9 MB |
| 02_glossary-terms-from-week-3_instructions.html | 4.8 KB |
| 01_welcome-to-week-4.en.srt | 2.2 KB |
| 01_welcome-to-week-4.en.txt | 1.3 KB |
| 01_welcome-to-week-4.mp4 | 5.0 MB |
| 02_the-importance-of-logs.en.srt | 6.0 KB |
| 02_the-importance-of-logs.en.txt | 3.8 KB |
| 02_the-importance-of-logs.mp4 | 12.8 MB |
| 03_best-practices-for-log-collection-and-management_instructions.html | 8.3 KB |
| 04_rebecca-learn-new-tools-and-technologies.en.srt | 3.0 KB |
| 04_rebecca-learn-new-tools-and-technologies.en.txt | 1.8 KB |
| 04_rebecca-learn-new-tools-and-technologies.mp4 | 9.3 MB |
| 05_variations-of-logs.en.srt | 6.8 KB |
| 05_variations-of-logs.en.txt | 3.6 KB |
| 05_variations-of-logs.mp4 | 11.9 MB |
| 06_overview-of-log-file-formats_instructions.html | 16.4 KB |
| 01_security-monitoring-with-detection-tools.en.srt | 6.1 KB |
| 01_security-monitoring-with-detection-tools.en.txt | 3.3 KB |
| 01_security-monitoring-with-detection-tools.mp4 | 14.7 MB |
| 02_detection-tools-and-techniques_instructions.html | 342.7 KB |
| 03_components-of-a-detection-signature.en.srt | 6.6 KB |
| 03_components-of-a-detection-signature.en.txt | 3.5 KB |
| 03_components-of-a-detection-signature.mp4 | 12.8 MB |
| 04_examine-signatures-with-suricata.en.srt | 5.9 KB |
| 04_examine-signatures-with-suricata.en.txt | 3.8 KB |
| 04_examine-signatures-with-suricata.mp4 | 8.4 MB |
| 05_examine-suricata-logs.en.srt | 3.3 KB |
| 05_examine-suricata-logs.en.txt | 2.0 KB |
| 05_examine-suricata-logs.mp4 | 7.4 MB |
| 06_overview-of-suricata_eve-json-examplesjq.html | 23.0 KB |
| 06_overview-of-suricata_index.html | 32.5 KB |
| 06_overview-of-suricata_instructions.html | 124.4 KB |
| 06_overview-of-suricata_suricata-update.html | 23.5 KB |
| 06_overview-of-suricata_suricata-yaml.html | 236.7 KB |
| 01_reexamine-siem-tools.en.srt | 3.6 KB |
| 01_reexamine-siem-tools.en.txt | 2.3 KB |
| 01_reexamine-siem-tools.mp4 | 9.1 MB |
| 02_query-for-events-with-splunk.en.srt | 7.0 KB |
| 02_query-for-events-with-splunk.en.txt | 3.8 KB |
| 02_query-for-events-with-splunk.mp4 | 9.3 MB |
| 03_query-for-events-with-chronicle.en.srt | 6.6 KB |
| 03_query-for-events-with-chronicle.en.txt | 3.5 KB |
| 03_query-for-events-with-chronicle.mp4 | 8.2 MB |
| 04_search-methods-with-siem-tools_instructions.html | 415.6 KB |
| 01_wrap-up.en.srt | 1.8 KB |
| 01_wrap-up.en.txt | 1.1 KB |
| 01_wrap-up.mp4 | 3.4 MB |
| 02_glossary-terms-from-week-4_instructions.html | 4.5 KB |
| 01_course-wrap-up.en.srt | 3.6 KB |
| 01_course-wrap-up.en.txt | 1.9 KB |
| 01_course-wrap-up.mp4 | 5.8 MB |
| 02_course-6-glossary_Course_6_glossary.docx | 859.7 KB |
| 02_course-6-glossary_instructions.html | 6.5 KB |
| 03_get-started-on-the-next-course_instructions.html | 789.4 KB |
| 01__resources.html | 18.6 KB |
| 01__Google_Cybersecurity_Certificate_glossary.docx | 879.3 KB |
| 01__resources.html | 6.5 KB |
| 01__resources.html | 108.5 KB |
| 01__Course_6_glossary.docx | 859.8 KB |
| 01__resources.html | 6.5 KB |
| 01__Bryan_Nolen_-_Surviving_Your_First_Incident_Purplecon_2018.pdf | 142.4 KB |
| 01__RAID4.pdf | 284.7 KB |
| 01__cisa-insights_chain-of-custody-and-ci-systems_508.pdf | 360.2 KB |
| 01__index.html | 32.5 KB |
| 01__network-operations-center.html | 219.6 KB |
| 01__nist.sp.800-61r2.pdf | 1.5 MB |
| 01__nistspecialpublication800-92.pdf | 1.7 MB |
| 01__question525.htm | 170.3 KB |
| 01__resources.html | 37.0 KB |
| 01__suricata-update.html | 23.5 KB |
| 01__suricata-yaml.html | 236.7 KB |
| 01__tcpdump.1.html | 72.6 KB |
| 01__the-pyramid-of-pain.html | 67.1 KB |
| 01__xml_whatis.asp | 89.4 KB |
| 01__resources.html | 16.0 KB |
| 01__resources.html | 8.8 KB |
| Readme.txt | 51 bytes |
| 01_welcome-to-the-google-cybersecurity-certificate.en.srt | 15.2 KB |
| 01_welcome-to-the-google-cybersecurity-certificate.en.txt | 8.0 KB |
| 01_welcome-to-the-google-cybersecurity-certificate.mp4 | 47.3 MB |
| 02_google-cybersecurity-certificate-overview_instructions.html | 500.5 KB |
| 03_course-1-overview_instructions.html | 1.3 MB |
| 04_welcome-to-week-1.en.srt | 1.9 KB |
| 04_welcome-to-week-1.en.txt | 1.0 KB |
| 04_welcome-to-week-1.mp4 | 4.7 MB |
| 05_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx | 879.3 KB |
| 05_helpful-resources-and-tips_instructions.html | 11.2 KB |
| 06_participate-in-program-surveys_instructions.html | 3.7 KB |
| 01_introduction-to-cybersecurity.en.srt | 7.1 KB |
| 01_introduction-to-cybersecurity.en.txt | 3.8 KB |
| 01_introduction-to-cybersecurity.mp4 | 23.1 MB |
| 02_toni-my-path-to-cybersecurity.en.srt | 5.5 KB |
| 02_toni-my-path-to-cybersecurity.en.txt | 2.9 KB |
| 02_toni-my-path-to-cybersecurity.mp4 | 20.0 MB |
| 03_responsibilities-of-an-entry-level-cybersecurity-analyst.en.srt | 4.5 KB |
| 03_responsibilities-of-an-entry-level-cybersecurity-analyst.en.txt | 2.4 KB |
| 03_responsibilities-of-an-entry-level-cybersecurity-analyst.mp4 | 14.5 MB |
| 04_nikki-a-day-in-the-life-of-a-security-engineer.en.srt | 3.8 KB |
| 04_nikki-a-day-in-the-life-of-a-security-engineer.en.txt | 2.4 KB |
| 04_nikki-a-day-in-the-life-of-a-security-engineer.mp4 | 16.1 MB |
| 05_common-cybersecurity-terminology_instructions.html | 5.6 KB |
| 01_core-skills-for-cybersecurity-professionals.en.srt | 7.6 KB |
| 01_core-skills-for-cybersecurity-professionals.en.txt | 4.1 KB |
| 01_core-skills-for-cybersecurity-professionals.mp4 | 19.3 MB |
| 02_veronica-my-path-to-working-in-cybersecurity.en.srt | 3.1 KB |
| 02_veronica-my-path-to-working-in-cybersecurity.en.txt | 1.6 KB |
| 02_veronica-my-path-to-working-in-cybersecurity.mp4 | 11.0 MB |
| 03_transferable-and-technical-cybersecurity-skills_instructions.html | 7.3 KB |
| 04_the-importance-of-cybersecurity.en.srt | 4.1 KB |
| 04_the-importance-of-cybersecurity.en.txt | 2.6 KB |
| 04_the-importance-of-cybersecurity.mp4 | 17.8 MB |
| 01_wrap-up.en.srt | 1.7 KB |
| 01_wrap-up.en.txt | 925 bytes |
| 01_wrap-up.mp4 | 4.0 MB |
| 02_glossary-terms-from-week-1_instructions.html | 2.8 KB |
| 01_welcome-to-week-2.en.srt | 2.2 KB |
| 01_welcome-to-week-2.en.txt | 1.1 KB |
| 01_welcome-to-week-2.mp4 | 6.7 MB |
| 02_past-cybersecurity-attacks.en.srt | 6.3 KB |
| 02_past-cybersecurity-attacks.en.txt | 3.3 KB |
| 02_past-cybersecurity-attacks.mp4 | 22.0 MB |
| 03_attacks-in-the-digital-age.en.srt | 6.5 KB |
| 03_attacks-in-the-digital-age.en.txt | 4.2 KB |
| 03_attacks-in-the-digital-age.mp4 | 25.5 MB |
| 04_common-attacks-and-their-effectiveness_instructions.html | 8.4 KB |
| 05_sean-keep-your-cool-during-a-data-breach.en.srt | 2.9 KB |
| 05_sean-keep-your-cool-during-a-data-breach.en.txt | 1.5 KB |
| 05_sean-keep-your-cool-during-a-data-breach.mp4 | 13.9 MB |
| 01_introduction-to-the-eight-cissp-security-domains-part-1.en.srt | 5.3 KB |
| 01_introduction-to-the-eight-cissp-security-domains-part-1.en.txt | 3.3 KB |
| 01_introduction-to-the-eight-cissp-security-domains-part-1.mp4 | 18.3 MB |
| 02_introduction-to-the-eight-cissp-security-domains-part-2.en.srt | 5.7 KB |
| 02_introduction-to-the-eight-cissp-security-domains-part-2.en.txt | 3.0 KB |
| 02_introduction-to-the-eight-cissp-security-domains-part-2.mp4 | 17.3 MB |
| 03_determine-the-type-of-attack_instructions.html | 225.0 KB |
| 04_understand-attackers_instructions.html | 313.3 KB |
| 01_wrap-up.en.srt | 2.2 KB |
| 01_wrap-up.en.txt | 1.5 KB |
| 01_wrap-up.mp4 | 7.4 MB |
| 02_glossary-terms-from-week-2_instructions.html | 4.2 KB |
| 01_welcome-to-week-3.en.srt | 3.8 KB |
| 01_welcome-to-week-3.en.txt | 2.4 KB |
| 01_welcome-to-week-3.mp4 | 14.5 MB |
| 02_introduction-to-security-frameworks-and-controls.en.srt | 7.5 KB |
| 02_introduction-to-security-frameworks-and-controls.en.txt | 4.0 KB |
| 02_introduction-to-security-frameworks-and-controls.mp4 | 23.4 MB |
| 03_secure-design.en.srt | 6.8 KB |
| 03_secure-design.en.txt | 3.6 KB |
| 03_secure-design.mp4 | 19.1 MB |
| 04_controls-frameworks-and-compliance_instructions.html | 151.8 KB |
| 05_heather-protect-sensitive-data-and-information.en.srt | 3.1 KB |
| 05_heather-protect-sensitive-data-and-information.en.txt | 2.0 KB |
| 05_heather-protect-sensitive-data-and-information.mp4 | 16.8 MB |
| 01_ethics-in-cybersecurity.en.srt | 6.6 KB |
| 01_ethics-in-cybersecurity.en.txt | 4.1 KB |
| 01_ethics-in-cybersecurity.mp4 | 22.5 MB |
| 02_ethical-concepts-that-guide-cybersecurity-decisions_instructions.html | 7.9 KB |
| 03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.en.srt | 4.1 KB |
| 03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.en.txt | 2.3 KB |
| 03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.mp4 | 14.6 MB |
| 01_wrap-up.en.srt | 1.7 KB |
| 01_wrap-up.en.txt | 953 bytes |
| 01_wrap-up.mp4 | 4.7 MB |
| 02_glossary-terms-from-week-3_instructions.html | 3.9 KB |
| 01_welcome-to-week-4.en.srt | 2.6 KB |
| 01_welcome-to-week-4.en.txt | 1.4 KB |
| 01_welcome-to-week-4.mp4 | 7.0 MB |
| 02_common-cybersecurity-tools.en.srt | 7.1 KB |
| 02_common-cybersecurity-tools.en.txt | 3.8 KB |
| 02_common-cybersecurity-tools.mp4 | 20.2 MB |
| 03_tools-for-protecting-business-operations_gcat_threathorizons_full_sept2022.pdf | 3.0 MB |
| 03_tools-for-protecting-business-operations_instructions.html | 651.5 KB |
| 01_introduction-to-linux-sql-and-python.en.srt | 5.1 KB |
| 01_introduction-to-linux-sql-and-python.en.txt | 2.8 KB |
| 01_introduction-to-linux-sql-and-python.mp4 | 14.5 MB |
| 02_use-tools-to-protect-business-operations_instructions.html | 6.6 KB |
| 03_create-a-cybersecurity-portfolio_instructions.html | 8.7 KB |
| 01_wrap-up.en.srt | 1012 bytes |
| 01_wrap-up.en.txt | 648 bytes |
| 01_wrap-up.mp4 | 2.1 MB |
| 02_glossary-terms-from-week-4_instructions.html | 2.8 KB |
| 01_course-wrap-up.en.srt | 3.0 KB |
| 01_course-wrap-up.en.txt | 1.6 KB |
| 01_course-wrap-up.mp4 | 7.7 MB |
| 02_course-1-glossary_Course_1_glossary.docx | 858.9 KB |
| 02_course-1-glossary_instructions.html | 6.5 KB |
| 03_get-started-on-the-next-course_instructions.html | 796.2 KB |
| 01__resources.html | 19.4 KB |
| 01__Course_1_glossary.docx | 858.7 KB |
| 01__resources.html | 6.5 KB |
| 01__55.html | 42.5 KB |
| 01__IntroToCybersecurityEthics.pdf | 578.3 KB |
| 01__R46536.pdf | 1.3 MB |
| 01__cis-controls-and-the-hph.pdf | 1.5 MB |
| 01__display.cfm | 37.0 KB |
| 01__gcat_threathorizons_full_sept2022.pdf | 3.0 MB |
| 01__hipaa.html | 195.9 KB |
| 01__index.html | 1.6 MB |
| 01__ncsam_eskimming_508.pdf | 780.8 KB |
| 01__nist_small_business_fundamentals_july_2019.pptx | 4.2 MB |
| 01__resources.html | 28.1 KB |
| 01__rules-and-security-requirements.html | 74.8 KB |
| 01__why-splunk.html | 227.5 KB |
| 01__Google_Cybersecurity_Certificate_glossary.docx | 879.1 KB |
| 01__resources.html | 6.5 KB |
| 01__resources.html | 16.0 KB |
| 01_introduction-to-course-4.en.srt | 3.9 KB |
| 01_introduction-to-course-4.en.txt | 2.1 KB |
| 01_introduction-to-course-4.mp4 | 8.7 MB |
| 02_course-4-overview_instructions.html | 1.2 MB |
| 03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx | 879.3 KB |
| 03_helpful-resources-and-tips_instructions.html | 11.2 KB |
| 01_welcome-to-week-1.en.srt | 1.5 KB |
| 01_welcome-to-week-1.en.txt | 878 bytes |
| 01_welcome-to-week-1.mp4 | 2.9 MB |
| 02_kim-my-journey-into-computing.en.srt | 3.5 KB |
| 02_kim-my-journey-into-computing.en.txt | 1.8 KB |
| 02_kim-my-journey-into-computing.mp4 | 10.9 MB |
| 03_introduction-to-operating-systems.en.srt | 4.3 KB |
| 03_introduction-to-operating-systems.en.txt | 2.8 KB |
| 03_introduction-to-operating-systems.mp4 | 11.5 MB |
| 04_compare-operating-systems_instructions.html | 6.3 KB |
| 01_inside-the-operating-system.en.srt | 5.8 KB |
| 01_inside-the-operating-system.en.txt | 3.1 KB |
| 01_inside-the-operating-system.mp4 | 10.5 MB |
| 02_requests-to-the-operating-system_instructions.html | 133.9 KB |
| 03_resource-allocation-via-the-os.en.srt | 3.9 KB |
| 03_resource-allocation-via-the-os.en.txt | 2.1 KB |
| 03_resource-allocation-via-the-os.mp4 | 9.5 MB |
| 01_gui-versus-cli.en.srt | 7.0 KB |
| 01_gui-versus-cli.en.txt | 3.7 KB |
| 01_gui-versus-cli.mp4 | 14.1 MB |
| 02_the-command-line-in-use_instructions.html | 197.1 KB |
| 03_ellen-my-path-into-cybersecurity.en.srt | 3.8 KB |
| 03_ellen-my-path-into-cybersecurity.en.txt | 2.4 KB |
| 03_ellen-my-path-into-cybersecurity.mp4 | 12.4 MB |
| 01_wrap-up.en.srt | 1.9 KB |
| 01_wrap-up.en.txt | 1.1 KB |
| 01_wrap-up.mp4 | 3.2 MB |
| 02_glossary-terms-from-week-1_instructions.html | 2.5 KB |
| 01_welcome-to-week-2.en.srt | 1.6 KB |
| 01_welcome-to-week-2.en.txt | 889 bytes |
| 01_welcome-to-week-2.mp4 | 3.2 MB |
| 02_introduction-to-linux.en.srt | 5.0 KB |
| 02_introduction-to-linux.en.txt | 3.1 KB |
| 02_introduction-to-linux.mp4 | 12.6 MB |
| 03_phil-learn-and-grow-in-the-cybersecurity-field.en.srt | 4.1 KB |
| 03_phil-learn-and-grow-in-the-cybersecurity-field.en.txt | 2.2 KB |
| 03_phil-learn-and-grow-in-the-cybersecurity-field.mp4 | 12.6 MB |
| 04_linux-architecture.en.srt | 5.8 KB |
| 04_linux-architecture.en.txt | 3.0 KB |
| 04_linux-architecture.mp4 | 11.8 MB |
| 05_linux-architecture-explained_instructions.html | 6.5 KB |
| 01_linux-distributions.en.srt | 4.3 KB |
| 01_linux-distributions.en.txt | 2.6 KB |
| 01_linux-distributions.mp4 | 10.3 MB |
| 02_kali-linux-tm.en.srt | 3.5 KB |
| 02_kali-linux-tm.en.txt | 2.3 KB |
| 02_kali-linux-tm.mp4 | 7.2 MB |
| 03_more-linux-distributions_instructions.html | 4.4 KB |
| 04_resources-for-completing-linux-labs_instructions.html | 108.5 KB |
| 01_introduction-to-the-shell.en.srt | 2.7 KB |
| 01_introduction-to-the-shell.en.txt | 1.7 KB |
| 01_introduction-to-the-shell.mp4 | 6.0 MB |
| 02_input-and-output-in-the-shell.en.srt | 4.9 KB |
| 02_input-and-output-in-the-shell.en.txt | 2.7 KB |
| 02_input-and-output-in-the-shell.mp4 | 8.6 MB |
| 01_wrap-up.en.srt | 1.4 KB |
| 01_wrap-up.en.txt | 735 bytes |
| 01_wrap-up.mp4 | 2.8 MB |
| 02_glossary-terms-from-week-2_instructions.html | 5.0 KB |
| 01_welcome-to-week-3.en.srt | 2.7 KB |
| 01_welcome-to-week-3.en.txt | 1.4 KB |
| 01_welcome-to-week-3.mp4 | 5.1 MB |
| 02_linux-commands-via-the-bash-shell.en.srt | 5.1 KB |
| 02_linux-commands-via-the-bash-shell.en.txt | 2.8 KB |
| 02_linux-commands-via-the-bash-shell.mp4 | 10.2 MB |
| 03_core-commands-for-navigation-and-reading-files.en.srt | 7.6 KB |
| 03_core-commands-for-navigation-and-reading-files.en.txt | 4.0 KB |
| 03_core-commands-for-navigation-and-reading-files.mp4 | 11.3 MB |
| 04_navigate-linux-and-read-file-content_instructions.html | 104.9 KB |
| 01_find-what-you-need-with-linux.en.srt | 7.6 KB |
| 01_find-what-you-need-with-linux.en.txt | 3.9 KB |
| 01_find-what-you-need-with-linux.mp4 | 10.7 MB |
| 02_filter-content-in-linux_instructions.html | 8.7 KB |
| 03_create-and-modify-directories-and-files.en.srt | 11.1 KB |
| 03_create-and-modify-directories-and-files.en.txt | 5.8 KB |
| 03_create-and-modify-directories-and-files.mp4 | 17.8 MB |
| 04_manage-directories-and-files_instructions.html | 9.6 KB |
| 01_file-permissions-and-ownership.en.srt | 11.1 KB |
| 01_file-permissions-and-ownership.en.txt | 5.8 KB |
| 01_file-permissions-and-ownership.mp4 | 16.7 MB |
| 02_change-permissions.en.srt | 7.2 KB |
| 02_change-permissions.en.txt | 3.8 KB |
| 02_change-permissions.mp4 | 9.4 MB |
| 03_permission-commands_instructions.html | 15.5 KB |
| 04_add-and-delete-users.en.srt | 8.9 KB |
| 04_add-and-delete-users.en.txt | 4.7 KB |
| 04_add-and-delete-users.mp4 | 14.7 MB |
| 05_responsible-use-of-sudo_instructions.html | 11.2 KB |
| 01_damar-my-journey-into-linux-commands.en.srt | 3.7 KB |
| 01_damar-my-journey-into-linux-commands.en.txt | 2.3 KB |
| 01_damar-my-journey-into-linux-commands.mp4 | 13.6 MB |
| 02_the-linux-community.en.srt | 2.5 KB |
| 02_the-linux-community.en.txt | 1.4 KB |
| 02_the-linux-community.mp4 | 6.0 MB |
| 03_man-pages-within-the-shell.en.srt | 4.0 KB |
| 03_man-pages-within-the-shell.en.txt | 2.1 KB |
| 03_man-pages-within-the-shell.mp4 | 6.6 MB |
| 04_linux-resources_instructions.html | 5.1 KB |
| 01_wrap-up.en.srt | 1.3 KB |
| 01_wrap-up.en.txt | 876 bytes |
| 01_wrap-up.mp4 | 3.4 MB |
| 02_glossary-terms-from-week-3_instructions.html | 3.2 KB |
| 01_welcome-to-week-4.en.srt | 2.6 KB |
| 01_welcome-to-week-4.en.txt | 1.4 KB |
| 01_welcome-to-week-4.mp4 | 5.3 MB |
| 02_introduction-to-databases.en.srt | 5.9 KB |
| 02_introduction-to-databases.en.txt | 3.7 KB |
| 02_introduction-to-databases.mp4 | 10.4 MB |
| 03_query-databases-with-sql.en.srt | 3.9 KB |
| 03_query-databases-with-sql.en.txt | 2.5 KB |
| 03_query-databases-with-sql.mp4 | 8.5 MB |
| 04_sql-filtering-versus-linux-filtering_instructions.html | 4.2 KB |
| 05_adedayo-sql-in-cybersecurity.en.srt | 3.8 KB |
| 05_adedayo-sql-in-cybersecurity.en.txt | 2.1 KB |
| 05_adedayo-sql-in-cybersecurity.mp4 | 13.7 MB |
| 01_basic-queries.en.srt | 4.7 KB |
| 01_basic-queries.en.txt | 2.5 KB |
| 01_basic-queries.mp4 | 9.0 MB |
| 02_query-a-database_instructions.html | 8.8 KB |
| 03_resources-for-completing-sql-labs_instructions.html | 108.5 KB |
| 04_basic-filters-on-sql-queries.en.srt | 6.4 KB |
| 04_basic-filters-on-sql-queries.en.txt | 4.0 KB |
| 04_basic-filters-on-sql-queries.mp4 | 14.8 MB |
| 05_the-where-clause-and-basic-operators_instructions.html | 8.1 KB |
| 01_filter-dates-and-numbers.en.srt | 5.1 KB |
| 01_filter-dates-and-numbers.en.txt | 3.2 KB |
| 01_filter-dates-and-numbers.mp4 | 11.0 MB |
| 02_operators-for-filtering-dates-and-numbers_instructions.html | 6.8 KB |
| 03_filters-with-and-or-and-not.en.srt | 8.2 KB |
| 03_filters-with-and-or-and-not.en.txt | 4.4 KB |
| 03_filters-with-and-or-and-not.mp4 | 16.1 MB |
| 04_more-on-filters-with-and-or-and-not_instructions.html | 6.4 KB |
| 01_join-tables-in-sql.en.srt | 8.5 KB |
| 01_join-tables-in-sql.en.txt | 4.5 KB |
| 01_join-tables-in-sql.mp4 | 12.3 MB |
| 02_types-of-joins.en.srt | 5.1 KB |
| 02_types-of-joins.en.txt | 2.7 KB |
| 02_types-of-joins.mp4 | 8.0 MB |
| 03_compare-types-of-joins_instructions.html | 1.5 MB |
| 04_continuous-learning-in-sql_instructions.html | 5.3 KB |
| 01_wrap-up.en.srt | 2.2 KB |
| 01_wrap-up.en.txt | 1.2 KB |
| 01_wrap-up.mp4 | 3.4 MB |
| 02_glossary-terms-from-week-4_instructions.html | 3.0 KB |
| 01_course-wrap-up.en.srt | 2.3 KB |
| 01_course-wrap-up.en.txt | 1.3 KB |
| 01_course-wrap-up.mp4 | 3.8 MB |
| 02_course-4-glossary_Course_4_glossary.docx | 1.1 MB |
| 02_course-4-glossary_instructions.html | 6.5 KB |
| 03_get-started-on-the-next-course_instructions.html | 784.2 KB |
| 01__resources.html | 18.6 KB |
| 01__Google_Cybersecurity_Certificate_glossary.docx | 879.3 KB |
| 01__resources.html | 6.5 KB |
| 01__resources.html | 108.5 KB |
| 01__resources.html | 108.5 KB |
| 01__Course_4_glossary.docx | 1.1 MB |
| 01__resources.html | 6.5 KB |
| 01__01-intro.html | 63.3 KB |
| 01__Linux-in-a-Nutshell-6th-Edition.pdf | 12.4 MB |
| 01__ShellIntro.pdf | 124.3 KB |
| 01__bootup.html | 8.1 KB |
| 01__operating-system2.htm | 153.6 KB |
| 01__resources.html | 19.8 KB |
| 01__subsection3.1.html | 4.3 KB |
| 01__thegnuproject.html | 65.1 KB |
| 01__resources.html | 16.0 KB |
| 01__resources.html | 8.8 KB |
| 01_introduction-to-course-2.en.srt | 2.4 KB |
| 01_introduction-to-course-2.en.txt | 1.5 KB |
| 01_introduction-to-course-2.mp4 | 7.9 MB |
| 02_course-2-overview_instructions.html | 1.8 MB |
| 03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx | 879.3 KB |
| 03_helpful-resources-and-tips_instructions.html | 11.3 KB |
| 01_welcome-to-week-1.en.srt | 1.6 KB |
| 01_welcome-to-week-1.en.txt | 1.0 KB |
| 01_welcome-to-week-1.mp4 | 4.5 MB |
| 02_explore-the-cissp-security-domains-part-1.en.srt | 6.2 KB |
| 02_explore-the-cissp-security-domains-part-1.en.txt | 4.0 KB |
| 02_explore-the-cissp-security-domains-part-1.mp4 | 19.1 MB |
| 03_explore-the-cissp-security-domains-part-2.en.srt | 6.7 KB |
| 03_explore-the-cissp-security-domains-part-2.en.txt | 4.4 KB |
| 03_explore-the-cissp-security-domains-part-2.mp4 | 18.2 MB |
| 04_security-domains-cybersecurity-analysts-need-to-know_instructions.html | 195.3 KB |
| 05_ashley-my-path-to-cybersecurity.en.srt | 5.7 KB |
| 05_ashley-my-path-to-cybersecurity.en.txt | 3.0 KB |
| 05_ashley-my-path-to-cybersecurity.mp4 | 19.8 MB |
| 01_threats-risks-and-vulnerabilities.en.srt | 5.9 KB |
| 01_threats-risks-and-vulnerabilities.en.txt | 3.8 KB |
| 01_threats-risks-and-vulnerabilities.mp4 | 17.0 MB |
| 02_key-impacts-of-threats-risks-and-vulnerabilities.en.srt | 5.2 KB |
| 02_key-impacts-of-threats-risks-and-vulnerabilities.en.txt | 3.4 KB |
| 02_key-impacts-of-threats-risks-and-vulnerabilities.mp4 | 17.3 MB |
| 03_herbert-manage-threats-risks-and-vulnerabilities.en.srt | 3.1 KB |
| 03_herbert-manage-threats-risks-and-vulnerabilities.en.txt | 1.9 KB |
| 03_herbert-manage-threats-risks-and-vulnerabilities.mp4 | 9.6 MB |
| 04_nist-s-risk-management-framework.en.srt | 6.4 KB |
| 04_nist-s-risk-management-framework.en.txt | 3.4 KB |
| 04_nist-s-risk-management-framework.mp4 | 16.3 MB |
| 05_manage-common-threats-risks-and-vulnerabilities_instructions.html | 779.1 KB |
| 01_wrap-up.en.srt | 1.4 KB |
| 01_wrap-up.en.txt | 882 bytes |
| 01_wrap-up.mp4 | 3.9 MB |
| 02_glossary-terms-from-week-1_instructions.html | 3.9 KB |
| 01_welcome-to-week-2.en.srt | 1.7 KB |
| 01_welcome-to-week-2.en.txt | 950 bytes |
| 01_welcome-to-week-2.mp4 | 5.4 MB |
| 02_frameworks.en.srt | 3.5 KB |
| 02_frameworks.en.txt | 1.9 KB |
| 02_frameworks.mp4 | 10.3 MB |
| 03_controls.en.srt | 5.4 KB |
| 03_controls.en.txt | 2.9 KB |
| 03_controls.mp4 | 14.1 MB |
| 04_the-relationship-between-frameworks-and-controls_instructions.html | 6.6 KB |
| 04_the-relationship-between-frameworks-and-controls_physical-access-control.pdf | 6.9 MB |
| 01_explore-the-cia-triad.en.srt | 4.8 KB |
| 01_explore-the-cia-triad.en.txt | 3.1 KB |
| 01_explore-the-cia-triad.mp4 | 14.7 MB |
| 02_use-the-cia-triad-to-protect-organizations_instructions.html | 4.3 KB |
| 01_nist-frameworks.en.srt | 6.8 KB |
| 01_nist-frameworks.en.txt | 3.6 KB |
| 01_nist-frameworks.mp4 | 18.0 MB |
| 02_explore-the-five-functions-of-the-nist-cybersecurity-framework.en.srt | 6.0 KB |
| 02_explore-the-five-functions-of-the-nist-cybersecurity-framework.en.txt | 3.2 KB |
| 02_explore-the-five-functions-of-the-nist-cybersecurity-framework.mp4 | 15.2 MB |
| 01_owasp-security-principles.en.srt | 6.6 KB |
| 01_owasp-security-principles.en.txt | 3.5 KB |
| 01_owasp-security-principles.mp4 | 19.1 MB |
| 02_more-about-owasp-security-principles_instructions.html | 5.4 KB |
| 03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.en.srt | 3.0 KB |
| 03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.en.txt | 1.9 KB |
| 03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.mp4 | 10.0 MB |
| 04_plan-a-security-audit.en.srt | 6.9 KB |
| 04_plan-a-security-audit.en.txt | 3.6 KB |
| 04_plan-a-security-audit.mp4 | 16.7 MB |
| 05_complete-a-security-audit.en.srt | 5.3 KB |
| 05_complete-a-security-audit.en.txt | 3.4 KB |
| 05_complete-a-security-audit.mp4 | 17.0 MB |
| 06_more-about-security-audits_Audit_and_Accountability_AU_CIO-IT_Security_01-08_Rev_6_12-03-2020docx.pdf | 1.2 MB |
| 06_more-about-security-audits_Control_categories.docx | 838.0 KB |
| 06_more-about-security-audits_instructions.html | 8.8 KB |
| 01_wrap-up.en.srt | 2.8 KB |
| 01_wrap-up.en.txt | 1.5 KB |
| 01_wrap-up.mp4 | 7.1 MB |
| 02_glossary-terms-from-week-2_instructions.html | 5.0 KB |
| 01_welcome-to-week-3.en.srt | 1.3 KB |
| 01_welcome-to-week-3.en.txt | 835 bytes |
| 01_welcome-to-week-3.mp4 | 4.3 MB |
| 02_logs-and-siem-tools.en.srt | 4.0 KB |
| 02_logs-and-siem-tools.en.txt | 2.1 KB |
| 02_logs-and-siem-tools.mp4 | 8.9 MB |
| 03_siem-dashboards.en.srt | 4.4 KB |
| 03_siem-dashboards.en.txt | 2.3 KB |
| 03_siem-dashboards.mp4 | 10.8 MB |
| 04_the-future-of-siem-tools_instructions.html | 5.1 KB |
| 05_parisa-the-parallels-of-accessibility-and-security.en.srt | 3.8 KB |
| 05_parisa-the-parallels-of-accessibility-and-security.en.txt | 2.4 KB |
| 05_parisa-the-parallels-of-accessibility-and-security.mp4 | 16.4 MB |
| 01_explore-common-siem-tools.en.srt | 4.3 KB |
| 01_explore-common-siem-tools.en.txt | 2.8 KB |
| 01_explore-common-siem-tools.mp4 | 14.7 MB |
| 02_more-about-cybersecurity-tools_instructions.html | 5.5 KB |
| 03_talya-myths-about-the-cybersecurity-field.en.srt | 3.1 KB |
| 03_talya-myths-about-the-cybersecurity-field.en.txt | 1.6 KB |
| 03_talya-myths-about-the-cybersecurity-field.mp4 | 9.6 MB |
| 04_use-siem-tools-to-protect-organizations_instructions.html | 8.6 KB |
| 01_wrap-up.en.srt | 1.2 KB |
| 01_wrap-up.en.txt | 780 bytes |
| 01_wrap-up.mp4 | 2.6 MB |
| 02_glossary-terms-from-week-3_instructions.html | 2.6 KB |
| 01_welcome-to-week-4.en.srt | 912 bytes |
| 01_welcome-to-week-4.en.txt | 548 bytes |
| 01_welcome-to-week-4.mp4 | 3.0 MB |
| 02_phases-of-an-incident-response-playbook.en.srt | 7.9 KB |
| 02_phases-of-an-incident-response-playbook.en.txt | 4.2 KB |
| 02_phases-of-an-incident-response-playbook.mp4 | 24.3 MB |
| 03_more-about-playbooks_guidelines.html | 17.4 KB |
| 03_more-about-playbooks_instructions.html | 200.4 KB |
| 01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.en.srt | 5.9 KB |
| 01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.en.txt | 3.2 KB |
| 01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.mp4 | 19.0 MB |
| 02_erin-the-importance-of-diversity-of-perspective-on-a-security-team.en.srt | 4.4 KB |
| 02_erin-the-importance-of-diversity-of-perspective-on-a-security-team.en.txt | 2.8 KB |
| 02_erin-the-importance-of-diversity-of-perspective-on-a-security-team.mp4 | 19.9 MB |
| 03_playbooks-siem-tools-and-soar-tools_instructions.html | 3.1 KB |
| 01_wrap-up.en.srt | 1.2 KB |
| 01_wrap-up.en.txt | 836 bytes |
| 01_wrap-up.mp4 | 4.4 MB |
| 02_glossary-terms-from-week-4_instructions.html | 1.5 KB |
| 01_course-wrap-up.en.srt | 1.9 KB |
| 01_course-wrap-up.en.txt | 1.2 KB |
| 01_course-wrap-up.mp4 | 5.2 MB |
| 02_course-2-glossary_Course_2_glossary.docx | 858.5 KB |
| 02_course-2-glossary_instructions.html | 6.5 KB |
| 03_get-started-on-the-next-course_instructions.html | 793.2 KB |
| 01__resources.html | 18.6 KB |
| 01__Google_Cybersecurity_Certificate_glossary.docx | 879.3 KB |
| 01__resources.html | 6.5 KB |
| 01__Course_2_glossary.docx | 858.5 KB |
| 01__resources.html | 6.5 KB |
| 01__Audit_and_Accountability_AU_CIO-IT_Security_01-08_Rev_6_12-03-2020docx.pdf | 1.2 MB |
| 01__Cyber-Incident-Response-Standard.docx | 63.3 KB |
| 01__Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response_Playbooks_508C.pdf | 1.1 MB |
| 01__Format-Security-plus-Study-Guide.pdf | 16.8 KB |
| 01__NIST.SP.800-218.pdf | 722.5 KB |
| 01__NIST.SP.800-53r5.pdf | 5.8 MB |
| 01__dod85.pdf | 239.7 KB |
| 01__guidelines.html | 17.4 KB |
| 01__index.html | 21.3 KB |
| 01__physical-access-control.pdf | 6.9 MB |
| 01__resources.html | 33.1 KB |
| 01__why-splunk.html | 227.5 KB |
| 01__resources.html | 16.0 KB |
| 01__resources.html | 8.8 KB |
| 01_introduction-to-course-3.en.srt | 1.8 KB |
| 01_introduction-to-course-3.en.txt | 1.1 KB |
| 01_introduction-to-course-3.mp4 | 3.6 MB |
| 02_course-3-overview_instructions.html | 1.2 MB |
| 03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx | 879.3 KB |
| 03_helpful-resources-and-tips_instructions.html | 11.2 KB |
| 01_welcome-to-week-1.en.srt | 863 bytes |
| 01_welcome-to-week-1.en.txt | 533 bytes |
| 01_welcome-to-week-1.mp4 | 2.3 MB |
| 02_chris-my-path-to-cybersecurity.en.srt | 4.9 KB |
| 02_chris-my-path-to-cybersecurity.en.txt | 2.6 KB |
| 02_chris-my-path-to-cybersecurity.mp4 | 18.9 MB |
| 03_what-are-networks.en.srt | 2.7 KB |
| 03_what-are-networks.en.txt | 1.6 KB |
| 03_what-are-networks.mp4 | 6.2 MB |
| 04_tina-working-in-network-security.en.srt | 3.1 KB |
| 04_tina-working-in-network-security.en.txt | 1.6 KB |
| 04_tina-working-in-network-security.mp4 | 11.3 MB |
| 05_emmanuel-useful-skills-for-network-security.en.srt | 4.9 KB |
| 05_emmanuel-useful-skills-for-network-security.en.txt | 2.5 KB |
| 05_emmanuel-useful-skills-for-network-security.mp4 | 13.4 MB |
| 06_network-tools.en.srt | 4.5 KB |
| 06_network-tools.en.txt | 2.4 KB |
| 06_network-tools.mp4 | 7.0 MB |
| 07_network-components-devices-and-diagrams_instructions.html | 1.7 MB |
| 08_cloud-networks.en.srt | 3.6 KB |
| 08_cloud-networks.en.txt | 2.3 KB |
| 08_cloud-networks.mp4 | 8.8 MB |
| 09_cloud-computing-and-software-defined-networks_instructions.html | 694.1 KB |
| 10_test-your-knowledge-introduction-to-networks_quiz.html | 3.5 KB |
| 01_introduction-to-network-communication.en.srt | 3.7 KB |
| 01_introduction-to-network-communication.en.txt | 2.3 KB |
| 01_introduction-to-network-communication.mp4 | 7.3 MB |
| 02_the-tcp-ip-model.en.srt | 4.4 KB |
| 02_the-tcp-ip-model.en.txt | 2.4 KB |
| 02_the-tcp-ip-model.mp4 | 9.0 MB |
| 03_the-four-layers-of-the-tcp-ip-model.en.srt | 3.4 KB |
| 03_the-four-layers-of-the-tcp-ip-model.en.txt | 1.8 KB |
| 03_the-four-layers-of-the-tcp-ip-model.mp4 | 6.5 MB |
| 04_learn-more-about-the-tcp-ip-model_instructions.html | 1.5 MB |
| 05_the-osi-model_instructions.html | 302.9 KB |
| 06_test-your-knowledge-network-communication_quiz.html | 4.9 KB |
| 01_ip-addresses-and-network-communication.en.srt | 4.2 KB |
| 01_ip-addresses-and-network-communication.en.txt | 2.2 KB |
| 01_ip-addresses-and-network-communication.mp4 | 7.3 MB |
| 02_components-of-network-layer-communication_instructions.html | 642.2 KB |
| 03_test-your-knowledge-local-and-wide-network-communication_quiz.html | 3.7 KB |
| 01_wrap-up.en.srt | 1.0 KB |
| 01_wrap-up.en.txt | 620 bytes |
| 01_wrap-up.mp4 | 1.7 MB |
| 02_glossary-terms-from-week-1_instructions.html | 4.5 KB |
| 03_weekly-challenge-1_exam.html | 8.4 KB |
| 01_welcome-to-week-2.en.srt | 2.0 KB |
| 01_welcome-to-week-2.en.txt | 1.1 KB |
| 01_welcome-to-week-2.mp4 | 4.6 MB |
| 02_network-protocols.en.srt | 6.0 KB |
| 02_network-protocols.en.txt | 3.3 KB |
| 02_network-protocols.mp4 | 11.3 MB |
| 03_common-network-protocols_instructions.html | 8.7 KB |
| 04_additional-network-protocols_instructions.html | 11.1 KB |
| 05_test-your-knowledge-recognize-different-network-protocols_quiz.html | 3.4 KB |
| 06_wireless-protocols.en.srt | 2.1 KB |
| 06_wireless-protocols.en.txt | 1.1 KB |
| 06_wireless-protocols.mp4 | 5.1 MB |
| 07_the-evolution-of-wireless-security-protocols_instructions.html | 159.2 KB |
| 01_firewalls-and-network-security-measures.en.srt | 7.4 KB |
| 01_firewalls-and-network-security-measures.en.txt | 3.9 KB |
| 01_firewalls-and-network-security-measures.mp4 | 16.8 MB |
| 02_virtual-private-networks-vpns.en.srt | 4.3 KB |
| 02_virtual-private-networks-vpns.en.txt | 2.3 KB |
| 02_virtual-private-networks-vpns.mp4 | 8.1 MB |
| 03_security-zones.en.srt | 6.0 KB |
| 03_security-zones.en.txt | 3.2 KB |
| 03_security-zones.mp4 | 12.0 MB |
| 04_subnetting-and-cidr_instructions.html | 133.9 KB |
| 05_proxy-servers.en.srt | 4.9 KB |
| 05_proxy-servers.en.txt | 3.1 KB |
| 05_proxy-servers.mp4 | 11.2 MB |
| 06_virtual-networks-and-privacy_instructions.html | 8.4 KB |
| 07_test-your-knowledge-system-identification_quiz.html | 4.3 KB |
| 01_wrap-up.en.srt | 1.1 KB |
| 01_wrap-up.en.txt | 727 bytes |
| 01_wrap-up.mp4 | 2.8 MB |
| 02_glossary-terms-from-week-2_instructions.html | 5.1 KB |
| 03_weekly-challenge-2_exam.html | 8.4 KB |
| 01_welcome-to-week-3.en.srt | 710 bytes |
| 01_welcome-to-week-3.en.txt | 447 bytes |
| 01_welcome-to-week-3.mp4 | 1.3 MB |
| 02_the-case-for-securing-networks.en.srt | 2.2 KB |
| 02_the-case-for-securing-networks.en.txt | 1.4 KB |
| 02_the-case-for-securing-networks.mp4 | 5.5 MB |
| 03_how-intrusions-compromise-your-system_instructions.html | 6.6 KB |
| 01_denial-of-service-dos-attacks.en.srt | 7.8 KB |
| 01_denial-of-service-dos-attacks.en.txt | 4.2 KB |
| 01_denial-of-service-dos-attacks.mp4 | 18.6 MB |
| 02_read-tcpdump-logs_instructions.html | 146.6 KB |
| 03_activity-analyze-network-layer-communication_quiz.html | 1.3 KB |
| 04_real-life-ddos-attack_instructions.html | 5.1 KB |
| 05_test-your-knowledge-secure-networks-against-denial-of-service-dos-attacks_quiz.html | 3.8 KB |
| 01_malicious-packet-sniffing.en.srt | 8.0 KB |
| 01_malicious-packet-sniffing.en.txt | 4.3 KB |
| 01_malicious-packet-sniffing.mp4 | 19.3 MB |
| 02_ip-spoofing.en.srt | 5.1 KB |
| 02_ip-spoofing.en.txt | 2.7 KB |
| 02_ip-spoofing.mp4 | 11.5 MB |
| 03_overview-of-interception-tactics_instructions.html | 7.2 KB |
| 04_activity-analyze-network-attacks_quiz.html | 1.2 KB |
| 05_test-your-knowledge-network-interception-attack-tactics_quiz.html | 4.0 KB |
| 01_wrap-up.en.srt | 1.4 KB |
| 01_wrap-up.en.txt | 747 bytes |
| 01_wrap-up.mp4 | 2.9 MB |
| 02_glossary-terms-from-week-3_instructions.html | 3.8 KB |
| 03_weekly-challenge-3_exam.html | 9.3 KB |
| 01_welcome-to-week-4.en.srt | 1.5 KB |
| 01_welcome-to-week-4.en.txt | 929 bytes |
| 01_welcome-to-week-4.mp4 | 3.8 MB |
| 02_security-hardening.en.srt | 4.6 KB |
| 02_security-hardening.en.txt | 2.9 KB |
| 02_security-hardening.mp4 | 12.2 MB |
| 01_os-hardening-practices.en.srt | 7.5 KB |
| 01_os-hardening-practices.en.txt | 4.0 KB |
| 01_os-hardening-practices.mp4 | 18.0 MB |
| 02_brute-force-attacks-and-os-hardening_instructions.html | 8.1 KB |
| 03_activity-apply-os-hardening-techniques_quiz.html | 1.3 KB |
| 04_test-your-knowledge-os-hardening_quiz.html | 3.7 KB |
| 01_network-hardening-practices.en.srt | 6.2 KB |
| 01_network-hardening-practices.en.txt | 3.3 KB |
| 01_network-hardening-practices.mp4 | 16.9 MB |
| 02_network-security-applications_instructions.html | 2.9 MB |
| 03_activity-analysis-of-network-hardening_quiz.html | 1.2 KB |
| 04_test-your-knowledge-network-hardening_quiz.html | 3.8 KB |
| 01_network-security-in-the-cloud.en.srt | 2.8 KB |
| 01_network-security-in-the-cloud.en.txt | 1.8 KB |
| 01_network-security-in-the-cloud.mp4 | 9.7 MB |
| 02_kelsey-cloud-security-explained.en.srt | 3.8 KB |
| 02_kelsey-cloud-security-explained.en.txt | 2.3 KB |
| 02_kelsey-cloud-security-explained.mp4 | 21.9 MB |
| 03_secure-the-cloud_instructions.html | 9.0 KB |
| 04_test-your-knowledge-cloud-hardening_quiz.html | 3.6 KB |
| 01_wrap-up.en.srt | 1.6 KB |
| 01_wrap-up.en.txt | 909 bytes |
| 01_wrap-up.mp4 | 3.1 MB |
| 02_glossary-terms-from-week-4_instructions.html | 2.8 KB |
| 03_weekly-challenge-4_exam.html | 9.5 KB |
| 04_portfolio-activity-use-the-nist-cybersecurity-framework-to-respond-to-a-security_exam.html | 3.5 KB |
| 01_course-wrap-up.en.srt | 2.9 KB |
| 01_course-wrap-up.en.txt | 1.9 KB |
| 01_course-wrap-up.mp4 | 6.6 MB |
| 02_course-3-glossary_Course_3_glossary.docx | 857.6 KB |
| 02_course-3-glossary_instructions.html | 6.4 KB |
| 03_get-started-on-the-next-course_instructions.html | 786.5 KB |
| 01__resources.html | 18.6 KB |
| 01__Google_Cybersecurity_Certificate_glossary.docx | 879.3 KB |
| 01__resources.html | 6.5 KB |
| 01__Course_3_glossary.docx | 857.6 KB |
| 01__resources.html | 6.4 KB |
| 01__7.1 | 11.7 KB |
| 01__7.2 | 7.5 KB |
| 01__aa494182vexchg.140 | 33.9 KB |
| 01__article.asp | 62.8 KB |
| 01__index.html | 22.9 KB |
| 01__resources.html | 17.6 KB |
| 01__sp800-179r1-draft.pdf | 1.8 MB |
| 01__what-is-a-firewall.html | 61.3 KB |
| 01__resources.html | 16.0 KB |
| 01__resources.html | 8.8 KB |
| 01_introduction-to-course-8.en.srt | 3.8 KB |
| 01_introduction-to-course-8.en.txt | 2.4 KB |
| 01_introduction-to-course-8.mp4 | 13.1 MB |
| 02_course-8-overview_instructions.html | 1.4 MB |
| 03_dion-my-personal-career-journey.en.srt | 3.7 KB |
| 03_dion-my-personal-career-journey.en.txt | 2.3 KB |
| 03_dion-my-personal-career-journey.mp4 | 16.9 MB |
| 04_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx | 879.3 KB |
| 04_helpful-resources-and-tips_instructions.html | 11.2 KB |
| 01_welcome-to-week-1.en.srt | 1.0 KB |
| 01_welcome-to-week-1.en.txt | 545 bytes |
| 01_welcome-to-week-1.mp4 | 1.8 MB |
| 02_security-as-a-mindset.en.srt | 5.1 KB |
| 02_security-as-a-mindset.en.txt | 2.7 KB |
| 02_security-as-a-mindset.mp4 | 16.9 MB |
| 03_data-and-asset-classification_instructions.html | 5.7 KB |
| 01_detect-and-protect-without-neglect.en.srt | 5.7 KB |
| 01_detect-and-protect-without-neglect.en.txt | 3.1 KB |
| 01_detect-and-protect-without-neglect.mp4 | 18.6 MB |
| 02_disaster-recovery-and-business-continuity_instructions.html | 5.5 KB |
| 03_julianas-story-asset-protection_instructions.html | 5.0 KB |
| 01_wrap-up.en.srt | 1.5 KB |
| 01_wrap-up.en.txt | 1018 bytes |
| 01_wrap-up.mp4 | 4.1 MB |
| 02_glossary-terms-from-week-1_instructions.html | 2.3 KB |
| 01_welcome-to-week-2.en.srt | 2.3 KB |
| 01_welcome-to-week-2.en.txt | 1.2 KB |
| 01_welcome-to-week-2.mp4 | 6.1 MB |
| 02_the-importance-of-escalation.en.srt | 6.6 KB |
| 02_the-importance-of-escalation.en.txt | 3.6 KB |
| 02_the-importance-of-escalation.mp4 | 19.0 MB |
| 03_escalate-with-a-purpose_instructions.html | 4.8 KB |
| 01_prepare-to-escalate-through-security-recognition.en.srt | 5.6 KB |
| 01_prepare-to-escalate-through-security-recognition.en.txt | 2.9 KB |
| 01_prepare-to-escalate-through-security-recognition.mp4 | 17.3 MB |
| 02_recognize-roles-and-responsibilities-during-escalation_instructions.html | 4.3 KB |
| 01_from-simple-activity-to-major-data-breach.en.srt | 5.5 KB |
| 01_from-simple-activity-to-major-data-breach.en.txt | 2.9 KB |
| 01_from-simple-activity-to-major-data-breach.mp4 | 18.3 MB |
| 02_when-and-how-to-escalate-a-security-incident.en.srt | 3.4 KB |
| 02_when-and-how-to-escalate-a-security-incident.en.txt | 2.1 KB |
| 02_when-and-how-to-escalate-a-security-incident.mp4 | 12.8 MB |
| 03_escalation-timing_instructions.html | 5.5 KB |
| 04_julianas-story-attention-to-detail_instructions.html | 4.8 KB |
| 01_wrap-up.en.srt | 1.6 KB |
| 01_wrap-up.en.txt | 1.0 KB |
| 01_wrap-up.mp4 | 4.5 MB |
| 02_glossary-terms-from-week-2_instructions.html | 2.4 KB |
| 01_welcome-to-week-3.en.srt | 1.2 KB |
| 01_welcome-to-week-3.en.txt | 715 bytes |
| 01_welcome-to-week-3.mp4 | 3.7 MB |
| 02_stakeholders-in-cybersecurity.en.srt | 6.8 KB |
| 02_stakeholders-in-cybersecurity.en.txt | 3.6 KB |
| 02_stakeholders-in-cybersecurity.mp4 | 15.1 MB |
| 03_the-purpose-and-impact-of-stakeholders_instructions.html | 5.6 KB |
| 01_clear-and-concise-communication.en.srt | 3.7 KB |
| 01_clear-and-concise-communication.en.txt | 2.0 KB |
| 01_clear-and-concise-communication.mp4 | 12.1 MB |
| 02_building-blocks-of-cybersecurity-communications.en.srt | 5.8 KB |
| 02_building-blocks-of-cybersecurity-communications.en.txt | 3.1 KB |
| 02_building-blocks-of-cybersecurity-communications.mp4 | 17.0 MB |
| 03_communicate-effectively-with-stakeholders_instructions.html | 5.0 KB |
| 01_visual-storytelling-in-cybersecurity.en.srt | 3.8 KB |
| 01_visual-storytelling-in-cybersecurity.en.txt | 2.4 KB |
| 01_visual-storytelling-in-cybersecurity.mp4 | 16.1 MB |
| 02_create-visual-dashboards-for-impactful-cybersecurity-communications_instructions.html | 5.0 KB |
| 03_how-to-create-a-visual-dashboard.en.srt | 5.2 KB |
| 03_how-to-create-a-visual-dashboard.en.txt | 3.1 KB |
| 03_how-to-create-a-visual-dashboard.mp4 | 18.1 MB |
| 04_julianas-story-effective-communication_instructions.html | 4.5 KB |
| 01_wrap-up.en.srt | 2.9 KB |
| 01_wrap-up.en.txt | 1.5 KB |
| 01_wrap-up.mp4 | 9.0 MB |
| 02_glossary-terms-from-week-3_instructions.html | 1.3 KB |
| 01_welcome-to-week-4.en.srt | 2.2 KB |
| 01_welcome-to-week-4.en.txt | 1.4 KB |
| 01_welcome-to-week-4.mp4 | 6.8 MB |
| 02_helpful-cybersecurity-resources.en.srt | 4.2 KB |
| 02_helpful-cybersecurity-resources.en.txt | 2.2 KB |
| 02_helpful-cybersecurity-resources.mp4 | 15.3 MB |
| 03_strategies-for-engaging-with-the-cybersecurity-community_instructions.html | 5.5 KB |
| 04_victoria-continue-your-learning-journey.en.srt | 3.9 KB |
| 04_victoria-continue-your-learning-journey.en.txt | 2.5 KB |
| 04_victoria-continue-your-learning-journey.mp4 | 15.4 MB |
| 01_engage-with-the-cybersecurity-community-in-a-meaningful-way.en.srt | 4.7 KB |
| 01_engage-with-the-cybersecurity-community-in-a-meaningful-way.en.txt | 3.1 KB |
| 01_engage-with-the-cybersecurity-community-in-a-meaningful-way.mp4 | 14.7 MB |
| 02_connect-with-other-cybersecurity-professionals_instructions.html | 4.2 KB |
| 03_sarah-network-in-the-cybersecurity-community.en.srt | 3.5 KB |
| 03_sarah-network-in-the-cybersecurity-community.en.txt | 2.2 KB |
| 03_sarah-network-in-the-cybersecurity-community.mp4 | 10.3 MB |
| 01_wrap-up.en.srt | 1.4 KB |
| 01_wrap-up.en.txt | 856 bytes |
| 01_wrap-up.mp4 | 3.8 MB |
| 02_glossary-terms-from-week-4_instructions.html | 1.1 KB |
| 01_welcome-to-week-5.en.srt | 2.6 KB |
| 01_welcome-to-week-5.en.txt | 1.5 KB |
| 01_welcome-to-week-5.mp4 | 7.5 MB |
| 02_find-cybersecurity-jobs.en.srt | 5.5 KB |
| 02_find-cybersecurity-jobs.en.txt | 3.0 KB |
| 02_find-cybersecurity-jobs.mp4 | 16.3 MB |
| 03_create-a-resume.en.srt | 6.2 KB |
| 03_create-a-resume.en.txt | 3.9 KB |
| 03_create-a-resume.mp4 | 11.9 MB |
| 04_tips-for-finding-and-applying-for-a-job_instructions.html | 4.2 KB |
| 05_garvey-cover-letter-tips.en.srt | 5.0 KB |
| 05_garvey-cover-letter-tips.en.txt | 3.0 KB |
| 05_garvey-cover-letter-tips.mp4 | 11.6 MB |
| 01_explore-the-interview-process.en.srt | 6.4 KB |
| 01_explore-the-interview-process.en.txt | 3.4 KB |
| 01_explore-the-interview-process.mp4 | 14.0 MB |
| 02_the-interview-process_instructions.html | 5.3 KB |
| 03_garvey-technical-interview-tips.en.srt | 4.6 KB |
| 03_garvey-technical-interview-tips.en.txt | 2.9 KB |
| 03_garvey-technical-interview-tips.mp4 | 11.2 MB |
| 04_prepare-for-technical-interviews_instructions.html | 5.6 KB |
| 05_conduct-pre-interview-research.en.srt | 5.0 KB |
| 05_conduct-pre-interview-research.en.txt | 2.7 KB |
| 05_conduct-pre-interview-research.mp4 | 12.6 MB |
| 06_build-rapport-with-interviewers.en.srt | 6.0 KB |
| 06_build-rapport-with-interviewers.en.txt | 3.2 KB |
| 06_build-rapport-with-interviewers.mp4 | 13.6 MB |
| 01_use-strategies-to-answer-interview-questions.en.srt | 4.3 KB |
| 01_use-strategies-to-answer-interview-questions.en.txt | 2.8 KB |
| 01_use-strategies-to-answer-interview-questions.mp4 | 12.0 MB |
| 02_apply-the-star-method-during-interviews_instructions.html | 51.0 KB |
| 03_prepare-for-interviews_instructions.html | 5.5 KB |
| 03_prepare-for-interviews_vol01iss13.cfm | 45.5 KB |
| 04_ask-the-interviewer-questions.en.srt | 2.5 KB |
| 04_ask-the-interviewer-questions.en.txt | 1.6 KB |
| 04_ask-the-interviewer-questions.mp4 | 7.9 MB |
| 05_karan-interview-tips-from-a-hiring-manager.en.srt | 4.9 KB |
| 05_karan-interview-tips-from-a-hiring-manager.en.txt | 2.6 KB |
| 05_karan-interview-tips-from-a-hiring-manager.mp4 | 18.5 MB |
| 06_prepare-for-interviews-with-interview-warmup_instructions.html | 183.1 KB |
| 01_develop-an-elevator-pitch.en.srt | 4.5 KB |
| 01_develop-an-elevator-pitch.en.txt | 2.9 KB |
| 01_develop-an-elevator-pitch.mp4 | 13.0 MB |
| 02_learn-more-about-developing-an-elevator-pitch_instructions.html | 5.0 KB |
| 03_tips-for-interviewing-remotely_instructions.html | 5.6 KB |
| 04_emily-overcome-imposter-syndrome.en.srt | 4.7 KB |
| 04_emily-overcome-imposter-syndrome.en.txt | 2.6 KB |
| 04_emily-overcome-imposter-syndrome.mp4 | 13.9 MB |
| 01_wrap-up.en.srt | 1.1 KB |
| 01_wrap-up.en.txt | 586 bytes |
| 01_wrap-up.mp4 | 2.0 MB |
| 02_glossary-terms-from-week-5_instructions.html | 1.4 KB |
| 03_course-wrap-up.en.srt | 1.8 KB |
| 03_course-wrap-up.en.txt | 1.1 KB |
| 03_course-wrap-up.mp4 | 2.7 MB |
| 04_course-8-glossary_Course_8_glossary.docx | 1.1 MB |
| 04_course-8-glossary_instructions.html | 6.4 KB |
| 01_recap-of-the-google-cybersecurity-certificate-program.en.srt | 3.9 KB |
| 01_recap-of-the-google-cybersecurity-certificate-program.en.txt | 2.1 KB |
| 01_recap-of-the-google-cybersecurity-certificate-program.mp4 | 8.8 MB |
| 02_congratulations-on-completing-the-google-cybersecurity-certificate-program.en.srt | 2.8 KB |
| 02_congratulations-on-completing-the-google-cybersecurity-certificate-program.en.txt | 1.4 KB |
| 02_congratulations-on-completing-the-google-cybersecurity-certificate-program.mp4 | 9.4 MB |
| 03_showcase-your-work_instructions.html | 899.2 KB |
| 03_showcase-your-work_overview.html | 636.5 KB |
| 04_claim-your-google-cybersecurity-certificate-badge_instructions.html | 4.5 KB |
| 05_google-cybersecurity-certificate-glossary_Google_Cybersecurity_Certificate_glossary.docx | 879.3 KB |
| 05_google-cybersecurity-certificate-glossary_instructions.html | 6.5 KB |
| 01__resources.html | 18.6 KB |
| 01__Course_8_glossary.docx | 1.1 MB |
| 01__resources.html | 6.4 KB |
| 01__R0239.pdf | 220.6 KB |
| 01__nist.sp.800-61r2.pdf | 1.5 MB |
| 01__overview.html | 636.5 KB |
| 01__resources.html | 11.5 KB |
| 01__vol01iss13.cfm | 45.5 KB |
| 01__Google_Cybersecurity_Certificate_glossary.docx | 879.3 KB |
| 01__resources.html | 6.5 KB |
| 01__resources.html | 16.0 KB |
| 01__resources.html | 8.7 KB |
Name
DL
Uploader
Size
S/L
Added
-
233.6 MB
[24
/
25]
2023-07-06
| Uploaded by FreeCourseWeb | Size 233.6 MB | Health [ 24 /25 ] | Added 2023-07-06 |
NOTE
SOURCE: Coursera Google Cybersecurity Professional Certificate
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


