Course Highlights
  • Recognize core skills and knowledge needed to become a cybersecurity analyst
  • Identify how security attacks impact business operations
  • Explain security ethics
  • Identify common tools used by cybersecurity analysts
Curriculum

26 Topics
Welcome to the Google Cybersecurity Certificate
Welcome to week 1
Introduction to cybersecurity
Toni: My path to cybersecurity
Responsibilities of an entry-level cybersecurity analyst
Nikki: A day in the life of a security engineer
Core skills for cybersecurity professionals
Veronica: My path to working in cybersecurity
The importance of cybersecurity
Wrap-up
Google Cybersecurity Certificate overview
Course 1 overview
Helpful resources and tips
Participate in program surveys
Common cybersecurity terminology
Transferable and technical cybersecurity skills
Glossary terms from module 1
Test your knowledge: Introduction to cybersecurity
Test your knowledge: Core skills for cybersecurity professionals
Module 1 challenge
Connect with your classmates
The value of cybersecurity
Your Google Cybersecurity Certificate roadmap
Commit to completing the program
Google Cybersecurity Certificate participant entry survey
Explore: Keep organizations secure

15 Topics
Welcome to module 2
Past cybersecurity attacks
Attacks in the digital age
Sean: Keep your cool during a data breach
Introduction to the eight CISSP security domains Part 1
Introduction to the eight CISSP security domains Part 2
Wrap-up
Common attacks and their effectiveness
Determine the type of attack
Understand attackers
Glossary terms from module 2
Test your knowledge: The history of cybersecurity
Test your knowledge: The eight CISSP security domains
Module 2 challenge
Identify: Methods of attack

15 Topics
Welcome to module 3
Introduction to security frameworks and controls
Secure design
Heather: Protect sensitive data and information
Ethics in cybersecurity
Holly: The importance of ethics as a cybersecurity professional
Wrap-up
Controls frameworks and compliance
Ethical concepts that guide cybersecurity decisions
Glossary terms from module 3
Test your knowledge: Frameworks and controls
Test your knowledge: Ethics in cybersecurity
Module 3 challenge
Use ethics to make decisions
Practice: Ethics for cybersecurity professionals

18 Topics
Welcome to module 4
Common cybersecurity tools
Introduction to Linux SQL and Python
Wrap-up
Course wrap-up
Tools for protecting business operations
Use tools to protect business operations
Create a cybersecurity portfolio
Portfolio Activity Exemplar: Draft a professional statement
Glossary terms from module 4
Course 1 glossary
Get started on the next course
Test your knowledge: Important cybersecurity tools
Test your knowledge: Core cybersecurity knowledge and skills
Portfolio Activity: Draft a professional statement
Module 4 challenge
Your Course 1 learning journey
Explore: Tools and their purposes

  Write a Review

Foundations of Cybersecurity

Go to Free Course