Langsung ke konten utama

Day 1 learning Google Cybersecurity at Coursera

This is my study notes. just for my personal notes and learn. 


Program Overview

- Core security concepts

- Security domains

- Network Security

- Computing basics

- Assets, threats, and vulnerability


- Incident detection and response

- Python

- Find and apply for jobs


By completing the eight courses in this certificate program, 

you'll prepare for entry-level jobs in cybersecurity

such as cybersecurity analyst, security analyst, 

and security operations center (SOC) analyst. 

No prior experience in cybersecurity is required to complete this program.


Throughout the program, you will have multiple opportunities to develop your cybersecurity knowledge and skills. You will explore concepts and scenarios to learn what an entry-level cybersecurity analyst must know and be able to do to thrive in the cybersecurity profession


Google Cybersecurity Certificate courses

The Google Cybersecurity Certificate has eight courses that focus and build upon core concepts and skills related to the daily work of cybersecurity professionals, including foundational cybersecurity models and frameworks that are used to mitigate risk; protecting networks and data; using programming to automate tasks; identifying and responding to security incidents; and communicating and collaborating with stakeholders. Additionally, you will apply what you’ve learned in each course by completing portfolio projects that can be used to showcase your understanding of essential cybersecurity concepts to potential employers. The courses of the program are as follows: 

  1. Foundations of Cybersecurity (current course) 

  2. Play It Safe: Manage Security Risks 

  3. Connect and Protect: Networks and Network Security 

  4. Tools of the Trade: Linux and SQL 

  5. Assets, Threats, and Vulnerabilities 

  6. Sound the Alarm: Detection and Response

  7. Automate Cybersecurity Tasks with Python 

  8. Put It to Work: Prepare for Cybersecurity Jobs


1. Foundations of Cybersecurity

In this course, you will:

  • Define the field of security
  • Recognize core skills and knowledge needed to become a security analyst
  • Identify how security attacks impact business operations
  • Identify eight security domains
  • Define security frameworks and controls

Skill sets:

  • Communicating effectively
  • Collaborating with others
  • Identifying threats, risks, and vulnerabilities
  • Problem-solving
  1. 2. Play It Safe: Manage Security Risks
  2. In this course, you will:

    • Recognize and explain the focus of eight security domains
    • Identify the steps of risk management
    • Describe the CIA triad
    • Identify security principles
    • Define and describe the purpose of a playbook
    • Explain how entry-level security analysts use SIEM dashboards

    Skill sets:

    • Applying the CIA triad to workplace situations
    • Analyzing log data
    • Identifying the phases of an incident response playbook
    3. Connect and Protect: Networks and Network Security
  3. In this course, you will:

    • Define types of networks
    • Explain how data is sent and received over a network
    • Recognize common network protocols
    • Compare and contrast local networks to cloud computing
    • Explain how to secure a network against intrusion tactics

    Skill sets:

    • Configuring a firewall
    • Recognizing components of computer networks and cloud computing
    • Analyzing threats
    • Implementing security hardening
    4. Tools of the Trade: Linux and SQL

In this course, you will:

  • Describe the main functions of an operating system
  • Explain the relationship between operating systems, applications, and hardware
  • Compare a graphical user interface to a command line interface
  • Navigate the file system using Linux commands via the Bash shell
  • Use SQL to retrieve information from a database

Skill sets:

  • Interacting with both a graphical user interface (GUI) and command line interface (CLI)
  • Querying a database with SQL
  • Filtering on a particular word with the Linux command line
  • Authenticating and authorizing users with the Linux command line
5. Assets, Threats, and Vulnerabilities

In this course, you will:

  • Explain security’s role in mitigating organizational risk
  • Describe the defense in depth strategy
  • Explain how vulnerability assessments are used to assess potential risk
  • Develop an attacker mindset to recognize threats
  • Discuss the role encryption and hashing play in securing assets
  • Identify forms of social engineering, malware, and web-based exploits

Skill sets:

  • Classifying assets
  • Decrypting a message
  • Searching the CVE database for vulnerable applications
  • Analyzing attack surfaces
  • Applying the PASTA threat modeling framework
6. Sound the Alarm: Detection and Response

In this course, you will:

  • Explain the lifecycle of an incident
  • Use packet sniffing tools to capture and view network communications
  • Perform artifact investigations to analyze and verify security incidents
  • Identify the steps to contain, eradicate, and recover from an incident
  • Interpret the basic syntax and components of signatures and logs in IDS and NIDS tools

Skill sets:

  • Capturing, viewing, and analyzing a packet
  • Investigating a suspicious hash file
  • Following a playbook
  • Examining alerts, logs, and rules
  • Performing queries with SIEM tools
7. Automate Cybersecurity Tasks with Python

In this course, you will:

  • Explain how the Python programming language is used in security
  • Write a simple algorithm
  • Use regular expressions in Python to extract information from text
  • Use Python to automate tasks performed by security professionals
  • Use Python to parse a file

Skill sets:

  • Working with strings and their index values
  • Applying regular expressions (regex)
  • Importing and parsing a file
  • Debugging code
8. Put It to Work: Prepare for Cybersecurity Jobs

In this course, you will:

  • Define stakeholders and describe their security roles
  • Communicate sensitive information with care and confidentiality
  • Identify reliable sources within the security community
  • Determine opportunities to become engaged with the security community
  • Determine ways to establish and advance a career in security, by engaging with the security community
  • Find, apply for, and prepare for job interviews

Skill sets:

  • Creating a dashboard
  • Creating or updating a resume
  • Using the STAR method for interview questions
  • Drafting an elevator pitch
Organizations must prepare for the storm by ensuring they 
have the tools to mitigate and 
quickly respond to outside threats. 
The objective is to minimize risk and potential damage.

definitions: 
Cybersecurity, or security, is the practice 
of ensuring confidentiality, integrity, 
and availability of information 
by protecting networks, devices, 
people, and data from 
unauthorized access or criminal exploitation

Benefits of security :
- Protects against external dan internal threats
- Meets regulatory compliance
- Maintains and improves business productivity
- Reduces expenses
- Maintans brand trust

Security analysts are responsible for 
monitoring and protecting information and systems.

Responsibilites of a security analyst :
- Protecting computer and network systems
- Installing prevention software
- Conducting periodic security audits.

 

Komentar

Postingan populer dari blog ini

HOW TO FIX : ERROR:gpu_init.cc(426) Passthrough is not supported, GL is disabled in VS Code Python Selenium ChromeDriver Pytest

HOW TO FIX : ERROR:gpu_init.cc(426) Passthrough is not supported, GL is disabled in VS Code Python Selenium ChromeDriver Pytest have you ever experienced an error like the one below when using pytest, python selenium chromedriver? [14184:2436:0319/060520.198:ERROR:gpu_init.cc(440)] Passthrough is not supported, GL is disabled, ANGLE is [7108:12512:0319/060620.351:ERROR:device_event_log_impl.cc(214)] [06:06:20.350] USB: usb_device_handle_win.cc:1049 Failed to read descriptor from node connection: A device attached to the system is not functioning. (0x1F) [7108:12512:0319/060620.356:ERROR:device_event_log_impl.cc(214)] [06:06:20.356] USB: usb_device_handle_win.cc:1049 Failed to read descriptor from node connection: A device attached to the system is not functioning. (0x1F) [7108:12512:0319/060620.357:ERROR:device_event_log_impl.cc(214)] [06:06:20.357] USB: usb_device_handle_win.cc:1049 Failed to read descriptor from node connection: A device attached to the system is not functioning....

0.0.0.0 Python Essentials - About the Curriculum

About the course curriculum PCAP: Programming Essentials in Python  (short form:  Python Essentials ) is a two-course series that covers all the basics of programming in Python, as well as general computer programming concepts and techniques, and the object-oriented approach. The Python Essentials course series is divided into two parts: Python Essentials 1 (PE1): BASICS , consisting of four modules; Python Essentials 2 (PE2): INTERMEDIATE , consisting of four modules. Each student has access to  hands-on practice materials ,  labs ,  quizzes , and  tests  to learn how to utilize the skills and knowledge gained on the course and interact with some  real-life programming tasks and situations . Students who complete the course will be able to accomplish coding tasks related to the basics of programming in the Python language, and to understand the fundamental notions and techniques used in object-oriented programming. Furthermore, they will be ready...

Python Essentials 1 - Module 1

  Python Essentials 1: Module 1 Introduction to Python and computer programming In this module, you will learn about: the fundamentals of computer programming, i.e., how the computer works, how the program is executed, how the programming language is defined and constructed; the difference between compilation and interpretation what Python is, how it is positioned among other programming languages, and what distinguishes the different versions of Python. How does a computer program work? This course aims to show you what the Python language is and what it is used for. Let's start from the absolute basics. A program makes a computer usable. Without a program, a computer, even the most powerful one, is nothing more than an object. Similarly, without a player, a piano is nothing more than a wooden box. Computers are able to perform very complex tasks, but this ability is not innate. A computer's nature is quite different. It can execute only extremely simple operations. For exampl...