Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Prepare for a new career in the high-growth field of cybersecurity, no degree or experience required. Get professional training designed and delivered by subject matter experts at Google and have the opportunity to connect with top employers.
Organizations must continuously protect themselves and the people they serve from cyber-related threats, like fraud and phishing. They rely on cybersecurity to maintain the confidentiality, integrity, and availability of their internal systems and information. Cybersecurity analysts use a collection of methods and technologies to safeguard against threats and unauthorized access — and to create and implement solutions should a threat get through.
During the 8 courses in this certificate program, you’ll learn from cybersecurity experts at Google and gain in-demand skills that prepare you for entry-level roles like cybersecurity analyst, security operations center (SOC) analyst, and more. At under 10 hours per week, you can complete the certificate in less than 6 months.
Upon completion of the certificate, you can directly apply for jobs with Google and over 150 U.S. employers, including American Express, Deloitte, Colgate-Palmolive, Mandiant (now part of Google Cloud), T-Mobile, and Walmart.
The Google Cybersecurity Certificate helps prepare you for the CompTIA Security+ exam, the industry leading certification for cybersecurity roles. You’ll earn a dual credential when you complete both.
Syllabus
Course 1: Foundations of Cybersecurity
- Offered by Google. This is the first course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need ... Enroll for free.
Course 2: Play It Safe: Manage Security Risks
- Offered by Google. This is the second course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need ... Enroll for free.
Course 3: Connect and Protect: Networks and Network Security
- Offered by Google. This is the third course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need ... Enroll for free.
Course 4: Tools of the Trade: Linux and SQL
- Offered by Google. This is the fourth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need ... Enroll for free.
Course 5: Assets, Threats, and Vulnerabilities
- Offered by Google. This is the fifth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need ... Enroll for free.
Course 6: Sound the Alarm: Detection and Response
- Offered by Google. This is the sixth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need ... Enroll for free.
Course 7: Automate Cybersecurity Tasks with Python
- Offered by Google. This is the seventh course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need ... Enroll for free.
Course 8: Put It to Work: Prepare for Cybersecurity Jobs
- Offered by Google. This is the eighth and final course in the Google Cybersecurity Certificate. Together, these eight courses will equip you ... Enroll for free.
- Offered by Google. This is the first course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need ... Enroll for free.
Course 2: Play It Safe: Manage Security Risks
- Offered by Google. This is the second course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need ... Enroll for free.
Course 3: Connect and Protect: Networks and Network Security
- Offered by Google. This is the third course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need ... Enroll for free.
Course 4: Tools of the Trade: Linux and SQL
- Offered by Google. This is the fourth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need ... Enroll for free.
Course 5: Assets, Threats, and Vulnerabilities
- Offered by Google. This is the fifth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need ... Enroll for free.
Course 6: Sound the Alarm: Detection and Response
- Offered by Google. This is the sixth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need ... Enroll for free.
Course 7: Automate Cybersecurity Tasks with Python
- Offered by Google. This is the seventh course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need ... Enroll for free.
Course 8: Put It to Work: Prepare for Cybersecurity Jobs
- Offered by Google. This is the eighth and final course in the Google Cybersecurity Certificate. Together, these eight courses will equip you ... Enroll for free.
Courses
-
This is the first course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to prepare for an entry-level cybersecurity job. In this course, you will be introduced to the world of cybersecurity through an interactive curriculum developed by Google. You will identify significant events that led to the development of the cybersecurity field, explain the importance of cybersecurity in today's business operations, and explore the job responsibilities and skills of an entry-level cybersecurity analyst. Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs. Learners who complete the eight courses in the Google Cybersecurity Certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Identify how security attacks impact business operations. - Explore the job responsibilities and core skills of an entry-level cybersecurity analyst. - Recognize how past and present attacks on organizations led to the development of the cybersecurity field. - Learn the CISSP eight security domains. - Identify security domains, frameworks, and controls. - Explain security ethics. - Recognize common tools used by cybersecurity analysts.
-
This is the fourth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the third Google Cybersecurity Certificate course. In this course, you will explore computing skills that you’ll use on-the-job as a cybersecurity analyst. First, you'll practice using Linux, an operating system commonly used by cybersecurity professionals. For example, you'll use the Linux command line through the Bash shell to navigate and manage the file system and authenticate users. Then, you'll use SQL to communicate with a database. Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs. Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Explain the relationship between operating systems, applications, and hardware. - Compare a graphical user interface to a command line interface. - Identify the unique features of common Linux distributions. - Navigate and manage the file system using Linux commands via the Bash shell. - Use Linux commands via the Bash shell to authenticate and authorize users. - Describe how a relational database is organized. - Use SQL to retrieve information from a database. - Apply filters to SQL queries and use joins to combine multiple tables.
-
This is the fifth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the fourth Google Cybersecurity Certificate course. In this course, you will explore the concepts of assets, threats, and vulnerabilities. First, you'll build an understanding of how assets are classified. Next, you will become familiar with common threats and vulnerabilities, and the security controls used by organizations to protect valuable information and mitigate risk. You will develop an attacker mindset by practicing the threat modeling process, and you'll learn tactics for staying ahead of security breaches. Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs. Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Learn effective data handling processes. - Discuss the role of encryption and hashing in securing assets. - Describe how to effectively use authentication and authorization. - Explain how common vulnerability exposures are identified by MITRE. - Analyze an attack surface to find risks and vulnerabilities. - Identify threats, such as social engineering, malware, and web-based exploits. - Summarize the threat modeling process.
-
This is the sixth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the fifth Google Cybersecurity Certificate course. In this course, you will focus on incident detection and response. You'll define a security incident and explain the incident response lifecycle, including the roles and responsibilities of incident response teams. You'll analyze and interpret network communications to detect security incidents using packet sniffing tools to capture network traffic. By assessing and analyzing artifacts, you'll explore the incident investigation and response processes and procedures. Additionally, you'll practice using Intrusion Detection Systems (IDS) and Security Information Event Management (SIEM) tools. Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs. Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Explain the lifecycle of an incident. - Describe the tools used in documentation, detection, and management of incidents. - Analyze packets to interpret network communications. - Perform artifact investigations to analyze and verify security incidents. - Identify the steps to contain, eradicate, and recover from an incident. - Determine how to read and analyze logs during incident investigation. - Interpret the basic syntax and components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools. - Perform queries in Security Information and Event Management (SIEM) tools to investigate an event.
-
This is the seventh course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the sixth Google Cybersecurity Certificate course. In this course, you will be introduced to the Python programming language and apply it in a cybersecurity setting to automate tasks. You'll start by focusing on foundational Python programming concepts, including data types, variables, conditional statements, and iterative statements. You'll also learn to work with Python effectively by developing functions, using libraries and modules, and making your code readable. In addition, you'll work with string and list data, and learn how to import, parse and debug files. Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs. Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Explain how the Python programming language is used in cybersecurity. - Write conditional and iterative statements in Python. - Create new, user-defined Python functions. - Use Python to work with strings and lists. - Use regular expressions to extract information from text. - Use Python to open and read the contents of a file. - Identify best practices to improve code readability. - Practice debugging code.
-
This is the eighth and final course in the Google Cybersecurity Certificate. Together, these eight courses will equip you with the skills you need to apply for an entry-level cybersecurity job. In this course, you will focus on making decisions and escalating incidents to stakeholders. You'll develop the communication and collaboration skills needed to inform and influence stakeholders within an organization. In addition, you'll explore how to ethically operate as a cybersecurity professional. You'll discover how to engage with the cybersecurity community, explore jobs in the cybersecurity field, and complete practice interviews. You'll also write a resume and cover letter to prepare for applying and interviewing for jobs in cybersecurity. Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs. Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Determine when and how to escalate a security incident. - Explain how having an ethical mindset supports a cybersecurity professional's ability to protect assets and data. - Communicate sensitive information with care and confidentiality. - Use reliable sources to remain current on the latest cybersecurity threats, risks, vulnerabilities, and tools. - Engage with the cybersecurity community. - Find and apply for cybersecurity jobs. - Prepare for job interviews.
-
This is the second course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the first Google Cybersecurity Certificate course. In this course, you will take a deeper dive into concepts introduced in the first course, with an emphasis on how cybersecurity professionals use frameworks and controls to protect business operations. In particular, you'll identify the steps of risk management and explore common threats, risks, and vulnerabilities. Additionally, you'll explore Security Information and Event Management (SIEM) data and use a playbook to respond to identified threats, risks, and vulnerabilities. Finally, you will take an important step towards becoming a cybersecurity professional and practice performing a security audit. Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs. Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Identify the common threats, risks, and vulnerabilities to business operations. - Understand the threats, risks, and vulnerabilities that entry-level cybersecurity analysts are most focused on. - Comprehend the purpose of security frameworks and controls. - Describe the confidentiality, integrity, and availability (CIA) triad. - Explain the National Institute of Standards and Technology (NIST) framework. - Explore and practice conducting a security audit. - Use a playbook to respond to threats, risks, and vulnerabilities.
-
This is the third course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the second Google Cybersecurity Certificate course. In this course, you will explore how networks connect multiple devices and allow them to communicate. You'll start with the fundamentals of modern networking operations and protocols. For example, you'll learn about the Transmission Control Protocol / Internet Protocol (TCP/IP) model and how network hardware, like routers and modems, allow your computer to send and receive information on the internet. Then, you'll learn about network security. Organizations often store and send valuable information on their networks, so networks are common targets of cyber attacks. By the end of this course, you'll be able to recognize network-level vulnerabilities, and explain how to secure a network using firewalls, system hardening, and virtual private networks. Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs. Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Describe the structure of different computer networks. - Illustrate how data is sent and received over a network. - Recognize common network protocols. - Identify common network security measures and protocols. - Explain how to secure a network against intrusion tactics. - Compare and contrast local networks to cloud computing. - Explain the different types of system hardening techniques.
Taught by
Google Career Certificates