When you enroll in this course, you'll also be enrolled in this Professional Certificate.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate from Google
There are 4 modules in this course
This is the first course in the Google Cybersecurity Certificate. In this course, learners will be introduced to the cybersecurity profession, including the primary job responsibilities and core skills of entry-level analysts; significant events that led to the development of the cybersecurity field; and security’s continued importance to organizational operations. Learners will also explore the Certified Information Systems Security Professional (CISSP) eight security domains, common security frameworks and controls, as well as the confidentiality, integrity, and availability (CIA) triad. This course covers a wide variety of cybersecurity topics to provide an overview of what’s to come in this certificate program. Learners who complete the eight courses in the Google Cybersecurity Certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary.
By the end of this course, you will:
- Identify how security attacks impact business operations.
- Explore the job responsibilities and core skills of an entry-level cybersecurity analyst.
- Recognize how past and present attacks on organizations led to the development of the cybersecurity field.
- Learn the CISSP eight security domains.
- Identify security domains, frameworks, and controls.
- Explain security ethics.
- Recognize common tools used by cybersecurity analysts.
This module provides an overview of Course 1 and provides an introduction to the security certificate program. It introduces the instructor, Coursera platform, content types, learning procedures, and gives learners the opportunity to meet one another. It defines the field of security, describes the primary job responsibilities of those who work in the field, and highlights core skills. Finally, Module 1 offers guidance to learners who are interested in starting careers in the field of security.
What's included
11 videos6 readings4 assignments2 plugins
Show info about module content
11 videos•Total 36 minutes
Welcome to the Google Cybersecurity Certificate•9 minutes
Welcome to module 1•1 minute
Get started with your Google Cybersecurity Certificate•2 minutes
Introduction to cybersecurity•5 minutes
Toni: My path to cybersecurity•3 minutes
Responsibilities of an entry-level cybersecurity analyst•3 minutes
Nikki: A day in the life of a security engineer•2 minutes
Core skills for cybersecurity professionals•4 minutes
Veronica: My path to working in cybersecurity•2 minutes
The importance of cybersecurity•3 minutes
Wrap-up•1 minute
6 readings•Total 28 minutes
Google Cybersecurity Certificate overview•2 minutes
Course 1 overview•4 minutes
Helpful resources and tips•4 minutes
Common cybersecurity terminology•8 minutes
Transferable and technical cybersecurity skills •8 minutes
Glossary terms from module 1•2 minutes
4 assignments•Total 91 minutes
Spot the Phish•30 minutes
Test your knowledge: Introduction to cybersecurity•8 minutes
Test your knowledge: Core skills for cybersecurity professionals•8 minutes
Module 1 challenge •45 minutes
2 plugins•Total 20 minutes
Google Cybersecurity Certificate participant entry survey•10 minutes
Explore: Keep organizations secure•10 minutes
The evolution of cybersecurity
Module 2•2 hours to complete
Module details
This module offers an overview of how security threats have appeared and evolved alongside the mainstream adoption of computers and subsequent explosion of the Internet. It also discusses how past and present attacks have influenced the development of the security field. Additionally, the module provides a high-level overview of eight security domains
What's included
7 videos4 readings3 assignments1 plugin
Show info about module content
7 videos•Total 22 minutes
Welcome to module 2•1 minute
Past cybersecurity attacks•4 minutes
Attacks in the digital age•5 minutes
Sean: Keep your cool during a data breach•2 minutes
Introduction to the eight CISSP security domains, Part 1•4 minutes
Introduction to the eight CISSP security domains, Part 2•4 minutes
Wrap-up•2 minutes
4 readings•Total 32 minutes
Common attacks and their effectiveness•12 minutes
Determine the type of attack•8 minutes
Understand attackers•8 minutes
Glossary terms from module 2•4 minutes
3 assignments•Total 66 minutes
Test your knowledge: The history of cybersecurity•8 minutes
Test your knowledge: The eight CISSP security domains•8 minutes
Module 2 challenge •50 minutes
1 plugin•Total 10 minutes
Identify: Methods of attack•10 minutes
Protect against threats, risks, and vulnerabilities
Module 3•2 hours to complete
Module details
This module offers an overview of security frameworks and controls, and how they are used to mitigate organizational risk. It also covers the CIA triad and various NIST frameworks. Additionally, the module provides an explanation of security ethics.
What's included
7 videos3 readings3 assignments1 plugin
Show info about module content
7 videos•Total 22 minutes
Welcome to module 3•3 minutes
Introduction to security frameworks and controls•5 minutes
Secure design •4 minutes
Heather: Protect sensitive data and information•3 minutes
Ethics in cybersecurity•5 minutes
Holly: The importance of ethics as a cybersecurity professional•3 minutes
Wrap-up •1 minute
3 readings•Total 28 minutes
Controls, frameworks, and compliance•12 minutes
Ethical concepts that guide cybersecurity decisions•12 minutes
Glossary terms from module 3•4 minutes
3 assignments•Total 66 minutes
Test your knowledge: Frameworks and controls•8 minutes
Test your knowledge: Ethics in cybersecurity•8 minutes
Module 3 challenge •50 minutes
1 plugin•Total 10 minutes
Practice: Ethics for cybersecurity professionals •10 minutes
Cybersecurity tools and programming languages
Module 4•3 hours to complete
Module details
This module offers an overview of common tools used by security analysts to help identify and eliminate risk. It covers SIEM tools, network protocol analyzers, and how security analysts may use programming languages such as SQL and Python.
What's included
5 videos8 readings4 assignments1 plugin
Show info about module content
5 videos•Total 11 minutes
Welcome to module 4 •1 minute
Common cybersecurity tools•4 minutes
Introduction to Linux, SQL, and Python•3 minutes
Wrap-up •1 minute
Course wrap-up •2 minutes
8 readings•Total 52 minutes
Tools for protecting business operations•12 minutes
Use tools to protect business operations•12 minutes
Create a cybersecurity portfolio •12 minutes
Portfolio Activity Exemplar: Draft a professional statement•4 minutes
Glossary terms from module 4•2 minutes
Join the community•4 minutes
Course 1 glossary•2 minutes
Get started on the next course•4 minutes
4 assignments•Total 91 minutes
Test your knowledge: Important cybersecurity tools•8 minutes
Test your knowledge: Core cybersecurity knowledge and skills•8 minutes
Portfolio Activity: Draft a professional statement•30 minutes
Module 4 challenge •45 minutes
1 plugin•Total 10 minutes
Explore: Tools and their purposes•10 minutes
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor
Instructor ratings
Instructor ratings
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
Grow with Google is an initiative that draws on Google's decades-long history of building products, platforms, and services that help people and businesses grow. We aim to help everyone – those who make up the workforce of today and the students who will drive the workforce of tomorrow – access the best of Google’s training and tools to grow their skills, careers, and businesses.
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Learner reviews
4.8
41,480 reviews
5 stars
87.68%
4 stars
10.41%
3 stars
1.20%
2 stars
0.27%
1 star
0.41%
Showing 3 of 41480
K
KB
5·
Reviewed on Jul 27, 2023
The course is well paced and they get you comfortable with the topics even though we do not have any sort of prior exposure in this field. It is very good for the beginners who are new to this field
A
AK
5·
Reviewed on Apr 11, 2024
this is a good course for beginners who just start their carrier in cybersecurity and when you go further with it, it would become more interesting because of the exercises and hands on practices.
E
EF
4·
Reviewed on Mar 4, 2024
Had some technical issues but the overall layout, pace, and experience is more than worth it. The course offered solid information with a flexible presentation that allows you to learn when you want.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Certificate?
When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.