:Search:

Coursera Google Cybersecurity Professional Certificate

Torrent:
Info Hash: FEFA0EA64A939F45215B17E226DBA7EBB2C1B171
Similar Posts:
Uploader: Fclab
Source: 1 Logo 1337x
Downloads: 3566
Type: Tutorials
Language: English
Category: Other
Size: 3.8 GB
Added: Oct. 22, 2023, 5:30 a.m.
Peers: Seeders: 21, Leechers: 0 (Last updated: 3 months, 1 week ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://tracker.therarbg.to:6969/announce 0 0 0
udp://tracker.opentrackr.org:1337/announce 9 0 3201
udp://open.demonoid.ch:6969/announce 2 0 10
udp://open.demonii.com:1337/announce 2 0 10
udp://open.stealth.si:80/announce 4 0 337
udp://explodie.org:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://exodus.desync.com:6969/announce 1 0 0
udp://wepzone.net:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker1.myporn.club:9337/announce 2 0 8
udp://tracker.srv00.com:6969/announce 1 0 0
Files:
  1. [CourserHub.com].url 123 bytes
  2. Readme.txt 51 bytes
  3. 01_introduction-to-course-5.en.srt 4.4 KB
  4. 01_introduction-to-course-5.en.txt 2.8 KB
  5. 01_introduction-to-course-5.mp4 16.1 MB
  6. 02_course-5-overview_instructions.html 1.3 MB
  7. 03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 879.3 KB
  8. 03_helpful-resources-and-tips_instructions.html 11.3 KB
  9. 04_da-queshia-my-path-to-cybersecurity.en.srt 4.4 KB
  10. 04_da-queshia-my-path-to-cybersecurity.en.txt 2.3 KB
  11. 04_da-queshia-my-path-to-cybersecurity.mp4 13.9 MB
  12. 01_welcome-to-week-1.en.srt 3.3 KB
  13. 01_welcome-to-week-1.en.txt 2.1 KB
  14. 01_welcome-to-week-1.mp4 10.2 MB
  15. 02_the-what-why-and-how-of-asset-security.en.srt 6.9 KB
  16. 02_the-what-why-and-how-of-asset-security.en.txt 4.3 KB
  17. 02_the-what-why-and-how-of-asset-security.mp4 20.8 MB
  18. 03_understand-risks-threats-and-vulnerabilities_instructions.html 6.4 KB
  19. 04_tri-life-in-asset-security.en.srt 3.8 KB
  20. 04_tri-life-in-asset-security.en.txt 2.3 KB
  21. 04_tri-life-in-asset-security.mp4 17.0 MB
  22. 05_security-starts-with-asset-classification.en.srt 6.6 KB
  23. 05_security-starts-with-asset-classification.en.txt 3.6 KB
  24. 05_security-starts-with-asset-classification.mp4 16.9 MB
  25. 06_common-classification-requirements_instructions.html 106.3 KB
  26. 01_assets-in-a-digital-world.en.srt 6.6 KB
  27. 01_assets-in-a-digital-world.en.txt 3.5 KB
  28. 01_assets-in-a-digital-world.mp4 18.0 MB
  29. 02_the-emergence-of-cloud-security_instructions.html 141.3 KB
  30. 01_elements-of-a-security-plan.en.srt 6.2 KB
  31. 01_elements-of-a-security-plan.en.txt 4.0 KB
  32. 01_elements-of-a-security-plan.mp4 20.2 MB
  33. 02_the-nist-cybersecurity-framework.en.srt 5.8 KB
  34. 02_the-nist-cybersecurity-framework.en.txt 3.6 KB
  35. 02_the-nist-cybersecurity-framework.mp4 20.3 MB
  36. 03_security-guidelines-in-action_Commercial_Facilities_Sector_Cybersecurity_Framework_Implementation_Guidance_FINAL_508.pdf 1.5 MB
  37. 03_security-guidelines-in-action_instructions.html 472.5 KB
  38. 01_wrap-up.en.srt 3.0 KB
  39. 01_wrap-up.en.txt 1.6 KB
  40. 01_wrap-up.mp4 6.8 MB
  41. 02_glossary-terms-from-week-1_instructions.html 3.4 KB
  42. 01_welcome-to-week-2.en.srt 3.1 KB
  43. 01_welcome-to-week-2.en.txt 1.7 KB
  44. 01_welcome-to-week-2.mp4 9.8 MB
  45. 02_security-controls.en.srt 5.2 KB
  46. 02_security-controls.en.txt 3.3 KB
  47. 02_security-controls.mp4 19.6 MB
  48. 03_principle-of-least-privilege_instructions.html 7.7 KB
  49. 04_information-privacy-regulations-and-compliance_instructions.html 129.2 KB
  50. 05_heather-the-importance-of-protecting-pii.en.srt 3.3 KB
  51. 05_heather-the-importance-of-protecting-pii.en.txt 1.8 KB
  52. 05_heather-the-importance-of-protecting-pii.mp4 14.5 MB
  53. 01_fundamentals-of-cryptography.en.srt 5.9 KB
  54. 01_fundamentals-of-cryptography.en.txt 3.8 KB
  55. 01_fundamentals-of-cryptography.mp4 22.6 MB
  56. 02_public-key-infrastructure.en.srt 8.7 KB
  57. 02_public-key-infrastructure.en.txt 4.5 KB
  58. 02_public-key-infrastructure.mp4 21.2 MB
  59. 03_symmetric-and-asymmetric-encryption_instructions.html 9.2 KB
  60. 04_resources-for-completing-labs_instructions.html 108.5 KB
  61. 05_non-repudiation-and-hashing.en.srt 5.0 KB
  62. 05_non-repudiation-and-hashing.en.txt 3.1 KB
  63. 05_non-repudiation-and-hashing.mp4 13.5 MB
  64. 06_the-evolution-of-hash-functions_instructions.html 585.4 KB
  65. 01_access-controls-and-authentication-systems.en.srt 6.2 KB
  66. 01_access-controls-and-authentication-systems.en.txt 3.9 KB
  67. 01_access-controls-and-authentication-systems.mp4 18.3 MB
  68. 02_the-rise-of-sso-and-mfa_instructions.html 369.5 KB
  69. 03_the-mechanisms-of-authorization.en.srt 8.1 KB
  70. 03_the-mechanisms-of-authorization.en.txt 4.3 KB
  71. 03_the-mechanisms-of-authorization.mp4 25.2 MB
  72. 04_why-we-audit-user-activity.en.srt 5.5 KB
  73. 04_why-we-audit-user-activity.en.txt 2.9 KB
  74. 04_why-we-audit-user-activity.mp4 16.2 MB
  75. 05_tim-finding-purpose-in-protecting-assets.en.srt 2.0 KB
  76. 05_tim-finding-purpose-in-protecting-assets.en.txt 1.2 KB
  77. 05_tim-finding-purpose-in-protecting-assets.mp4 7.0 MB
  78. 06_identity-and-access-management_instructions.html 302.9 KB
  79. 01_wrap-up.en.srt 2.4 KB
  80. 01_wrap-up.en.txt 1.5 KB
  81. 01_wrap-up.mp4 8.2 MB
  82. 02_glossary-terms-from-week-2_instructions.html 7.1 KB
  83. 01_welcome-to-week-3.en.srt 2.8 KB
  84. 01_welcome-to-week-3.en.txt 1.7 KB
  85. 01_welcome-to-week-3.mp4 9.2 MB
  86. 02_vulnerability-management.en.srt 6.0 KB
  87. 02_vulnerability-management.en.txt 3.8 KB
  88. 02_vulnerability-management.mp4 22.0 MB
  89. 03_defense-in-depth-strategy.en.srt 6.2 KB
  90. 03_defense-in-depth-strategy.en.txt 3.3 KB
  91. 03_defense-in-depth-strategy.mp4 19.9 MB
  92. 04_common-vulnerabilities-and-exposures.en.srt 8.1 KB
  93. 04_common-vulnerabilities-and-exposures.en.txt 4.3 KB
  94. 04_common-vulnerabilities-and-exposures.mp4 27.9 MB
  95. 05_the-owasp-top-10_instructions.html 141.9 KB
  96. 01_vulnerability-assessments.en.srt 5.9 KB
  97. 01_vulnerability-assessments.en.txt 3.1 KB
  98. 01_vulnerability-assessments.mp4 19.5 MB
  99. 02_approaches-to-vulnerability-scanning_instructions.html 7.4 KB
  100. 03_the-importance-of-updates_instructions.html 7.2 KB
  101. 04_omad-my-learning-journey-into-cybersecurity.en.srt 4.4 KB
  102. 04_omad-my-learning-journey-into-cybersecurity.en.txt 2.8 KB
  103. 04_omad-my-learning-journey-into-cybersecurity.mp4 9.9 MB
  104. 01_protect-all-entry-points.en.srt 5.7 KB
  105. 01_protect-all-entry-points.en.txt 3.6 KB
  106. 01_protect-all-entry-points.mp4 22.5 MB
  107. 02_approach-cybersecurity-with-an-attacker-mindset_instructions.html 206.0 KB
  108. 03_types-of-threat-actors_instructions.html 493.4 KB
  109. 04_niru-adopt-an-attacker-mindset.en.srt 4.6 KB
  110. 04_niru-adopt-an-attacker-mindset.en.txt 2.9 KB
  111. 04_niru-adopt-an-attacker-mindset.mp4 18.1 MB
  112. 05_pathways-through-defenses.en.srt 7.4 KB
  113. 05_pathways-through-defenses.en.txt 3.9 KB
  114. 05_pathways-through-defenses.mp4 22.4 MB
  115. 06_fortify-against-brute-force-cyber-attacks_NIST.SP.800-63b.pdf 1.2 MB
  116. 06_fortify-against-brute-force-cyber-attacks_instructions.html 153.1 KB
  117. 01_wrap-up.en.srt 3.6 KB
  118. 01_wrap-up.en.txt 1.9 KB
  119. 01_wrap-up.mp4 11.8 MB
  120. 02_glossary-terms-from-week-3_instructions.html 3.6 KB
  121. 01_welcome-to-week-4.en.srt 3.0 KB
  122. 01_welcome-to-week-4.en.txt 1.6 KB
  123. 01_welcome-to-week-4.mp4 8.6 MB
  124. 02_the-criminal-art-of-persuasion.en.srt 7.4 KB
  125. 02_the-criminal-art-of-persuasion.en.txt 4.0 KB
  126. 02_the-criminal-art-of-persuasion.mp4 21.7 MB
  127. 03_social-engineering-tactics_instructions.html 175.3 KB
  128. 04_phishing-for-information.en.srt 6.8 KB
  129. 04_phishing-for-information.en.txt 4.3 KB
  130. 04_phishing-for-information.mp4 24.0 MB
  131. 05_types-of-phishing_instructions.html 339.4 KB
  132. 01_malicious-software.en.srt 7.6 KB
  133. 01_malicious-software.en.txt 4.1 KB
  134. 01_malicious-software.mp4 24.5 MB
  135. 02_an-introduction-to-malware_instructions.html 163.9 KB
  136. 03_the-rise-of-cryptojacking.en.srt 6.6 KB
  137. 03_the-rise-of-cryptojacking.en.txt 3.6 KB
  138. 03_the-rise-of-cryptojacking.mp4 23.7 MB
  139. 01_cross-site-scripting.en.srt 7.3 KB
  140. 01_cross-site-scripting.en.txt 4.5 KB
  141. 01_cross-site-scripting.mp4 21.5 MB
  142. 02_exploitable-gaps-in-databases.en.srt 5.1 KB
  143. 02_exploitable-gaps-in-databases.en.txt 3.2 KB
  144. 02_exploitable-gaps-in-databases.mp4 17.4 MB
  145. 01_a-proactive-approach-to-security.en.srt 4.9 KB
  146. 01_a-proactive-approach-to-security.en.txt 3.1 KB
  147. 01_a-proactive-approach-to-security.mp4 17.1 MB
  148. 02_chantelle-the-value-of-diversity-in-cybersecurity.en.srt 3.7 KB
  149. 02_chantelle-the-value-of-diversity-in-cybersecurity.en.txt 2.0 KB
  150. 02_chantelle-the-value-of-diversity-in-cybersecurity.mp4 14.1 MB
  151. 03_pasta-the-process-for-attack-simulation-and-threat-analysis.en.srt 6.1 KB
  152. 03_pasta-the-process-for-attack-simulation-and-threat-analysis.en.txt 3.8 KB
  153. 03_pasta-the-process-for-attack-simulation-and-threat-analysis.mp4 17.8 MB
  154. 04_traits-of-an-effective-threat-model_instructions.html 120.9 KB
  155. 01_wrap-up.en.srt 2.8 KB
  156. 01_wrap-up.en.txt 1.5 KB
  157. 01_wrap-up.mp4 8.1 MB
  158. 02_glossary-terms-from-week-4_instructions.html 7.9 KB
  159. 01_course-wrap-up.en.srt 4.4 KB
  160. 01_course-wrap-up.en.txt 2.7 KB
  161. 01_course-wrap-up.mp4 17.7 MB
  162. 02_course-5-glossary_Course_5_glossary.docx 862.4 KB
  163. 02_course-5-glossary_instructions.html 6.5 KB
  164. 03_get-started-on-the-next-course_instructions.html 794.7 KB
  165. 01__resources.html 18.6 KB
  166. 01__Google_Cybersecurity_Certificate_glossary.docx 879.3 KB
  167. 01__resources.html 6.5 KB
  168. 01__resources.html 108.5 KB
  169. 01__16-software-updates.html 25.5 KB
  170. 01__2-4-3.html 8.6 KB
  171. 01__5-signs-youve-been-hit-with-an-apt.html 172.5 KB
  172. 01__5.2 5.4 KB
  173. 01__7.5 8.2 KB
  174. 01__FULL_TEXT.pdf 1.4 MB
  175. 01__NIST.FIPS.140-3.pdf 303.3 KB
  176. 01__Trend_Report_-_Why_Businesses_are_Moving_to_the_Cloud.pdf 1.2 MB
  177. 01__csos-guide-to-phishing-and-phishing-kits.html 155.8 KB
  178. 01__encryption-explained.html 45.2 KB
  179. 01__gdpr-tldr-what-security-pros-need-to-know-about-the-new-era-of-privacy-regulations.html 155.4 KB
  180. 01__hashing-explained-why-its-your-best-bet-to-protect-stored-passwords.html 159.5 KB
  181. 01__hipaa.html 195.9 KB
  182. 01__malware.html 211.7 KB
  183. 01__paper.pdf 196.7 KB
  184. 01__resources.html 60.2 KB
  185. 01__sql_injection.asp 110.1 KB
  186. 01__ssrf-attacks-explained-and-how-to-defend-against-them.html 155.6 KB
  187. 01__vulnerability-vs-threat-vs-risk.html 76.7 KB
  188. 01__what-is-cve-its-definition-and-purpose.html 169.2 KB
  189. 01__what-is-owasp-top-10.html 247.5 KB
  190. 01__what-is-phishing-examples-types-and-techniques.html 161.5 KB
  191. 01__Course_5_glossary.docx 862.4 KB
  192. 01__resources.html 6.5 KB
  193. 01__resources.html 16.0 KB
  194. 01__resources.html 8.8 KB
  195. 01_introduction-to-course-7.en.srt 4.8 KB
  196. 01_introduction-to-course-7.en.txt 3.0 KB
  197. 01_introduction-to-course-7.mp4 18.0 MB
  198. 02_course-7-overview_instructions.html 1.2 MB
  199. 03_angel-my-personal-career-journey.en.srt 4.8 KB
  200. 03_angel-my-personal-career-journey.en.txt 2.6 KB
  201. 03_angel-my-personal-career-journey.mp4 16.5 MB
  202. 04_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 879.3 KB
  203. 04_helpful-resources-and-tips_instructions.html 11.3 KB
  204. 01_welcome-to-week-1.en.srt 2.9 KB
  205. 01_welcome-to-week-1.en.txt 1.5 KB
  206. 01_welcome-to-week-1.mp4 7.8 MB
  207. 02_python-and-cybersecurity.en.srt 5.2 KB
  208. 02_python-and-cybersecurity.en.txt 3.3 KB
  209. 02_python-and-cybersecurity.mp4 20.1 MB
  210. 03_get-to-know-python_instructions.html 4.3 KB
  211. 04_create-a-basic-python-script.en.srt 3.7 KB
  212. 04_create-a-basic-python-script.en.txt 2.0 KB
  213. 04_create-a-basic-python-script.mp4 8.4 MB
  214. 05_python-environments_instructions.html 4.2 KB
  215. 06_akash-python-and-the-cybersecurity-professional.en.srt 2.0 KB
  216. 06_akash-python-and-the-cybersecurity-professional.en.txt 1.3 KB
  217. 06_akash-python-and-the-cybersecurity-professional.mp4 5.7 MB
  218. 01_data-types-in-python.en.srt 7.6 KB
  219. 01_data-types-in-python.en.txt 3.9 KB
  220. 01_data-types-in-python.mp4 19.4 MB
  221. 02_more-about-data-types_instructions.html 12.2 KB
  222. 03_work-with-variables-in-python.en.srt 10.0 KB
  223. 03_work-with-variables-in-python.en.txt 5.2 KB
  224. 03_work-with-variables-in-python.mp4 21.7 MB
  225. 04_assign-and-reassign-variables-in-python_instructions.html 8.2 KB
  226. 01_conditional-statements-in-python.en.srt 9.7 KB
  227. 01_conditional-statements-in-python.en.txt 6.2 KB
  228. 01_conditional-statements-in-python.mp4 17.7 MB
  229. 02_more-on-conditionals-in-python_instructions.html 15.1 KB
  230. 03_for-loops.en.srt 7.6 KB
  231. 03_for-loops.en.txt 4.0 KB
  232. 03_for-loops.mp4 12.2 MB
  233. 04_while-loops.en.srt 8.1 KB
  234. 04_while-loops.en.txt 4.3 KB
  235. 04_while-loops.mp4 10.2 MB
  236. 05_more-on-loops-in-python_instructions.html 15.6 KB
  237. 01_wrap-up.en.srt 1.6 KB
  238. 01_wrap-up.en.txt 949 bytes
  239. 01_wrap-up.mp4 3.4 MB
  240. 02_glossary-terms-from-week-1_instructions.html 4.0 KB
  241. 01_welcome-to-week-2.en.srt 2.2 KB
  242. 01_welcome-to-week-2.en.txt 1.2 KB
  243. 01_welcome-to-week-2.mp4 5.0 MB
  244. 02_introduction-to-functions.en.srt 4.0 KB
  245. 02_introduction-to-functions.en.txt 2.1 KB
  246. 02_introduction-to-functions.mp4 13.8 MB
  247. 03_create-a-basic-function.en.srt 3.7 KB
  248. 03_create-a-basic-function.en.txt 1.9 KB
  249. 03_create-a-basic-function.mp4 7.1 MB
  250. 04_python-functions-in-cybersecurity_instructions.html 6.8 KB
  251. 01_use-parameters-in-functions.en.srt 5.4 KB
  252. 01_use-parameters-in-functions.en.txt 3.3 KB
  253. 01_use-parameters-in-functions.mp4 10.6 MB
  254. 02_return-statements.en.srt 4.8 KB
  255. 02_return-statements.en.txt 3.0 KB
  256. 02_return-statements.mp4 13.7 MB
  257. 03_functions-and-variables_instructions.html 10.8 KB
  258. 04_explore-built-in-functions.en.srt 8.5 KB
  259. 04_explore-built-in-functions.en.txt 4.5 KB
  260. 04_explore-built-in-functions.mp4 21.0 MB
  261. 05_work-with-built-in-functions_functions.html 269.1 KB
  262. 05_work-with-built-in-functions_instructions.html 7.4 KB
  263. 01_modules-and-libraries.en.srt 3.3 KB
  264. 01_modules-and-libraries.en.txt 2.0 KB
  265. 01_modules-and-libraries.mp4 11.3 MB
  266. 02_code-readability.en.srt 6.1 KB
  267. 02_code-readability.en.txt 3.9 KB
  268. 02_code-readability.mp4 19.0 MB
  269. 03_ensure-proper-syntax-and-readability-in-python_instructions.html 9.6 KB
  270. 04_dorsa-use-python-efficiently-on-a-cybersecurity-team.en.srt 4.3 KB
  271. 04_dorsa-use-python-efficiently-on-a-cybersecurity-team.en.txt 2.3 KB
  272. 04_dorsa-use-python-efficiently-on-a-cybersecurity-team.mp4 11.4 MB
  273. 01_wrap-up.en.srt 1.8 KB
  274. 01_wrap-up.en.txt 952 bytes
  275. 01_wrap-up.mp4 3.7 MB
  276. 02_glossary-terms-from-week-2_instructions.html 3.0 KB
  277. 01_welcome-to-week-3.en.srt 1.9 KB
  278. 01_welcome-to-week-3.en.txt 1.0 KB
  279. 01_welcome-to-week-3.mp4 4.9 MB
  280. 02_string-operations.en.srt 7.8 KB
  281. 02_string-operations.en.txt 4.1 KB
  282. 02_string-operations.mp4 21.3 MB
  283. 03_string-indices-and-slices.en.srt 8.5 KB
  284. 03_string-indices-and-slices.en.txt 4.5 KB
  285. 03_string-indices-and-slices.mp4 20.3 MB
  286. 04_strings-and-the-security-analyst_instructions.html 13.5 KB
  287. 01_list-operations-in-python.en.srt 8.3 KB
  288. 01_list-operations-in-python.en.txt 5.1 KB
  289. 01_list-operations-in-python.mp4 19.3 MB
  290. 02_write-a-simple-algorithm.en.srt 8.4 KB
  291. 02_write-a-simple-algorithm.en.txt 4.3 KB
  292. 02_write-a-simple-algorithm.mp4 17.6 MB
  293. 03_lists-and-the-security-analyst_instructions.html 13.1 KB
  294. 01_regular-expressions-in-python.en.srt 10.4 KB
  295. 01_regular-expressions-in-python.en.txt 6.4 KB
  296. 01_regular-expressions-in-python.mp4 21.9 MB
  297. 02_more-about-regular-expressions_instructions.html 11.4 KB
  298. 01_wrap-up.en.srt 1.8 KB
  299. 01_wrap-up.en.txt 992 bytes
  300. 01_wrap-up.mp4 3.7 MB
  301. 02_glossary-terms-from-week-3_instructions.html 2.6 KB
  302. 01_welcome-to-week-4.en.srt 1.9 KB
  303. 01_welcome-to-week-4.en.txt 1.0 KB
  304. 01_welcome-to-week-4.mp4 5.1 MB
  305. 02_automate-cybersecurity-tasks-with-python.en.srt 5.7 KB
  306. 02_automate-cybersecurity-tasks-with-python.en.txt 3.0 KB
  307. 02_automate-cybersecurity-tasks-with-python.mp4 19.1 MB
  308. 03_essential-python-components-for-automation_instructions.html 8.2 KB
  309. 04_clancy-continual-learning-and-python.en.srt 3.6 KB
  310. 04_clancy-continual-learning-and-python.en.txt 1.9 KB
  311. 04_clancy-continual-learning-and-python.mp4 11.3 MB
  312. 01_access-a-text-file-in-python.en.srt 4.0 KB
  313. 01_access-a-text-file-in-python.en.txt 2.5 KB
  314. 01_access-a-text-file-in-python.mp4 10.5 MB
  315. 02_import-files-into-python_instructions.html 107.3 KB
  316. 03_parse-a-text-file-in-python.en.srt 3.5 KB
  317. 03_parse-a-text-file-in-python.en.txt 1.9 KB
  318. 03_parse-a-text-file-in-python.mp4 10.0 MB
  319. 04_develop-a-parsing-algorithm-in-python.en.srt 6.9 KB
  320. 04_develop-a-parsing-algorithm-in-python.en.txt 4.3 KB
  321. 04_develop-a-parsing-algorithm-in-python.mp4 15.2 MB
  322. 01_debugging-strategies.en.srt 8.5 KB
  323. 01_debugging-strategies.en.txt 4.4 KB
  324. 01_debugging-strategies.mp4 23.1 MB
  325. 02_apply-debugging-strategies.en.srt 7.9 KB
  326. 02_apply-debugging-strategies.en.txt 4.2 KB
  327. 02_apply-debugging-strategies.mp4 13.6 MB
  328. 03_explore-debugging-techniques_instructions.html 13.0 KB
  329. 01_wrap-up.en.srt 1.5 KB
  330. 01_wrap-up.en.txt 806 bytes
  331. 01_wrap-up.mp4 2.9 MB
  332. 02_glossary-terms-from-week-4_instructions.html 2.9 KB
  333. 01_course-wrap-up.en.srt 3.5 KB
  334. 01_course-wrap-up.en.txt 1.9 KB
  335. 01_course-wrap-up.mp4 11.8 MB
  336. 02_course-7-glossary_Course_7_glossary.docx 869.9 KB
  337. 02_course-7-glossary_instructions.html 6.5 KB
  338. 03_get-started-on-the-next-course_instructions.html 806.1 KB
  339. 01__resources.html 18.7 KB
  340. 01__Google_Cybersecurity_Certificate_glossary.docx 879.3 KB
  341. 01__resources.html 6.5 KB
  342. 01__Course_7_glossary.docx 869.9 KB
  343. 01__resources.html 6.5 KB
  344. 01__functions.html 269.1 KB
  345. 01__resources.html 7.0 KB
  346. 01__resources.html 16.0 KB
  347. 01__resources.html 8.8 KB
  348. [CourserHub.com].url 123 bytes
  349. 01_introduction-to-course-6.en.srt 4.1 KB
  350. 01_introduction-to-course-6.en.txt 2.2 KB
  351. 01_introduction-to-course-6.mp4 7.2 MB
  352. 02_course-6-overview_instructions.html 1.3 MB
  353. 03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 879.3 KB
  354. 03_helpful-resources-and-tips_instructions.html 11.3 KB
  355. 04_dave-grow-your-cybersecurity-career-with-mentors.en.srt 4.3 KB
  356. 04_dave-grow-your-cybersecurity-career-with-mentors.en.txt 2.3 KB
  357. 04_dave-grow-your-cybersecurity-career-with-mentors.mp4 13.9 MB
  358. 01_welcome-to-week-1.en.srt 2.5 KB
  359. 01_welcome-to-week-1.en.txt 1.6 KB
  360. 01_welcome-to-week-1.mp4 5.8 MB
  361. 02_introduction-to-the-incident-response-lifecycle.en.srt 6.4 KB
  362. 02_introduction-to-the-incident-response-lifecycle.en.txt 4.0 KB
  363. 02_introduction-to-the-incident-response-lifecycle.mp4 16.0 MB
  364. 01_incident-response-teams.en.srt 4.6 KB
  365. 01_incident-response-teams.en.txt 2.9 KB
  366. 01_incident-response-teams.mp4 12.4 MB
  367. 02_fatima-the-importance-of-communication-during-incident-response.en.srt 4.6 KB
  368. 02_fatima-the-importance-of-communication-during-incident-response.en.txt 2.4 KB
  369. 02_fatima-the-importance-of-communication-during-incident-response.mp4 15.2 MB
  370. 03_roles-in-response_instructions.html 84.3 KB
  371. 04_incident-response-plans.en.srt 3.6 KB
  372. 04_incident-response-plans.en.txt 2.3 KB
  373. 04_incident-response-plans.mp4 9.3 MB
  374. 01_incident-response-tools.en.srt 2.8 KB
  375. 01_incident-response-tools.en.txt 1.5 KB
  376. 01_incident-response-tools.mp4 5.4 MB
  377. 02_the-value-of-documentation.en.srt 4.6 KB
  378. 02_the-value-of-documentation.en.txt 3.0 KB
  379. 02_the-value-of-documentation.mp4 11.0 MB
  380. 03_intrusion-detection-systems.en.srt 3.1 KB
  381. 03_intrusion-detection-systems.en.txt 1.7 KB
  382. 03_intrusion-detection-systems.mp4 5.4 MB
  383. 04_overview-of-detection-tools_instructions.html 9.4 KB
  384. 05_alert-and-event-management-with-siem-and-soar-tools.en.srt 6.0 KB
  385. 05_alert-and-event-management-with-siem-and-soar-tools.en.txt 3.7 KB
  386. 05_alert-and-event-management-with-siem-and-soar-tools.mp4 14.5 MB
  387. 01_wrap-up.en.srt 1.4 KB
  388. 01_wrap-up.en.txt 788 bytes
  389. 01_wrap-up.mp4 2.4 MB
  390. 02_glossary-terms-from-week-1_instructions.html 4.1 KB
  391. 01_welcome-to-week-2.en.srt 1.9 KB
  392. 01_welcome-to-week-2.en.txt 1023 bytes
  393. 01_welcome-to-week-2.mp4 3.7 MB
  394. 02_casey-apply-soft-skills-in-cybersecurity.en.srt 2.7 KB
  395. 02_casey-apply-soft-skills-in-cybersecurity.en.txt 1.5 KB
  396. 02_casey-apply-soft-skills-in-cybersecurity.mp4 13.9 MB
  397. 03_the-importance-of-network-traffic-flows.en.srt 4.5 KB
  398. 03_the-importance-of-network-traffic-flows.en.txt 2.9 KB
  399. 03_the-importance-of-network-traffic-flows.mp4 12.8 MB
  400. 04_maintain-awareness-with-network-monitoring_instructions.html 293.7 KB
  401. 05_data-exfiltration-attacks.en.srt 7.2 KB
  402. 05_data-exfiltration-attacks.en.txt 3.9 KB
  403. 05_data-exfiltration-attacks.mp4 15.5 MB
  404. 01_packets-and-packet-captures.en.srt 5.1 KB
  405. 01_packets-and-packet-captures.en.txt 2.8 KB
  406. 01_packets-and-packet-captures.mp4 10.2 MB
  407. 02_learn-more-about-packet-captures_instructions.html 735.8 KB
  408. 03_interpret-network-communications-with-packets.en.srt 2.7 KB
  409. 03_interpret-network-communications-with-packets.en.txt 1.7 KB
  410. 03_interpret-network-communications-with-packets.mp4 7.6 MB
  411. 04_reexamine-the-fields-of-a-packet-header.en.srt 7.8 KB
  412. 04_reexamine-the-fields-of-a-packet-header.en.txt 4.2 KB
  413. 04_reexamine-the-fields-of-a-packet-header.mp4 13.6 MB
  414. 05_investigate-packet-details_instructions.html 3.6 MB
  415. 06_resources-for-completing-labs_instructions.html 108.5 KB
  416. 01_packet-captures-with-tcpdump.en.srt 7.0 KB
  417. 01_packet-captures-with-tcpdump.en.txt 3.7 KB
  418. 01_packet-captures-with-tcpdump.mp4 9.3 MB
  419. 02_overview-of-tcpdump_instructions.html 132.5 KB
  420. 02_overview-of-tcpdump_tcpdump.1.html 72.6 KB
  421. 01_wrap-up.en.srt 1.6 KB
  422. 01_wrap-up.en.txt 872 bytes
  423. 01_wrap-up.mp4 3.2 MB
  424. 02_glossary-terms-from-week-2_instructions.html 4.0 KB
  425. 01_welcome-to-week-3.en.srt 1.6 KB
  426. 01_welcome-to-week-3.en.txt 954 bytes
  427. 01_welcome-to-week-3.mp4 3.5 MB
  428. 02_the-detection-and-analysis-phase-of-the-lifecycle.en.srt 3.1 KB
  429. 02_the-detection-and-analysis-phase-of-the-lifecycle.en.txt 2.0 KB
  430. 02_the-detection-and-analysis-phase-of-the-lifecycle.mp4 8.5 MB
  431. 03_cybersecurity-incident-detection-methods_instructions.html 7.7 KB
  432. 04_mk-changes-in-the-cybersecurity-industry.en.srt 4.3 KB
  433. 04_mk-changes-in-the-cybersecurity-industry.en.txt 2.8 KB
  434. 04_mk-changes-in-the-cybersecurity-industry.mp4 13.4 MB
  435. 05_indicators-of-compromise_instructions.html 127.7 KB
  436. 05_indicators-of-compromise_the-pyramid-of-pain.html 67.1 KB
  437. 06_analyze-indicators-of-compromise-with-investigative-tools_instructions.html 1.5 MB
  438. 01_the-benefits-of-documentation.en.srt 3.6 KB
  439. 01_the-benefits-of-documentation.en.txt 2.3 KB
  440. 01_the-benefits-of-documentation.mp4 9.3 MB
  441. 02_document-evidence-with-chain-of-custody-forms.en.srt 5.6 KB
  442. 02_document-evidence-with-chain-of-custody-forms.en.txt 3.5 KB
  443. 02_document-evidence-with-chain-of-custody-forms.mp4 13.1 MB
  444. 03_best-practices-for-effective-documentation_instructions.html 5.8 KB
  445. 04_the-value-of-cybersecurity-playbooks.en.srt 6.1 KB
  446. 04_the-value-of-cybersecurity-playbooks.en.txt 3.2 KB
  447. 04_the-value-of-cybersecurity-playbooks.mp4 13.0 MB
  448. 01_the-role-of-triage-in-incident-response.en.srt 6.0 KB
  449. 01_the-role-of-triage-in-incident-response.en.txt 3.2 KB
  450. 01_the-role-of-triage-in-incident-response.mp4 11.6 MB
  451. 02_robin-foster-cross-team-collaboration.en.srt 3.8 KB
  452. 02_robin-foster-cross-team-collaboration.en.txt 2.4 KB
  453. 02_robin-foster-cross-team-collaboration.mp4 14.1 MB
  454. 03_the-triage-process_instructions.html 8.3 KB
  455. 04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.en.srt 4.4 KB
  456. 04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.en.txt 2.4 KB
  457. 04_the-containment-eradication-and-recovery-phase-of-the-lifecycle.mp4 9.9 MB
  458. 05_business-continuity-considerations_instructions.html 6.2 KB
  459. 01_the-post-incident-activity-phase-of-the-lifecycle.en.srt 3.5 KB
  460. 01_the-post-incident-activity-phase-of-the-lifecycle.en.txt 2.2 KB
  461. 01_the-post-incident-activity-phase-of-the-lifecycle.mp4 8.2 MB
  462. 02_post-incident-review_instructions.html 233.4 KB
  463. 01_wrap-up.en.srt 1.6 KB
  464. 01_wrap-up.en.txt 1.1 KB
  465. 01_wrap-up.mp4 2.9 MB
  466. 02_glossary-terms-from-week-3_instructions.html 4.8 KB
  467. 01_welcome-to-week-4.en.srt 2.2 KB
  468. 01_welcome-to-week-4.en.txt 1.3 KB
  469. 01_welcome-to-week-4.mp4 5.0 MB
  470. 02_the-importance-of-logs.en.srt 6.0 KB
  471. 02_the-importance-of-logs.en.txt 3.8 KB
  472. 02_the-importance-of-logs.mp4 12.8 MB
  473. 03_best-practices-for-log-collection-and-management_instructions.html 8.3 KB
  474. 04_rebecca-learn-new-tools-and-technologies.en.srt 3.0 KB
  475. 04_rebecca-learn-new-tools-and-technologies.en.txt 1.8 KB
  476. 04_rebecca-learn-new-tools-and-technologies.mp4 9.3 MB
  477. 05_variations-of-logs.en.srt 6.8 KB
  478. 05_variations-of-logs.en.txt 3.6 KB
  479. 05_variations-of-logs.mp4 11.9 MB
  480. 06_overview-of-log-file-formats_instructions.html 16.4 KB
  481. 01_security-monitoring-with-detection-tools.en.srt 6.1 KB
  482. 01_security-monitoring-with-detection-tools.en.txt 3.3 KB
  483. 01_security-monitoring-with-detection-tools.mp4 14.7 MB
  484. 02_detection-tools-and-techniques_instructions.html 342.7 KB
  485. 03_components-of-a-detection-signature.en.srt 6.6 KB
  486. 03_components-of-a-detection-signature.en.txt 3.5 KB
  487. 03_components-of-a-detection-signature.mp4 12.8 MB
  488. 04_examine-signatures-with-suricata.en.srt 5.9 KB
  489. 04_examine-signatures-with-suricata.en.txt 3.8 KB
  490. 04_examine-signatures-with-suricata.mp4 8.4 MB
  491. 05_examine-suricata-logs.en.srt 3.3 KB
  492. 05_examine-suricata-logs.en.txt 2.0 KB
  493. 05_examine-suricata-logs.mp4 7.4 MB
  494. 06_overview-of-suricata_eve-json-examplesjq.html 23.0 KB
  495. 06_overview-of-suricata_index.html 32.5 KB
  496. 06_overview-of-suricata_instructions.html 124.4 KB
  497. 06_overview-of-suricata_suricata-update.html 23.5 KB
  498. 06_overview-of-suricata_suricata-yaml.html 236.7 KB
  499. 01_reexamine-siem-tools.en.srt 3.6 KB
  500. 01_reexamine-siem-tools.en.txt 2.3 KB
  501. 01_reexamine-siem-tools.mp4 9.1 MB
  502. 02_query-for-events-with-splunk.en.srt 7.0 KB
  503. 02_query-for-events-with-splunk.en.txt 3.8 KB
  504. 02_query-for-events-with-splunk.mp4 9.3 MB
  505. 03_query-for-events-with-chronicle.en.srt 6.6 KB
  506. 03_query-for-events-with-chronicle.en.txt 3.5 KB
  507. 03_query-for-events-with-chronicle.mp4 8.2 MB
  508. 04_search-methods-with-siem-tools_instructions.html 415.6 KB
  509. 01_wrap-up.en.srt 1.8 KB
  510. 01_wrap-up.en.txt 1.1 KB
  511. 01_wrap-up.mp4 3.4 MB
  512. 02_glossary-terms-from-week-4_instructions.html 4.5 KB
  513. 01_course-wrap-up.en.srt 3.6 KB
  514. 01_course-wrap-up.en.txt 1.9 KB
  515. 01_course-wrap-up.mp4 5.8 MB
  516. 02_course-6-glossary_Course_6_glossary.docx 859.7 KB
  517. 02_course-6-glossary_instructions.html 6.5 KB
  518. 03_get-started-on-the-next-course_instructions.html 789.4 KB
  519. 01__resources.html 18.6 KB
  520. 01__Google_Cybersecurity_Certificate_glossary.docx 879.3 KB
  521. 01__resources.html 6.5 KB
  522. 01__resources.html 108.5 KB
  523. 01__Course_6_glossary.docx 859.8 KB
  524. 01__resources.html 6.5 KB
  525. 01__Bryan_Nolen_-_Surviving_Your_First_Incident_Purplecon_2018.pdf 142.4 KB
  526. 01__RAID4.pdf 284.7 KB
  527. 01__cisa-insights_chain-of-custody-and-ci-systems_508.pdf 360.2 KB
  528. 01__index.html 32.5 KB
  529. 01__network-operations-center.html 219.6 KB
  530. 01__nist.sp.800-61r2.pdf 1.5 MB
  531. 01__nistspecialpublication800-92.pdf 1.7 MB
  532. 01__question525.htm 170.3 KB
  533. 01__resources.html 37.0 KB
  534. 01__suricata-update.html 23.5 KB
  535. 01__suricata-yaml.html 236.7 KB
  536. 01__tcpdump.1.html 72.6 KB
  537. 01__the-pyramid-of-pain.html 67.1 KB
  538. 01__xml_whatis.asp 89.4 KB
  539. 01__resources.html 16.0 KB
  540. 01__resources.html 8.8 KB
  541. Readme.txt 51 bytes
  542. 01_welcome-to-the-google-cybersecurity-certificate.en.srt 15.2 KB
  543. 01_welcome-to-the-google-cybersecurity-certificate.en.txt 8.0 KB
  544. 01_welcome-to-the-google-cybersecurity-certificate.mp4 47.3 MB
  545. 02_google-cybersecurity-certificate-overview_instructions.html 500.5 KB
  546. 03_course-1-overview_instructions.html 1.3 MB
  547. 04_welcome-to-week-1.en.srt 1.9 KB
  548. 04_welcome-to-week-1.en.txt 1.0 KB
  549. 04_welcome-to-week-1.mp4 4.7 MB
  550. 05_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 879.3 KB
  551. 05_helpful-resources-and-tips_instructions.html 11.2 KB
  552. 06_participate-in-program-surveys_instructions.html 3.7 KB
  553. 01_introduction-to-cybersecurity.en.srt 7.1 KB
  554. 01_introduction-to-cybersecurity.en.txt 3.8 KB
  555. 01_introduction-to-cybersecurity.mp4 23.1 MB
  556. 02_toni-my-path-to-cybersecurity.en.srt 5.5 KB
  557. 02_toni-my-path-to-cybersecurity.en.txt 2.9 KB
  558. 02_toni-my-path-to-cybersecurity.mp4 20.0 MB
  559. 03_responsibilities-of-an-entry-level-cybersecurity-analyst.en.srt 4.5 KB
  560. 03_responsibilities-of-an-entry-level-cybersecurity-analyst.en.txt 2.4 KB
  561. 03_responsibilities-of-an-entry-level-cybersecurity-analyst.mp4 14.5 MB
  562. 04_nikki-a-day-in-the-life-of-a-security-engineer.en.srt 3.8 KB
  563. 04_nikki-a-day-in-the-life-of-a-security-engineer.en.txt 2.4 KB
  564. 04_nikki-a-day-in-the-life-of-a-security-engineer.mp4 16.1 MB
  565. 05_common-cybersecurity-terminology_instructions.html 5.6 KB
  566. 01_core-skills-for-cybersecurity-professionals.en.srt 7.6 KB
  567. 01_core-skills-for-cybersecurity-professionals.en.txt 4.1 KB
  568. 01_core-skills-for-cybersecurity-professionals.mp4 19.3 MB
  569. 02_veronica-my-path-to-working-in-cybersecurity.en.srt 3.1 KB
  570. 02_veronica-my-path-to-working-in-cybersecurity.en.txt 1.6 KB
  571. 02_veronica-my-path-to-working-in-cybersecurity.mp4 11.0 MB
  572. 03_transferable-and-technical-cybersecurity-skills_instructions.html 7.3 KB
  573. 04_the-importance-of-cybersecurity.en.srt 4.1 KB
  574. 04_the-importance-of-cybersecurity.en.txt 2.6 KB
  575. 04_the-importance-of-cybersecurity.mp4 17.8 MB
  576. 01_wrap-up.en.srt 1.7 KB
  577. 01_wrap-up.en.txt 925 bytes
  578. 01_wrap-up.mp4 4.0 MB
  579. 02_glossary-terms-from-week-1_instructions.html 2.8 KB
  580. 01_welcome-to-week-2.en.srt 2.2 KB
  581. 01_welcome-to-week-2.en.txt 1.1 KB
  582. 01_welcome-to-week-2.mp4 6.7 MB
  583. 02_past-cybersecurity-attacks.en.srt 6.3 KB
  584. 02_past-cybersecurity-attacks.en.txt 3.3 KB
  585. 02_past-cybersecurity-attacks.mp4 22.0 MB
  586. 03_attacks-in-the-digital-age.en.srt 6.5 KB
  587. 03_attacks-in-the-digital-age.en.txt 4.2 KB
  588. 03_attacks-in-the-digital-age.mp4 25.5 MB
  589. 04_common-attacks-and-their-effectiveness_instructions.html 8.4 KB
  590. 05_sean-keep-your-cool-during-a-data-breach.en.srt 2.9 KB
  591. 05_sean-keep-your-cool-during-a-data-breach.en.txt 1.5 KB
  592. 05_sean-keep-your-cool-during-a-data-breach.mp4 13.9 MB
  593. 01_introduction-to-the-eight-cissp-security-domains-part-1.en.srt 5.3 KB
  594. 01_introduction-to-the-eight-cissp-security-domains-part-1.en.txt 3.3 KB
  595. 01_introduction-to-the-eight-cissp-security-domains-part-1.mp4 18.3 MB
  596. 02_introduction-to-the-eight-cissp-security-domains-part-2.en.srt 5.7 KB
  597. 02_introduction-to-the-eight-cissp-security-domains-part-2.en.txt 3.0 KB
  598. 02_introduction-to-the-eight-cissp-security-domains-part-2.mp4 17.3 MB
  599. 03_determine-the-type-of-attack_instructions.html 225.0 KB
  600. 04_understand-attackers_instructions.html 313.3 KB
  601. 01_wrap-up.en.srt 2.2 KB
  602. 01_wrap-up.en.txt 1.5 KB
  603. 01_wrap-up.mp4 7.4 MB
  604. 02_glossary-terms-from-week-2_instructions.html 4.2 KB
  605. 01_welcome-to-week-3.en.srt 3.8 KB
  606. 01_welcome-to-week-3.en.txt 2.4 KB
  607. 01_welcome-to-week-3.mp4 14.5 MB
  608. 02_introduction-to-security-frameworks-and-controls.en.srt 7.5 KB
  609. 02_introduction-to-security-frameworks-and-controls.en.txt 4.0 KB
  610. 02_introduction-to-security-frameworks-and-controls.mp4 23.4 MB
  611. 03_secure-design.en.srt 6.8 KB
  612. 03_secure-design.en.txt 3.6 KB
  613. 03_secure-design.mp4 19.1 MB
  614. 04_controls-frameworks-and-compliance_instructions.html 151.8 KB
  615. 05_heather-protect-sensitive-data-and-information.en.srt 3.1 KB
  616. 05_heather-protect-sensitive-data-and-information.en.txt 2.0 KB
  617. 05_heather-protect-sensitive-data-and-information.mp4 16.8 MB
  618. 01_ethics-in-cybersecurity.en.srt 6.6 KB
  619. 01_ethics-in-cybersecurity.en.txt 4.1 KB
  620. 01_ethics-in-cybersecurity.mp4 22.5 MB
  621. 02_ethical-concepts-that-guide-cybersecurity-decisions_instructions.html 7.9 KB
  622. 03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.en.srt 4.1 KB
  623. 03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.en.txt 2.3 KB
  624. 03_holly-the-importance-of-ethics-as-a-cybersecurity-professional.mp4 14.6 MB
  625. 01_wrap-up.en.srt 1.7 KB
  626. 01_wrap-up.en.txt 953 bytes
  627. 01_wrap-up.mp4 4.7 MB
  628. 02_glossary-terms-from-week-3_instructions.html 3.9 KB
  629. 01_welcome-to-week-4.en.srt 2.6 KB
  630. 01_welcome-to-week-4.en.txt 1.4 KB
  631. 01_welcome-to-week-4.mp4 7.0 MB
  632. 02_common-cybersecurity-tools.en.srt 7.1 KB
  633. 02_common-cybersecurity-tools.en.txt 3.8 KB
  634. 02_common-cybersecurity-tools.mp4 20.2 MB
  635. 03_tools-for-protecting-business-operations_gcat_threathorizons_full_sept2022.pdf 3.0 MB
  636. 03_tools-for-protecting-business-operations_instructions.html 651.5 KB
  637. 01_introduction-to-linux-sql-and-python.en.srt 5.1 KB
  638. 01_introduction-to-linux-sql-and-python.en.txt 2.8 KB
  639. 01_introduction-to-linux-sql-and-python.mp4 14.5 MB
  640. 02_use-tools-to-protect-business-operations_instructions.html 6.6 KB
  641. 03_create-a-cybersecurity-portfolio_instructions.html 8.7 KB
  642. 01_wrap-up.en.srt 1012 bytes
  643. 01_wrap-up.en.txt 648 bytes
  644. 01_wrap-up.mp4 2.1 MB
  645. 02_glossary-terms-from-week-4_instructions.html 2.8 KB
  646. 01_course-wrap-up.en.srt 3.0 KB
  647. 01_course-wrap-up.en.txt 1.6 KB
  648. 01_course-wrap-up.mp4 7.7 MB
  649. 02_course-1-glossary_Course_1_glossary.docx 858.9 KB
  650. 02_course-1-glossary_instructions.html 6.5 KB
  651. 03_get-started-on-the-next-course_instructions.html 796.2 KB
  652. 01__resources.html 19.4 KB
  653. 01__Course_1_glossary.docx 858.7 KB
  654. 01__resources.html 6.5 KB
  655. 01__55.html 42.5 KB
  656. 01__IntroToCybersecurityEthics.pdf 578.3 KB
  657. 01__R46536.pdf 1.3 MB
  658. 01__cis-controls-and-the-hph.pdf 1.5 MB
  659. 01__display.cfm 37.0 KB
  660. 01__gcat_threathorizons_full_sept2022.pdf 3.0 MB
  661. 01__hipaa.html 195.9 KB
  662. 01__index.html 1.6 MB
  663. 01__ncsam_eskimming_508.pdf 780.8 KB
  664. 01__nist_small_business_fundamentals_july_2019.pptx 4.2 MB
  665. 01__resources.html 28.1 KB
  666. 01__rules-and-security-requirements.html 74.8 KB
  667. 01__why-splunk.html 227.5 KB
  668. 01__Google_Cybersecurity_Certificate_glossary.docx 879.1 KB
  669. 01__resources.html 6.5 KB
  670. 01__resources.html 16.0 KB
  671. 01_introduction-to-course-4.en.srt 3.9 KB
  672. 01_introduction-to-course-4.en.txt 2.1 KB
  673. 01_introduction-to-course-4.mp4 8.7 MB
  674. 02_course-4-overview_instructions.html 1.2 MB
  675. 03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 879.3 KB
  676. 03_helpful-resources-and-tips_instructions.html 11.2 KB
  677. 01_welcome-to-week-1.en.srt 1.5 KB
  678. 01_welcome-to-week-1.en.txt 878 bytes
  679. 01_welcome-to-week-1.mp4 2.9 MB
  680. 02_kim-my-journey-into-computing.en.srt 3.5 KB
  681. 02_kim-my-journey-into-computing.en.txt 1.8 KB
  682. 02_kim-my-journey-into-computing.mp4 10.9 MB
  683. 03_introduction-to-operating-systems.en.srt 4.3 KB
  684. 03_introduction-to-operating-systems.en.txt 2.8 KB
  685. 03_introduction-to-operating-systems.mp4 11.5 MB
  686. 04_compare-operating-systems_instructions.html 6.3 KB
  687. 01_inside-the-operating-system.en.srt 5.8 KB
  688. 01_inside-the-operating-system.en.txt 3.1 KB
  689. 01_inside-the-operating-system.mp4 10.5 MB
  690. 02_requests-to-the-operating-system_instructions.html 133.9 KB
  691. 03_resource-allocation-via-the-os.en.srt 3.9 KB
  692. 03_resource-allocation-via-the-os.en.txt 2.1 KB
  693. 03_resource-allocation-via-the-os.mp4 9.5 MB
  694. 01_gui-versus-cli.en.srt 7.0 KB
  695. 01_gui-versus-cli.en.txt 3.7 KB
  696. 01_gui-versus-cli.mp4 14.1 MB
  697. 02_the-command-line-in-use_instructions.html 197.1 KB
  698. 03_ellen-my-path-into-cybersecurity.en.srt 3.8 KB
  699. 03_ellen-my-path-into-cybersecurity.en.txt 2.4 KB
  700. 03_ellen-my-path-into-cybersecurity.mp4 12.4 MB
  701. 01_wrap-up.en.srt 1.9 KB
  702. 01_wrap-up.en.txt 1.1 KB
  703. 01_wrap-up.mp4 3.2 MB
  704. 02_glossary-terms-from-week-1_instructions.html 2.5 KB
  705. 01_welcome-to-week-2.en.srt 1.6 KB
  706. 01_welcome-to-week-2.en.txt 889 bytes
  707. 01_welcome-to-week-2.mp4 3.2 MB
  708. 02_introduction-to-linux.en.srt 5.0 KB
  709. 02_introduction-to-linux.en.txt 3.1 KB
  710. 02_introduction-to-linux.mp4 12.6 MB
  711. 03_phil-learn-and-grow-in-the-cybersecurity-field.en.srt 4.1 KB
  712. 03_phil-learn-and-grow-in-the-cybersecurity-field.en.txt 2.2 KB
  713. 03_phil-learn-and-grow-in-the-cybersecurity-field.mp4 12.6 MB
  714. 04_linux-architecture.en.srt 5.8 KB
  715. 04_linux-architecture.en.txt 3.0 KB
  716. 04_linux-architecture.mp4 11.8 MB
  717. 05_linux-architecture-explained_instructions.html 6.5 KB
  718. 01_linux-distributions.en.srt 4.3 KB
  719. 01_linux-distributions.en.txt 2.6 KB
  720. 01_linux-distributions.mp4 10.3 MB
  721. 02_kali-linux-tm.en.srt 3.5 KB
  722. 02_kali-linux-tm.en.txt 2.3 KB
  723. 02_kali-linux-tm.mp4 7.2 MB
  724. 03_more-linux-distributions_instructions.html 4.4 KB
  725. 04_resources-for-completing-linux-labs_instructions.html 108.5 KB
  726. 01_introduction-to-the-shell.en.srt 2.7 KB
  727. 01_introduction-to-the-shell.en.txt 1.7 KB
  728. 01_introduction-to-the-shell.mp4 6.0 MB
  729. 02_input-and-output-in-the-shell.en.srt 4.9 KB
  730. 02_input-and-output-in-the-shell.en.txt 2.7 KB
  731. 02_input-and-output-in-the-shell.mp4 8.6 MB
  732. 01_wrap-up.en.srt 1.4 KB
  733. 01_wrap-up.en.txt 735 bytes
  734. 01_wrap-up.mp4 2.8 MB
  735. 02_glossary-terms-from-week-2_instructions.html 5.0 KB
  736. 01_welcome-to-week-3.en.srt 2.7 KB
  737. 01_welcome-to-week-3.en.txt 1.4 KB
  738. 01_welcome-to-week-3.mp4 5.1 MB
  739. 02_linux-commands-via-the-bash-shell.en.srt 5.1 KB
  740. 02_linux-commands-via-the-bash-shell.en.txt 2.8 KB
  741. 02_linux-commands-via-the-bash-shell.mp4 10.2 MB
  742. 03_core-commands-for-navigation-and-reading-files.en.srt 7.6 KB
  743. 03_core-commands-for-navigation-and-reading-files.en.txt 4.0 KB
  744. 03_core-commands-for-navigation-and-reading-files.mp4 11.3 MB
  745. 04_navigate-linux-and-read-file-content_instructions.html 104.9 KB
  746. 01_find-what-you-need-with-linux.en.srt 7.6 KB
  747. 01_find-what-you-need-with-linux.en.txt 3.9 KB
  748. 01_find-what-you-need-with-linux.mp4 10.7 MB
  749. 02_filter-content-in-linux_instructions.html 8.7 KB
  750. 03_create-and-modify-directories-and-files.en.srt 11.1 KB
  751. 03_create-and-modify-directories-and-files.en.txt 5.8 KB
  752. 03_create-and-modify-directories-and-files.mp4 17.8 MB
  753. 04_manage-directories-and-files_instructions.html 9.6 KB
  754. 01_file-permissions-and-ownership.en.srt 11.1 KB
  755. 01_file-permissions-and-ownership.en.txt 5.8 KB
  756. 01_file-permissions-and-ownership.mp4 16.7 MB
  757. 02_change-permissions.en.srt 7.2 KB
  758. 02_change-permissions.en.txt 3.8 KB
  759. 02_change-permissions.mp4 9.4 MB
  760. 03_permission-commands_instructions.html 15.5 KB
  761. 04_add-and-delete-users.en.srt 8.9 KB
  762. 04_add-and-delete-users.en.txt 4.7 KB
  763. 04_add-and-delete-users.mp4 14.7 MB
  764. 05_responsible-use-of-sudo_instructions.html 11.2 KB
  765. 01_damar-my-journey-into-linux-commands.en.srt 3.7 KB
  766. 01_damar-my-journey-into-linux-commands.en.txt 2.3 KB
  767. 01_damar-my-journey-into-linux-commands.mp4 13.6 MB
  768. 02_the-linux-community.en.srt 2.5 KB
  769. 02_the-linux-community.en.txt 1.4 KB
  770. 02_the-linux-community.mp4 6.0 MB
  771. 03_man-pages-within-the-shell.en.srt 4.0 KB
  772. 03_man-pages-within-the-shell.en.txt 2.1 KB
  773. 03_man-pages-within-the-shell.mp4 6.6 MB
  774. 04_linux-resources_instructions.html 5.1 KB
  775. 01_wrap-up.en.srt 1.3 KB
  776. 01_wrap-up.en.txt 876 bytes
  777. 01_wrap-up.mp4 3.4 MB
  778. 02_glossary-terms-from-week-3_instructions.html 3.2 KB
  779. 01_welcome-to-week-4.en.srt 2.6 KB
  780. 01_welcome-to-week-4.en.txt 1.4 KB
  781. 01_welcome-to-week-4.mp4 5.3 MB
  782. 02_introduction-to-databases.en.srt 5.9 KB
  783. 02_introduction-to-databases.en.txt 3.7 KB
  784. 02_introduction-to-databases.mp4 10.4 MB
  785. 03_query-databases-with-sql.en.srt 3.9 KB
  786. 03_query-databases-with-sql.en.txt 2.5 KB
  787. 03_query-databases-with-sql.mp4 8.5 MB
  788. 04_sql-filtering-versus-linux-filtering_instructions.html 4.2 KB
  789. 05_adedayo-sql-in-cybersecurity.en.srt 3.8 KB
  790. 05_adedayo-sql-in-cybersecurity.en.txt 2.1 KB
  791. 05_adedayo-sql-in-cybersecurity.mp4 13.7 MB
  792. 01_basic-queries.en.srt 4.7 KB
  793. 01_basic-queries.en.txt 2.5 KB
  794. 01_basic-queries.mp4 9.0 MB
  795. 02_query-a-database_instructions.html 8.8 KB
  796. 03_resources-for-completing-sql-labs_instructions.html 108.5 KB
  797. 04_basic-filters-on-sql-queries.en.srt 6.4 KB
  798. 04_basic-filters-on-sql-queries.en.txt 4.0 KB
  799. 04_basic-filters-on-sql-queries.mp4 14.8 MB
  800. 05_the-where-clause-and-basic-operators_instructions.html 8.1 KB
  801. 01_filter-dates-and-numbers.en.srt 5.1 KB
  802. 01_filter-dates-and-numbers.en.txt 3.2 KB
  803. 01_filter-dates-and-numbers.mp4 11.0 MB
  804. 02_operators-for-filtering-dates-and-numbers_instructions.html 6.8 KB
  805. 03_filters-with-and-or-and-not.en.srt 8.2 KB
  806. 03_filters-with-and-or-and-not.en.txt 4.4 KB
  807. 03_filters-with-and-or-and-not.mp4 16.1 MB
  808. 04_more-on-filters-with-and-or-and-not_instructions.html 6.4 KB
  809. 01_join-tables-in-sql.en.srt 8.5 KB
  810. 01_join-tables-in-sql.en.txt 4.5 KB
  811. 01_join-tables-in-sql.mp4 12.3 MB
  812. 02_types-of-joins.en.srt 5.1 KB
  813. 02_types-of-joins.en.txt 2.7 KB
  814. 02_types-of-joins.mp4 8.0 MB
  815. 03_compare-types-of-joins_instructions.html 1.5 MB
  816. 04_continuous-learning-in-sql_instructions.html 5.3 KB
  817. 01_wrap-up.en.srt 2.2 KB
  818. 01_wrap-up.en.txt 1.2 KB
  819. 01_wrap-up.mp4 3.4 MB
  820. 02_glossary-terms-from-week-4_instructions.html 3.0 KB
  821. 01_course-wrap-up.en.srt 2.3 KB
  822. 01_course-wrap-up.en.txt 1.3 KB
  823. 01_course-wrap-up.mp4 3.8 MB
  824. 02_course-4-glossary_Course_4_glossary.docx 1.1 MB
  825. 02_course-4-glossary_instructions.html 6.5 KB
  826. 03_get-started-on-the-next-course_instructions.html 784.2 KB
  827. 01__resources.html 18.6 KB
  828. 01__Google_Cybersecurity_Certificate_glossary.docx 879.3 KB
  829. 01__resources.html 6.5 KB
  830. 01__resources.html 108.5 KB
  831. 01__resources.html 108.5 KB
  832. 01__Course_4_glossary.docx 1.1 MB
  833. 01__resources.html 6.5 KB
  834. 01__01-intro.html 63.3 KB
  835. 01__Linux-in-a-Nutshell-6th-Edition.pdf 12.4 MB
  836. 01__ShellIntro.pdf 124.3 KB
  837. 01__bootup.html 8.1 KB
  838. 01__operating-system2.htm 153.6 KB
  839. 01__resources.html 19.8 KB
  840. 01__subsection3.1.html 4.3 KB
  841. 01__thegnuproject.html 65.1 KB
  842. 01__resources.html 16.0 KB
  843. 01__resources.html 8.8 KB
  844. 01_introduction-to-course-2.en.srt 2.4 KB
  845. 01_introduction-to-course-2.en.txt 1.5 KB
  846. 01_introduction-to-course-2.mp4 7.9 MB
  847. 02_course-2-overview_instructions.html 1.8 MB
  848. 03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 879.3 KB
  849. 03_helpful-resources-and-tips_instructions.html 11.3 KB
  850. 01_welcome-to-week-1.en.srt 1.6 KB
  851. 01_welcome-to-week-1.en.txt 1.0 KB
  852. 01_welcome-to-week-1.mp4 4.5 MB
  853. 02_explore-the-cissp-security-domains-part-1.en.srt 6.2 KB
  854. 02_explore-the-cissp-security-domains-part-1.en.txt 4.0 KB
  855. 02_explore-the-cissp-security-domains-part-1.mp4 19.1 MB
  856. 03_explore-the-cissp-security-domains-part-2.en.srt 6.7 KB
  857. 03_explore-the-cissp-security-domains-part-2.en.txt 4.4 KB
  858. 03_explore-the-cissp-security-domains-part-2.mp4 18.2 MB
  859. 04_security-domains-cybersecurity-analysts-need-to-know_instructions.html 195.3 KB
  860. 05_ashley-my-path-to-cybersecurity.en.srt 5.7 KB
  861. 05_ashley-my-path-to-cybersecurity.en.txt 3.0 KB
  862. 05_ashley-my-path-to-cybersecurity.mp4 19.8 MB
  863. 01_threats-risks-and-vulnerabilities.en.srt 5.9 KB
  864. 01_threats-risks-and-vulnerabilities.en.txt 3.8 KB
  865. 01_threats-risks-and-vulnerabilities.mp4 17.0 MB
  866. 02_key-impacts-of-threats-risks-and-vulnerabilities.en.srt 5.2 KB
  867. 02_key-impacts-of-threats-risks-and-vulnerabilities.en.txt 3.4 KB
  868. 02_key-impacts-of-threats-risks-and-vulnerabilities.mp4 17.3 MB
  869. 03_herbert-manage-threats-risks-and-vulnerabilities.en.srt 3.1 KB
  870. 03_herbert-manage-threats-risks-and-vulnerabilities.en.txt 1.9 KB
  871. 03_herbert-manage-threats-risks-and-vulnerabilities.mp4 9.6 MB
  872. 04_nist-s-risk-management-framework.en.srt 6.4 KB
  873. 04_nist-s-risk-management-framework.en.txt 3.4 KB
  874. 04_nist-s-risk-management-framework.mp4 16.3 MB
  875. 05_manage-common-threats-risks-and-vulnerabilities_instructions.html 779.1 KB
  876. 01_wrap-up.en.srt 1.4 KB
  877. 01_wrap-up.en.txt 882 bytes
  878. 01_wrap-up.mp4 3.9 MB
  879. 02_glossary-terms-from-week-1_instructions.html 3.9 KB
  880. 01_welcome-to-week-2.en.srt 1.7 KB
  881. 01_welcome-to-week-2.en.txt 950 bytes
  882. 01_welcome-to-week-2.mp4 5.4 MB
  883. 02_frameworks.en.srt 3.5 KB
  884. 02_frameworks.en.txt 1.9 KB
  885. 02_frameworks.mp4 10.3 MB
  886. 03_controls.en.srt 5.4 KB
  887. 03_controls.en.txt 2.9 KB
  888. 03_controls.mp4 14.1 MB
  889. 04_the-relationship-between-frameworks-and-controls_instructions.html 6.6 KB
  890. 04_the-relationship-between-frameworks-and-controls_physical-access-control.pdf 6.9 MB
  891. 01_explore-the-cia-triad.en.srt 4.8 KB
  892. 01_explore-the-cia-triad.en.txt 3.1 KB
  893. 01_explore-the-cia-triad.mp4 14.7 MB
  894. 02_use-the-cia-triad-to-protect-organizations_instructions.html 4.3 KB
  895. 01_nist-frameworks.en.srt 6.8 KB
  896. 01_nist-frameworks.en.txt 3.6 KB
  897. 01_nist-frameworks.mp4 18.0 MB
  898. 02_explore-the-five-functions-of-the-nist-cybersecurity-framework.en.srt 6.0 KB
  899. 02_explore-the-five-functions-of-the-nist-cybersecurity-framework.en.txt 3.2 KB
  900. 02_explore-the-five-functions-of-the-nist-cybersecurity-framework.mp4 15.2 MB
  901. 01_owasp-security-principles.en.srt 6.6 KB
  902. 01_owasp-security-principles.en.txt 3.5 KB
  903. 01_owasp-security-principles.mp4 19.1 MB
  904. 02_more-about-owasp-security-principles_instructions.html 5.4 KB
  905. 03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.en.srt 3.0 KB
  906. 03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.en.txt 1.9 KB
  907. 03_wajih-stay-up-to-date-on-the-latest-cybersecurity-threats.mp4 10.0 MB
  908. 04_plan-a-security-audit.en.srt 6.9 KB
  909. 04_plan-a-security-audit.en.txt 3.6 KB
  910. 04_plan-a-security-audit.mp4 16.7 MB
  911. 05_complete-a-security-audit.en.srt 5.3 KB
  912. 05_complete-a-security-audit.en.txt 3.4 KB
  913. 05_complete-a-security-audit.mp4 17.0 MB
  914. 06_more-about-security-audits_Audit_and_Accountability_AU_CIO-IT_Security_01-08_Rev_6_12-03-2020docx.pdf 1.2 MB
  915. 06_more-about-security-audits_Control_categories.docx 838.0 KB
  916. 06_more-about-security-audits_instructions.html 8.8 KB
  917. 01_wrap-up.en.srt 2.8 KB
  918. 01_wrap-up.en.txt 1.5 KB
  919. 01_wrap-up.mp4 7.1 MB
  920. 02_glossary-terms-from-week-2_instructions.html 5.0 KB
  921. 01_welcome-to-week-3.en.srt 1.3 KB
  922. 01_welcome-to-week-3.en.txt 835 bytes
  923. 01_welcome-to-week-3.mp4 4.3 MB
  924. 02_logs-and-siem-tools.en.srt 4.0 KB
  925. 02_logs-and-siem-tools.en.txt 2.1 KB
  926. 02_logs-and-siem-tools.mp4 8.9 MB
  927. 03_siem-dashboards.en.srt 4.4 KB
  928. 03_siem-dashboards.en.txt 2.3 KB
  929. 03_siem-dashboards.mp4 10.8 MB
  930. 04_the-future-of-siem-tools_instructions.html 5.1 KB
  931. 05_parisa-the-parallels-of-accessibility-and-security.en.srt 3.8 KB
  932. 05_parisa-the-parallels-of-accessibility-and-security.en.txt 2.4 KB
  933. 05_parisa-the-parallels-of-accessibility-and-security.mp4 16.4 MB
  934. 01_explore-common-siem-tools.en.srt 4.3 KB
  935. 01_explore-common-siem-tools.en.txt 2.8 KB
  936. 01_explore-common-siem-tools.mp4 14.7 MB
  937. 02_more-about-cybersecurity-tools_instructions.html 5.5 KB
  938. 03_talya-myths-about-the-cybersecurity-field.en.srt 3.1 KB
  939. 03_talya-myths-about-the-cybersecurity-field.en.txt 1.6 KB
  940. 03_talya-myths-about-the-cybersecurity-field.mp4 9.6 MB
  941. 04_use-siem-tools-to-protect-organizations_instructions.html 8.6 KB
  942. 01_wrap-up.en.srt 1.2 KB
  943. 01_wrap-up.en.txt 780 bytes
  944. 01_wrap-up.mp4 2.6 MB
  945. 02_glossary-terms-from-week-3_instructions.html 2.6 KB
  946. 01_welcome-to-week-4.en.srt 912 bytes
  947. 01_welcome-to-week-4.en.txt 548 bytes
  948. 01_welcome-to-week-4.mp4 3.0 MB
  949. 02_phases-of-an-incident-response-playbook.en.srt 7.9 KB
  950. 02_phases-of-an-incident-response-playbook.en.txt 4.2 KB
  951. 02_phases-of-an-incident-response-playbook.mp4 24.3 MB
  952. 03_more-about-playbooks_guidelines.html 17.4 KB
  953. 03_more-about-playbooks_instructions.html 200.4 KB
  954. 01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.en.srt 5.9 KB
  955. 01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.en.txt 3.2 KB
  956. 01_use-a-playbook-to-respond-to-threats-risks-or-vulnerabilities.mp4 19.0 MB
  957. 02_erin-the-importance-of-diversity-of-perspective-on-a-security-team.en.srt 4.4 KB
  958. 02_erin-the-importance-of-diversity-of-perspective-on-a-security-team.en.txt 2.8 KB
  959. 02_erin-the-importance-of-diversity-of-perspective-on-a-security-team.mp4 19.9 MB
  960. 03_playbooks-siem-tools-and-soar-tools_instructions.html 3.1 KB
  961. 01_wrap-up.en.srt 1.2 KB
  962. 01_wrap-up.en.txt 836 bytes
  963. 01_wrap-up.mp4 4.4 MB
  964. 02_glossary-terms-from-week-4_instructions.html 1.5 KB
  965. 01_course-wrap-up.en.srt 1.9 KB
  966. 01_course-wrap-up.en.txt 1.2 KB
  967. 01_course-wrap-up.mp4 5.2 MB
  968. 02_course-2-glossary_Course_2_glossary.docx 858.5 KB
  969. 02_course-2-glossary_instructions.html 6.5 KB
  970. 03_get-started-on-the-next-course_instructions.html 793.2 KB
  971. 01__resources.html 18.6 KB
  972. 01__Google_Cybersecurity_Certificate_glossary.docx 879.3 KB
  973. 01__resources.html 6.5 KB
  974. 01__Course_2_glossary.docx 858.5 KB
  975. 01__resources.html 6.5 KB
  976. 01__Audit_and_Accountability_AU_CIO-IT_Security_01-08_Rev_6_12-03-2020docx.pdf 1.2 MB
  977. 01__Cyber-Incident-Response-Standard.docx 63.3 KB
  978. 01__Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response_Playbooks_508C.pdf 1.1 MB
  979. 01__Format-Security-plus-Study-Guide.pdf 16.8 KB
  980. 01__NIST.SP.800-218.pdf 722.5 KB
  981. 01__NIST.SP.800-53r5.pdf 5.8 MB
  982. 01__dod85.pdf 239.7 KB
  983. 01__guidelines.html 17.4 KB
  984. 01__index.html 21.3 KB
  985. 01__physical-access-control.pdf 6.9 MB
  986. 01__resources.html 33.1 KB
  987. 01__why-splunk.html 227.5 KB
  988. 01__resources.html 16.0 KB
  989. 01__resources.html 8.8 KB
  990. 01_introduction-to-course-3.en.srt 1.8 KB
  991. 01_introduction-to-course-3.en.txt 1.1 KB
  992. 01_introduction-to-course-3.mp4 3.6 MB
  993. 02_course-3-overview_instructions.html 1.2 MB
  994. 03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 879.3 KB
  995. 03_helpful-resources-and-tips_instructions.html 11.2 KB
  996. 01_welcome-to-week-1.en.srt 863 bytes
  997. 01_welcome-to-week-1.en.txt 533 bytes
  998. 01_welcome-to-week-1.mp4 2.3 MB
  999. 02_chris-my-path-to-cybersecurity.en.srt 4.9 KB
  1000. 02_chris-my-path-to-cybersecurity.en.txt 2.6 KB
  1001. 02_chris-my-path-to-cybersecurity.mp4 18.9 MB
  1002. 03_what-are-networks.en.srt 2.7 KB
  1003. 03_what-are-networks.en.txt 1.6 KB
  1004. 03_what-are-networks.mp4 6.2 MB
  1005. 04_tina-working-in-network-security.en.srt 3.1 KB
  1006. 04_tina-working-in-network-security.en.txt 1.6 KB
  1007. 04_tina-working-in-network-security.mp4 11.3 MB
  1008. 05_emmanuel-useful-skills-for-network-security.en.srt 4.9 KB
  1009. 05_emmanuel-useful-skills-for-network-security.en.txt 2.5 KB
  1010. 05_emmanuel-useful-skills-for-network-security.mp4 13.4 MB
  1011. 06_network-tools.en.srt 4.5 KB
  1012. 06_network-tools.en.txt 2.4 KB
  1013. 06_network-tools.mp4 7.0 MB
  1014. 07_network-components-devices-and-diagrams_instructions.html 1.7 MB
  1015. 08_cloud-networks.en.srt 3.6 KB
  1016. 08_cloud-networks.en.txt 2.3 KB
  1017. 08_cloud-networks.mp4 8.8 MB
  1018. 09_cloud-computing-and-software-defined-networks_instructions.html 694.1 KB
  1019. 10_test-your-knowledge-introduction-to-networks_quiz.html 3.5 KB
  1020. 01_introduction-to-network-communication.en.srt 3.7 KB
  1021. 01_introduction-to-network-communication.en.txt 2.3 KB
  1022. 01_introduction-to-network-communication.mp4 7.3 MB
  1023. 02_the-tcp-ip-model.en.srt 4.4 KB
  1024. 02_the-tcp-ip-model.en.txt 2.4 KB
  1025. 02_the-tcp-ip-model.mp4 9.0 MB
  1026. 03_the-four-layers-of-the-tcp-ip-model.en.srt 3.4 KB
  1027. 03_the-four-layers-of-the-tcp-ip-model.en.txt 1.8 KB
  1028. 03_the-four-layers-of-the-tcp-ip-model.mp4 6.5 MB
  1029. 04_learn-more-about-the-tcp-ip-model_instructions.html 1.5 MB
  1030. 05_the-osi-model_instructions.html 302.9 KB
  1031. 06_test-your-knowledge-network-communication_quiz.html 4.9 KB
  1032. 01_ip-addresses-and-network-communication.en.srt 4.2 KB
  1033. 01_ip-addresses-and-network-communication.en.txt 2.2 KB
  1034. 01_ip-addresses-and-network-communication.mp4 7.3 MB
  1035. 02_components-of-network-layer-communication_instructions.html 642.2 KB
  1036. 03_test-your-knowledge-local-and-wide-network-communication_quiz.html 3.7 KB
  1037. 01_wrap-up.en.srt 1.0 KB
  1038. 01_wrap-up.en.txt 620 bytes
  1039. 01_wrap-up.mp4 1.7 MB
  1040. 02_glossary-terms-from-week-1_instructions.html 4.5 KB
  1041. 03_weekly-challenge-1_exam.html 8.4 KB
  1042. 01_welcome-to-week-2.en.srt 2.0 KB
  1043. 01_welcome-to-week-2.en.txt 1.1 KB
  1044. 01_welcome-to-week-2.mp4 4.6 MB
  1045. 02_network-protocols.en.srt 6.0 KB
  1046. 02_network-protocols.en.txt 3.3 KB
  1047. 02_network-protocols.mp4 11.3 MB
  1048. 03_common-network-protocols_instructions.html 8.7 KB
  1049. 04_additional-network-protocols_instructions.html 11.1 KB
  1050. 05_test-your-knowledge-recognize-different-network-protocols_quiz.html 3.4 KB
  1051. 06_wireless-protocols.en.srt 2.1 KB
  1052. 06_wireless-protocols.en.txt 1.1 KB
  1053. 06_wireless-protocols.mp4 5.1 MB
  1054. 07_the-evolution-of-wireless-security-protocols_instructions.html 159.2 KB
  1055. 01_firewalls-and-network-security-measures.en.srt 7.4 KB
  1056. 01_firewalls-and-network-security-measures.en.txt 3.9 KB
  1057. 01_firewalls-and-network-security-measures.mp4 16.8 MB
  1058. 02_virtual-private-networks-vpns.en.srt 4.3 KB
  1059. 02_virtual-private-networks-vpns.en.txt 2.3 KB
  1060. 02_virtual-private-networks-vpns.mp4 8.1 MB
  1061. 03_security-zones.en.srt 6.0 KB
  1062. 03_security-zones.en.txt 3.2 KB
  1063. 03_security-zones.mp4 12.0 MB
  1064. 04_subnetting-and-cidr_instructions.html 133.9 KB
  1065. 05_proxy-servers.en.srt 4.9 KB
  1066. 05_proxy-servers.en.txt 3.1 KB
  1067. 05_proxy-servers.mp4 11.2 MB
  1068. 06_virtual-networks-and-privacy_instructions.html 8.4 KB
  1069. 07_test-your-knowledge-system-identification_quiz.html 4.3 KB
  1070. 01_wrap-up.en.srt 1.1 KB
  1071. 01_wrap-up.en.txt 727 bytes
  1072. 01_wrap-up.mp4 2.8 MB
  1073. 02_glossary-terms-from-week-2_instructions.html 5.1 KB
  1074. 03_weekly-challenge-2_exam.html 8.4 KB
  1075. 01_welcome-to-week-3.en.srt 710 bytes
  1076. 01_welcome-to-week-3.en.txt 447 bytes
  1077. 01_welcome-to-week-3.mp4 1.3 MB
  1078. 02_the-case-for-securing-networks.en.srt 2.2 KB
  1079. 02_the-case-for-securing-networks.en.txt 1.4 KB
  1080. 02_the-case-for-securing-networks.mp4 5.5 MB
  1081. 03_how-intrusions-compromise-your-system_instructions.html 6.6 KB
  1082. 01_denial-of-service-dos-attacks.en.srt 7.8 KB
  1083. 01_denial-of-service-dos-attacks.en.txt 4.2 KB
  1084. 01_denial-of-service-dos-attacks.mp4 18.6 MB
  1085. 02_read-tcpdump-logs_instructions.html 146.6 KB
  1086. 03_activity-analyze-network-layer-communication_quiz.html 1.3 KB
  1087. 04_real-life-ddos-attack_instructions.html 5.1 KB
  1088. 05_test-your-knowledge-secure-networks-against-denial-of-service-dos-attacks_quiz.html 3.8 KB
  1089. 01_malicious-packet-sniffing.en.srt 8.0 KB
  1090. 01_malicious-packet-sniffing.en.txt 4.3 KB
  1091. 01_malicious-packet-sniffing.mp4 19.3 MB
  1092. 02_ip-spoofing.en.srt 5.1 KB
  1093. 02_ip-spoofing.en.txt 2.7 KB
  1094. 02_ip-spoofing.mp4 11.5 MB
  1095. 03_overview-of-interception-tactics_instructions.html 7.2 KB
  1096. 04_activity-analyze-network-attacks_quiz.html 1.2 KB
  1097. 05_test-your-knowledge-network-interception-attack-tactics_quiz.html 4.0 KB
  1098. 01_wrap-up.en.srt 1.4 KB
  1099. 01_wrap-up.en.txt 747 bytes
  1100. 01_wrap-up.mp4 2.9 MB
  1101. 02_glossary-terms-from-week-3_instructions.html 3.8 KB
  1102. 03_weekly-challenge-3_exam.html 9.3 KB
  1103. 01_welcome-to-week-4.en.srt 1.5 KB
  1104. 01_welcome-to-week-4.en.txt 929 bytes
  1105. 01_welcome-to-week-4.mp4 3.8 MB
  1106. 02_security-hardening.en.srt 4.6 KB
  1107. 02_security-hardening.en.txt 2.9 KB
  1108. 02_security-hardening.mp4 12.2 MB
  1109. 01_os-hardening-practices.en.srt 7.5 KB
  1110. 01_os-hardening-practices.en.txt 4.0 KB
  1111. 01_os-hardening-practices.mp4 18.0 MB
  1112. 02_brute-force-attacks-and-os-hardening_instructions.html 8.1 KB
  1113. 03_activity-apply-os-hardening-techniques_quiz.html 1.3 KB
  1114. 04_test-your-knowledge-os-hardening_quiz.html 3.7 KB
  1115. 01_network-hardening-practices.en.srt 6.2 KB
  1116. 01_network-hardening-practices.en.txt 3.3 KB
  1117. 01_network-hardening-practices.mp4 16.9 MB
  1118. 02_network-security-applications_instructions.html 2.9 MB
  1119. 03_activity-analysis-of-network-hardening_quiz.html 1.2 KB
  1120. 04_test-your-knowledge-network-hardening_quiz.html 3.8 KB
  1121. 01_network-security-in-the-cloud.en.srt 2.8 KB
  1122. 01_network-security-in-the-cloud.en.txt 1.8 KB
  1123. 01_network-security-in-the-cloud.mp4 9.7 MB
  1124. 02_kelsey-cloud-security-explained.en.srt 3.8 KB
  1125. 02_kelsey-cloud-security-explained.en.txt 2.3 KB
  1126. 02_kelsey-cloud-security-explained.mp4 21.9 MB
  1127. 03_secure-the-cloud_instructions.html 9.0 KB
  1128. 04_test-your-knowledge-cloud-hardening_quiz.html 3.6 KB
  1129. 01_wrap-up.en.srt 1.6 KB
  1130. 01_wrap-up.en.txt 909 bytes
  1131. 01_wrap-up.mp4 3.1 MB
  1132. 02_glossary-terms-from-week-4_instructions.html 2.8 KB
  1133. 03_weekly-challenge-4_exam.html 9.5 KB
  1134. 04_portfolio-activity-use-the-nist-cybersecurity-framework-to-respond-to-a-security_exam.html 3.5 KB
  1135. 01_course-wrap-up.en.srt 2.9 KB
  1136. 01_course-wrap-up.en.txt 1.9 KB
  1137. 01_course-wrap-up.mp4 6.6 MB
  1138. 02_course-3-glossary_Course_3_glossary.docx 857.6 KB
  1139. 02_course-3-glossary_instructions.html 6.4 KB
  1140. 03_get-started-on-the-next-course_instructions.html 786.5 KB
  1141. 01__resources.html 18.6 KB
  1142. 01__Google_Cybersecurity_Certificate_glossary.docx 879.3 KB
  1143. 01__resources.html 6.5 KB
  1144. 01__Course_3_glossary.docx 857.6 KB
  1145. 01__resources.html 6.4 KB
  1146. 01__7.1 11.7 KB
  1147. 01__7.2 7.5 KB
  1148. 01__aa494182vexchg.140 33.9 KB
  1149. 01__article.asp 62.8 KB
  1150. 01__index.html 22.9 KB
  1151. 01__resources.html 17.6 KB
  1152. 01__sp800-179r1-draft.pdf 1.8 MB
  1153. 01__what-is-a-firewall.html 61.3 KB
  1154. 01__resources.html 16.0 KB
  1155. 01__resources.html 8.8 KB
  1156. 01_introduction-to-course-8.en.srt 3.8 KB
  1157. 01_introduction-to-course-8.en.txt 2.4 KB
  1158. 01_introduction-to-course-8.mp4 13.1 MB
  1159. 02_course-8-overview_instructions.html 1.4 MB
  1160. 03_dion-my-personal-career-journey.en.srt 3.7 KB
  1161. 03_dion-my-personal-career-journey.en.txt 2.3 KB
  1162. 03_dion-my-personal-career-journey.mp4 16.9 MB
  1163. 04_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 879.3 KB
  1164. 04_helpful-resources-and-tips_instructions.html 11.2 KB
  1165. 01_welcome-to-week-1.en.srt 1.0 KB
  1166. 01_welcome-to-week-1.en.txt 545 bytes
  1167. 01_welcome-to-week-1.mp4 1.8 MB
  1168. 02_security-as-a-mindset.en.srt 5.1 KB
  1169. 02_security-as-a-mindset.en.txt 2.7 KB
  1170. 02_security-as-a-mindset.mp4 16.9 MB
  1171. 03_data-and-asset-classification_instructions.html 5.7 KB
  1172. 01_detect-and-protect-without-neglect.en.srt 5.7 KB
  1173. 01_detect-and-protect-without-neglect.en.txt 3.1 KB
  1174. 01_detect-and-protect-without-neglect.mp4 18.6 MB
  1175. 02_disaster-recovery-and-business-continuity_instructions.html 5.5 KB
  1176. 03_julianas-story-asset-protection_instructions.html 5.0 KB
  1177. 01_wrap-up.en.srt 1.5 KB
  1178. 01_wrap-up.en.txt 1018 bytes
  1179. 01_wrap-up.mp4 4.1 MB
  1180. 02_glossary-terms-from-week-1_instructions.html 2.3 KB
  1181. 01_welcome-to-week-2.en.srt 2.3 KB
  1182. 01_welcome-to-week-2.en.txt 1.2 KB
  1183. 01_welcome-to-week-2.mp4 6.1 MB
  1184. 02_the-importance-of-escalation.en.srt 6.6 KB
  1185. 02_the-importance-of-escalation.en.txt 3.6 KB
  1186. 02_the-importance-of-escalation.mp4 19.0 MB
  1187. 03_escalate-with-a-purpose_instructions.html 4.8 KB
  1188. 01_prepare-to-escalate-through-security-recognition.en.srt 5.6 KB
  1189. 01_prepare-to-escalate-through-security-recognition.en.txt 2.9 KB
  1190. 01_prepare-to-escalate-through-security-recognition.mp4 17.3 MB
  1191. 02_recognize-roles-and-responsibilities-during-escalation_instructions.html 4.3 KB
  1192. 01_from-simple-activity-to-major-data-breach.en.srt 5.5 KB
  1193. 01_from-simple-activity-to-major-data-breach.en.txt 2.9 KB
  1194. 01_from-simple-activity-to-major-data-breach.mp4 18.3 MB
  1195. 02_when-and-how-to-escalate-a-security-incident.en.srt 3.4 KB
  1196. 02_when-and-how-to-escalate-a-security-incident.en.txt 2.1 KB
  1197. 02_when-and-how-to-escalate-a-security-incident.mp4 12.8 MB
  1198. 03_escalation-timing_instructions.html 5.5 KB
  1199. 04_julianas-story-attention-to-detail_instructions.html 4.8 KB
  1200. 01_wrap-up.en.srt 1.6 KB
  1201. 01_wrap-up.en.txt 1.0 KB
  1202. 01_wrap-up.mp4 4.5 MB
  1203. 02_glossary-terms-from-week-2_instructions.html 2.4 KB
  1204. 01_welcome-to-week-3.en.srt 1.2 KB
  1205. 01_welcome-to-week-3.en.txt 715 bytes
  1206. 01_welcome-to-week-3.mp4 3.7 MB
  1207. 02_stakeholders-in-cybersecurity.en.srt 6.8 KB
  1208. 02_stakeholders-in-cybersecurity.en.txt 3.6 KB
  1209. 02_stakeholders-in-cybersecurity.mp4 15.1 MB
  1210. 03_the-purpose-and-impact-of-stakeholders_instructions.html 5.6 KB
  1211. 01_clear-and-concise-communication.en.srt 3.7 KB
  1212. 01_clear-and-concise-communication.en.txt 2.0 KB
  1213. 01_clear-and-concise-communication.mp4 12.1 MB
  1214. 02_building-blocks-of-cybersecurity-communications.en.srt 5.8 KB
  1215. 02_building-blocks-of-cybersecurity-communications.en.txt 3.1 KB
  1216. 02_building-blocks-of-cybersecurity-communications.mp4 17.0 MB
  1217. 03_communicate-effectively-with-stakeholders_instructions.html 5.0 KB
  1218. 01_visual-storytelling-in-cybersecurity.en.srt 3.8 KB
  1219. 01_visual-storytelling-in-cybersecurity.en.txt 2.4 KB
  1220. 01_visual-storytelling-in-cybersecurity.mp4 16.1 MB
  1221. 02_create-visual-dashboards-for-impactful-cybersecurity-communications_instructions.html 5.0 KB
  1222. 03_how-to-create-a-visual-dashboard.en.srt 5.2 KB
  1223. 03_how-to-create-a-visual-dashboard.en.txt 3.1 KB
  1224. 03_how-to-create-a-visual-dashboard.mp4 18.1 MB
  1225. 04_julianas-story-effective-communication_instructions.html 4.5 KB
  1226. 01_wrap-up.en.srt 2.9 KB
  1227. 01_wrap-up.en.txt 1.5 KB
  1228. 01_wrap-up.mp4 9.0 MB
  1229. 02_glossary-terms-from-week-3_instructions.html 1.3 KB
  1230. 01_welcome-to-week-4.en.srt 2.2 KB
  1231. 01_welcome-to-week-4.en.txt 1.4 KB
  1232. 01_welcome-to-week-4.mp4 6.8 MB
  1233. 02_helpful-cybersecurity-resources.en.srt 4.2 KB
  1234. 02_helpful-cybersecurity-resources.en.txt 2.2 KB
  1235. 02_helpful-cybersecurity-resources.mp4 15.3 MB
  1236. 03_strategies-for-engaging-with-the-cybersecurity-community_instructions.html 5.5 KB
  1237. 04_victoria-continue-your-learning-journey.en.srt 3.9 KB
  1238. 04_victoria-continue-your-learning-journey.en.txt 2.5 KB
  1239. 04_victoria-continue-your-learning-journey.mp4 15.4 MB
  1240. 01_engage-with-the-cybersecurity-community-in-a-meaningful-way.en.srt 4.7 KB
  1241. 01_engage-with-the-cybersecurity-community-in-a-meaningful-way.en.txt 3.1 KB
  1242. 01_engage-with-the-cybersecurity-community-in-a-meaningful-way.mp4 14.7 MB
  1243. 02_connect-with-other-cybersecurity-professionals_instructions.html 4.2 KB
  1244. 03_sarah-network-in-the-cybersecurity-community.en.srt 3.5 KB
  1245. 03_sarah-network-in-the-cybersecurity-community.en.txt 2.2 KB
  1246. 03_sarah-network-in-the-cybersecurity-community.mp4 10.3 MB
  1247. 01_wrap-up.en.srt 1.4 KB
  1248. 01_wrap-up.en.txt 856 bytes
  1249. 01_wrap-up.mp4 3.8 MB
  1250. 02_glossary-terms-from-week-4_instructions.html 1.1 KB
  1251. 01_welcome-to-week-5.en.srt 2.6 KB
  1252. 01_welcome-to-week-5.en.txt 1.5 KB
  1253. 01_welcome-to-week-5.mp4 7.5 MB
  1254. 02_find-cybersecurity-jobs.en.srt 5.5 KB
  1255. 02_find-cybersecurity-jobs.en.txt 3.0 KB
  1256. 02_find-cybersecurity-jobs.mp4 16.3 MB
  1257. 03_create-a-resume.en.srt 6.2 KB
  1258. 03_create-a-resume.en.txt 3.9 KB
  1259. 03_create-a-resume.mp4 11.9 MB
  1260. 04_tips-for-finding-and-applying-for-a-job_instructions.html 4.2 KB
  1261. 05_garvey-cover-letter-tips.en.srt 5.0 KB
  1262. 05_garvey-cover-letter-tips.en.txt 3.0 KB
  1263. 05_garvey-cover-letter-tips.mp4 11.6 MB
  1264. 01_explore-the-interview-process.en.srt 6.4 KB
  1265. 01_explore-the-interview-process.en.txt 3.4 KB
  1266. 01_explore-the-interview-process.mp4 14.0 MB
  1267. 02_the-interview-process_instructions.html 5.3 KB
  1268. 03_garvey-technical-interview-tips.en.srt 4.6 KB
  1269. 03_garvey-technical-interview-tips.en.txt 2.9 KB
  1270. 03_garvey-technical-interview-tips.mp4 11.2 MB
  1271. 04_prepare-for-technical-interviews_instructions.html 5.6 KB
  1272. 05_conduct-pre-interview-research.en.srt 5.0 KB
  1273. 05_conduct-pre-interview-research.en.txt 2.7 KB
  1274. 05_conduct-pre-interview-research.mp4 12.6 MB
  1275. 06_build-rapport-with-interviewers.en.srt 6.0 KB
  1276. 06_build-rapport-with-interviewers.en.txt 3.2 KB
  1277. 06_build-rapport-with-interviewers.mp4 13.6 MB
  1278. 01_use-strategies-to-answer-interview-questions.en.srt 4.3 KB
  1279. 01_use-strategies-to-answer-interview-questions.en.txt 2.8 KB
  1280. 01_use-strategies-to-answer-interview-questions.mp4 12.0 MB
  1281. 02_apply-the-star-method-during-interviews_instructions.html 51.0 KB
  1282. 03_prepare-for-interviews_instructions.html 5.5 KB
  1283. 03_prepare-for-interviews_vol01iss13.cfm 45.5 KB
  1284. 04_ask-the-interviewer-questions.en.srt 2.5 KB
  1285. 04_ask-the-interviewer-questions.en.txt 1.6 KB
  1286. 04_ask-the-interviewer-questions.mp4 7.9 MB
  1287. 05_karan-interview-tips-from-a-hiring-manager.en.srt 4.9 KB
  1288. 05_karan-interview-tips-from-a-hiring-manager.en.txt 2.6 KB
  1289. 05_karan-interview-tips-from-a-hiring-manager.mp4 18.5 MB
  1290. 06_prepare-for-interviews-with-interview-warmup_instructions.html 183.1 KB
  1291. 01_develop-an-elevator-pitch.en.srt 4.5 KB
  1292. 01_develop-an-elevator-pitch.en.txt 2.9 KB
  1293. 01_develop-an-elevator-pitch.mp4 13.0 MB
  1294. 02_learn-more-about-developing-an-elevator-pitch_instructions.html 5.0 KB
  1295. 03_tips-for-interviewing-remotely_instructions.html 5.6 KB
  1296. 04_emily-overcome-imposter-syndrome.en.srt 4.7 KB
  1297. 04_emily-overcome-imposter-syndrome.en.txt 2.6 KB
  1298. 04_emily-overcome-imposter-syndrome.mp4 13.9 MB
  1299. 01_wrap-up.en.srt 1.1 KB
  1300. 01_wrap-up.en.txt 586 bytes
  1301. 01_wrap-up.mp4 2.0 MB
  1302. 02_glossary-terms-from-week-5_instructions.html 1.4 KB
  1303. 03_course-wrap-up.en.srt 1.8 KB
  1304. 03_course-wrap-up.en.txt 1.1 KB
  1305. 03_course-wrap-up.mp4 2.7 MB
  1306. 04_course-8-glossary_Course_8_glossary.docx 1.1 MB
  1307. 04_course-8-glossary_instructions.html 6.4 KB
  1308. 01_recap-of-the-google-cybersecurity-certificate-program.en.srt 3.9 KB
  1309. 01_recap-of-the-google-cybersecurity-certificate-program.en.txt 2.1 KB
  1310. 01_recap-of-the-google-cybersecurity-certificate-program.mp4 8.8 MB
  1311. 02_congratulations-on-completing-the-google-cybersecurity-certificate-program.en.srt 2.8 KB
  1312. 02_congratulations-on-completing-the-google-cybersecurity-certificate-program.en.txt 1.4 KB
  1313. 02_congratulations-on-completing-the-google-cybersecurity-certificate-program.mp4 9.4 MB
  1314. 03_showcase-your-work_instructions.html 899.2 KB
  1315. 03_showcase-your-work_overview.html 636.5 KB
  1316. 04_claim-your-google-cybersecurity-certificate-badge_instructions.html 4.5 KB
  1317. 05_google-cybersecurity-certificate-glossary_Google_Cybersecurity_Certificate_glossary.docx 879.3 KB
  1318. 05_google-cybersecurity-certificate-glossary_instructions.html 6.5 KB
  1319. 01__resources.html 18.6 KB
  1320. 01__Course_8_glossary.docx 1.1 MB
  1321. 01__resources.html 6.4 KB
  1322. 01__R0239.pdf 220.6 KB
  1323. 01__nist.sp.800-61r2.pdf 1.5 MB
  1324. 01__overview.html 636.5 KB
  1325. 01__resources.html 11.5 KB
  1326. 01__vol01iss13.cfm 45.5 KB
  1327. 01__Google_Cybersecurity_Certificate_glossary.docx 879.3 KB
  1328. 01__resources.html 6.5 KB
  1329. 01__resources.html 16.0 KB
  1330. 01__resources.html 8.7 KB

Discussion