This is the fourth course in the Google Cybersecurity Certificate program. These courses will provide you with the skills you need to apply for an entry-level cybersecurity job. You will build on your understanding of the topics that were introduced in the third Google Cybersecurity Certificate course.
In this course, you will learn about the computing skills that you will use on the job as a cybersecurity analyst. First, you will practice using Linux, an operating system commonly used by cybersecurity professionals. You will learn how to use the Linux command line through the Bash shell to navigate and manage the file system, as well as authenticate users. Then, you will learn how to use SQL to communicate with a database.
Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs.
Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary.
By the end of this course, you will be able to:
- Explain the relationship between operating systems, applications, and hardware.
- Compare a graphical user interface to a command line interface.
- Identify the unique features of common Linux distributions.
- Navigate and manage the file system using Linux commands via the Bash shell.
- Use Linux commands via the Bash shell to authenticate and authorize users.
- Describe how a relational database is organized.
- Use SQL to retrieve information from a database.
- Apply filters to SQL queries and use joins to combine multiple tables.
Week 1 | Introduction to operating systems |
Week 2 | The Linux operating system |
Week 3 | Linux commands in the Bash shell |
Week 4 | Databases and SQL |