Google
Google Cybersecurity Professional Certificate
Google

Google Cybersecurity Professional Certificate

Get on the fast track to a career in cybersecurity. In this certificate program, you'll learn in-demand skills, and get AI training from Google experts. Learn at your own pace, no degree or experience required.

Google Career Certificates

Top Instructor

908,553 already enrolled

Included with Coursera Plus

Earn a career credential that demonstrates your expertise
4.8

(42,217 reviews)

Beginner level
No prior experience required
6 months
at 7 hours a week
Flexible schedule
Learn at your own pace
Earn a career credential that demonstrates your expertise
4.8

(42,217 reviews)

Beginner level
No prior experience required
6 months
at 7 hours a week
Flexible schedule
Learn at your own pace
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

Professional Certificate - 8 course series

Foundations of Cybersecurity

Course 19 hours4.9 (32,866 ratings)

What you'll learn

  • Recognize core skills and knowledge needed to become a cybersecurity analyst

  • Identify how security attacks impact business operations

  • Explain security ethics

  • Identify common tools used by cybersecurity analysts

Skills you'll gain

Category: Network Infrastructure
Category: Hardening
Category: Network Security
Category: General Networking
Category: Computer Networking
Category: Virtual Private Networks (VPN)
Category: TCP/IP
Category: Network Architecture
Category: Network Protocols
Category: Cloud Networks
Category: Intrusion Detection and Prevention
Category: Vulnerability Assessments
Category: Firewall
Category: Transmission Control Protocol / Internet Protocol (TCP/IP)
Category: Cloud Computing
Category: Security Hardening

Play It Safe: Manage Security Risks

Course 29 hours4.8 (9,238 ratings)

What you'll learn

  • Identify the primary threats, risks, and vulnerabilities to business operations

  • Examine how organizations use security frameworks and controls to protect business operations

  • Define commonly used Security Information and Event Management (SIEM) tools

  • Use a playbook to respond to threats, risks, and vulnerabilities

Skills you'll gain

Category: Security Management
Category: Continuous Monitoring
Category: Risk Management
Category: Data Security
Category: Security Information and Event Management (SIEM)
Category: Threat Management
Category: Enterprise Security
Category: Auditing
Category: NIST Risk Management Framework (RMF)
Category: Open Web Application Security Project (OWASP)
Category: Risk Mitigation
Category: Cybersecurity
Category: Security Strategy
Category: Risk Analysis
Category: Incident Response
Category: Information Systems Security
Category: Computer Security
Category: Threat Modeling
Category: Security Controls
Category: Incident Response Playbooks
Category: Security Audits
Category: Information Assurance
Category: NIST Cybersecurity Framework (CSF)
Category: Information Security (INFOSEC)
Category: Cyber Risk

Connect and Protect: Networks and Network Security

Course 311 hours4.8 (6,104 ratings)

What you'll learn

  • Define the types of networks and components of networks

  • Illustrate how data is sent and received over a network

  • Understand how to secure a network against intrusion tactics

  • Describe system hardening techniques

Skills you'll gain

Category: Command-Line Interface
Category: File Systems
Category: Operating Systems
Category: Query Languages
Category: Relational Databases
Category: Linux Commands
Category: Authentications
Category: SQL
Category: Database Management
Category: User Accounts
Category: Command line interface (CLI)
Category: Authorization (Computing)
Category: Linux
Category: Unix Shell
Category: Bash

Tools of the Trade: Linux and SQL

Course 421 hours4.8 (5,300 ratings)

What you'll learn

  • Explain the relationship between operating systems, applications, and hardware

  • Compare a graphical user interface to a command line interface

  • Navigate and manage the file system using Linux commands via the Bash shell

  • Use SQL to retrieve information from a database

Skills you'll gain

Category: resume and portfolio preparation
Category: Interviewing Skills
Category: Professional Networking
Category: Data Ethics
Category: Data Security
Category: Job preparedness
Category: stakeholder communication
Category: Business Ethics
Category: Stakeholder Communications
Category: Cybersecurity
Category: Computer Security Incident Management
Category: Incident Response
Category: Security Awareness
Category: Incident Management
Category: escalation
Category: Stakeholder Engagement
Category: Asset Protection
Category: integrity and discretion
Category: Communication
Category: Ethical Standards And Conduct

Assets, Threats, and Vulnerabilities

Course 519 hours4.8 (3,510 ratings)

What you'll learn

  • Classify assets

  • Analyze an attack surface to find risks and vulnerabilities

  • Identify threats, such as social engineering, malware and web-based exploits

  • Summarize the threat modeling process

Skills you'll gain

Category: Malware Protection
Category: threat analysis
Category: Cyber Attacks
Category: Data Security
Category: Threat Detection
Category: Cryptography
Category: Vulnerability Management
Category: NIST 800-53
Category: Personally Identifiable Information
Category: vulnerability assessment
Category: Cybersecurity
Category: Security Strategy
Category: Authentications
Category: asset classification
Category: Threat Modeling
Category: Security Controls
Category: Encryption
Category: MITRE ATT&CK Framework
Category: Vulnerability Assessments
Category: Authorization (Computing)
Category: Cyber Risk
Category: Authentication

Sound the Alarm: Detection and Response

Course 617 hours4.8 (2,918 ratings)

What you'll learn

  • Identify the steps to contain, eradicate, and recover from an incident

  • Analyze packets to interpret network communications

  • Understand basic syntax, components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools

  • Perform queries in Security Information and Event Management (SIEM) tools to investigate an event

Skills you'll gain

Category: Cyber Attacks
Category: Data Ethics
Category: Security Information and Event Management (SIEM)
Category: Personally Identifiable Information
Category: Cybersecurity
Category: Security Strategy
Category: Information Systems Security Assessment Framework (ISSAF)
Category: Security Awareness
Category: Security Controls
Category: Network Analysis
Category: Information Assurance
Category: NIST Cybersecurity Framework (CSF)
Category: Information Security (INFOSEC)
Category: Cyber Risk
Category: Historical Attacks
Category: Ethics in cybersecurity

Automate Cybersecurity Tasks with Python

Course 724 hours4.8 (2,995 ratings)

What you'll learn

  • Explain how the Python programming language is used in cybersecurity

  • Create new, user-defined Python functions

  • Use regular expressions to extract information from text

  • Practice debugging code

Skills you'll gain

Category: Continuous Monitoring
Category: Network Security
Category: Security Information and Event Management (SIEM)
Category: Security Information and Event Management (SIEM) tools
Category: Threat Detection
Category: TCP/IP
Category: Computer Security Incident Management
Category: Packet Analyzer
Category: Intrusion Detection Systems (IDS)
Category: Network Protocols
Category: Incident Response
Category: Record Keeping
Category: Intrusion Detection and Prevention
Category: Network Monitoring
Category: Incident Management
Category: Event Monitoring
Category: Splunk
Category: Network Analysis
Category: Technical Documentation

Put It to Work: Prepare for Cybersecurity Jobs

Course 814 hours4.8 (4,849 ratings)

What you'll learn

  • Determine when and how to escalate a security incident

  • Engage with the cybersecurity community

  • Apply for cybersecurity jobs and prepare for interviews.

  • Gain a competitive edge by learning AI skills from Google experts.

  • Boost your cybersecurity skills with AI
  • Decode complex security frameworks with AI
  • Use AI to help identify bugs
  • Refine code with help from AI
  • Understand system vulnerabilities with AI
  • Prioritize alerts with AI

Skills you'll gain

Category: Algorithms
Category: Scripting
Category: PEP 8 style guide
Category: Coding
Category: Automation
Category: Computer Programming
Category: Programming Principles
Category: Debugging
Category: File Management
Category: Data Import/Export
Category: Cybersecurity
Category: Python Programming

Instructor

Google Career Certificates

Top Instructor

Google
326 Courses12,244,606 learners

Offered by

Google