
Overview

Coursera Plus Annual Sale:
All Certificates & Courses 50% Off!
Grab it
Prepare for a new career in the high-growth field of cybersecurity, no degree or experience required. Get professional training designed and delivered by subject matter experts at Google and have the opportunity to connect with top employers.
Organizations must continuously protect themselves and the people they serve from cyber-related threats, like fraud and phishing. They rely on cybersecurity to maintain the confidentiality, integrity, and availability of their internal systems and information. Cybersecurity analysts use a collection of methods and technologies to safeguard against threats and unauthorized access — and to create and implement solutions should a threat get through.
During the 8 courses in this certificate program, you’ll learn from cybersecurity experts at Google and gain in-demand skills that prepare you for entry-level roles like cybersecurity analyst, security operations center (SOC) analyst, and more. At under 10 hours per week, you can complete the certificate in less than 6 months.
Upon completion of the certificate, you can directly apply for jobs with Google and over 150 U.S. employers, including American Express, Deloitte, Colgate-Palmolive, Mandiant (now part of Google Cloud), T-Mobile, and Walmart.
The Google Cybersecurity Certificate helps prepare you for the CompTIA Security+ exam, the industry leading certification for cybersecurity roles. You’ll earn a dual credential when you complete both.
Syllabus
Course 1: Foundations of Cybersecurity
- Offered by Google. This is the first course in the Google Cybersecurity Certificate. In this course, learners will be introduced to the ... Enroll for free.
Course 2: Play It Safe: Manage Security Risks
- Offered by Google. This course takes a deeper dive into concepts introduced in the first course, with an emphasis on recognizing the focus ... Enroll for free.
Course 3: Connect and Protect: Networks and Network Security
- Offered by Google. This course provides a brief introduction to network architecture, operations, intrusion tactics, and security hardening. ... Enroll for free.
Course 4: Tools of the Trade: Linux and SQL
- Offered by Google. This course focuses on foundational computing skills that support the work of a security analyst. It begins with an ... Enroll for free.
Course 5: Assets, Threats, and Vulnerabilities
- Offered by Google. This is the fifth course in the Google Cybersecurity Certificate. These courses will further explore the importance of ... Enroll for free.
Course 6: Sound the Alarm: Detection and Response
- Offered by Google. This is the sixth course in the Google Cybersecurity Certificate. Learners will focus on incident detection and response. ... Enroll for free.
Course 7: Automate Cybersecurity Tasks with Python
- Offered by Google. This is the seventh course in the Google Cybersecurity Certificate. In this course, learners will be introduced to the ... Enroll for free.
Course 8: Put It to Work: Prepare for Cybersecurity Jobs
- Offered by Google. This is the eighth and final course in the Google Cybersecurity Certificate. In this course, learners will define ... Enroll for free.
Course 9: Accelerate Your Job Search with AI
- Offered by Google. All Google Career Certificates now include an optional course, Accelerate Your Job Search with AI. This course was ... Enroll for free.
- Offered by Google. This is the first course in the Google Cybersecurity Certificate. In this course, learners will be introduced to the ... Enroll for free.
Course 2: Play It Safe: Manage Security Risks
- Offered by Google. This course takes a deeper dive into concepts introduced in the first course, with an emphasis on recognizing the focus ... Enroll for free.
Course 3: Connect and Protect: Networks and Network Security
- Offered by Google. This course provides a brief introduction to network architecture, operations, intrusion tactics, and security hardening. ... Enroll for free.
Course 4: Tools of the Trade: Linux and SQL
- Offered by Google. This course focuses on foundational computing skills that support the work of a security analyst. It begins with an ... Enroll for free.
Course 5: Assets, Threats, and Vulnerabilities
- Offered by Google. This is the fifth course in the Google Cybersecurity Certificate. These courses will further explore the importance of ... Enroll for free.
Course 6: Sound the Alarm: Detection and Response
- Offered by Google. This is the sixth course in the Google Cybersecurity Certificate. Learners will focus on incident detection and response. ... Enroll for free.
Course 7: Automate Cybersecurity Tasks with Python
- Offered by Google. This is the seventh course in the Google Cybersecurity Certificate. In this course, learners will be introduced to the ... Enroll for free.
Course 8: Put It to Work: Prepare for Cybersecurity Jobs
- Offered by Google. This is the eighth and final course in the Google Cybersecurity Certificate. In this course, learners will define ... Enroll for free.
Course 9: Accelerate Your Job Search with AI
- Offered by Google. All Google Career Certificates now include an optional course, Accelerate Your Job Search with AI. This course was ... Enroll for free.
Courses
-
This is the first course in the Google Cybersecurity Certificate. In this course, learners will be introduced to the cybersecurity profession, including the primary job responsibilities and core skills of entry-level analysts; significant events that led to the development of the cybersecurity field; and security’s continued importance to organizational operations. Learners will also explore the Certified Information Systems Security Professional (CISSP) eight security domains, common security frameworks and controls, as well as the confidentiality, integrity, and availability (CIA) triad. This course covers a wide variety of cybersecurity topics to provide an overview of what’s to come in this certificate program. Learners who complete the eight courses in the Google Cybersecurity Certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Identify how security attacks impact business operations. - Explore the job responsibilities and core skills of an entry-level cybersecurity analyst. - Recognize how past and present attacks on organizations led to the development of the cybersecurity field. - Learn the CISSP eight security domains. - Identify security domains, frameworks, and controls. - Explain security ethics. - Recognize common tools used by cybersecurity analysts.
-
This course focuses on foundational computing skills that support the work of a security analyst. It begins with an introduction to computer operating systems, followed by a closer exploration of Linux, an operating system commonly used by security professionals. By the end of this course, learners will be able to use the Linux command line through the Bash shell to navigate and manage the file system and to authenticate and authorize users, and they will also be able to use SQL to communicate with a database. By the end of this course, you will: - Explain the relationship between operating systems, applications, and hardware. - Compare a graphical user interface to a command line interface. - Identify the unique features of common Linux distributions. - Navigate and manage the file system using Linux commands via the Bash shell. - Use Linux commands via the Bash shell to authenticate and authorize users. - Describe how a relational database is organized. - Use SQL to retrieve information from a database. - Apply filters to SQL queries and use joins to combine multiple tables.
-
This is the fifth course in the Google Cybersecurity Certificate. These courses will further explore the importance of protecting organizational assets from threats, risks, and vulnerabilities. They will also continue to develop an understanding of asset classification and how to use the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF), as well as security controls, to protect assets and mitigate risk. Additionally, learners will gain an understanding of how to develop a threat actor mindset to help protect assets from ever-evolving threat actor tactics and techniques. By the end of this course, you will: - Learn effective data handling processes. - Discuss the role of encryption and hashing in securing assets. - Describe how to effectively use authentication and authorization. - Explain how common vulnerability exposures are identified by MITRE. - Analyze an attack surface to find risks and vulnerabilities. - Identify threats, such as social engineering, malware, and web-based exploits. - Summarize the threat modeling process.
-
This is the sixth course in the Google Cybersecurity Certificate. Learners will focus on incident detection and response. They will learn what defines a security incident and explain the incident response lifecycle, including the roles and responsibilities of incident response teams. Learners will analyze and interpret network communications to detect security incidents using packet sniffing tools to capture network traffic. By assessing and analyzing artifacts, learners will explore the incident investigation and response processes and procedures. Additionally, they will develop a conceptual overview of log data and their role in intrusion detection systems (IDS) and Security Information Event Management (SIEM) tools. Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Explain the lifecycle of an incident. - Describe the tools used in documentation, detection, and management of incidents. - Analyze packets to interpret network communications. - Perform artifact investigations to analyze and verify security incidents. - Identify the steps to contain, eradicate, and recover from an incident. - Determine how to read and analyze logs during incident investigation. - Interpret the basic syntax and components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools. - Perform queries in Security Information and Event Management (SIEM) tools to investigate an event.
-
This is the seventh course in the Google Cybersecurity Certificate. In this course, learners will be introduced to the Python programming language and learn how to apply it to a security setting to automate tasks. First, learners will focus on key foundational Python programming concepts, including data types, variables, conditional statements and iterative statements. Next, they will learn to work effectively with Python by developing functions, using libraries and modules, and making their code readable. Following this, they will explore working with string and list data. A final component of learning to automate tasks through Python will be an exploration of how to import and parse files, and then the course will conclude with a focus on debugging. By the end of this course, you will: - Explain how the Python programming language is used in cybersecurity. - Write conditional and iterative statements in Python. - Create new, user-defined Python functions. - Use Python to work with strings and lists. - Use regular expressions to extract information from text. - Use Python to open and read the contents of a file. - Identify best practices to improve code readability. - Practice debugging code.
-
This is the eighth and final course in the Google Cybersecurity Certificate. In this course, learners will define incident escalation from a security analyst perspective and explore the various security incident classification types. Learners will recognize the impact security incidents can have on an organization if they are not properly escalated and resolved. Learners will also be able to define what a stakeholder is and recognize which security incidents are tied to specific stakeholders. They will develop communication and collaboration skills needed to inform and influence stakeholders within their organizations. Furthermore, they will explore how to ethically operate as security professionals. Learners will also discover how to engage with the larger security community and will receive an introduction to the use of AI in cybersecurity for professional workflows. By the end of this course, you will: - Determine when and how to escalate a security incident. - Explain how having an ethical mindset supports a cybersecurity professional's ability to protect assets and data. - Communicate sensitive information with care and confidentiality. - Use reliable sources to remain current on the latest cybersecurity threats, risks, vulnerabilities, and tools. - Engage with the cybersecurity community. - Understand the many ways to use AI to streamline workflows and help with Cybersecurity tasks.
-
This course takes a deeper dive into concepts introduced in the first course, with an emphasis on recognizing the focus of the CISSP eight security domains, steps of risk management, security frameworks and controls (e.g., NIST, CIA triad, OWASP), as well as common security threats, risks, and vulnerabilities. Additionally, learners are provided with an opportunity to explore and analyze SIEM data, use a playbook to respond to identified threats, risks, and vulnerabilities, and conduct a security audit. By the end of this course, you will: - Identify the common threats, risks, and vulnerabilities to business operations. - Understand the threats, risks, and vulnerabilities that entry-level cybersecurity analysts are most focused on. - Comprehend the purpose of security frameworks and controls. - Describe the confidentiality, integrity, and availability (CIA) triad. - Explain the National Institute of Standards and Technology (NIST) framework. - Explore and practice conducting a security audit. - Use a playbook to respond to threats, risks, and vulnerabilities.
-
This course provides a brief introduction to network architecture, operations, intrusion tactics, and security hardening. Learners will also be introduced to common network protocols and how systems use the TCP/IP model to communicate within a network. Learners will gain an understanding of network level vulnerabilities and how to secure a network against those vulnerabilities. Network security topics will include firewalls, virtual private networks (VPNs), system hardening, and virtual private networks. By the end of this course, you will: - Describe the structure of different computer networks. - Illustrate how data is sent and received over a network. - Recognize common network protocols. - Identify common network security measures and protocols. - Explain how to secure a network against intrusion tactics. - Compare and contrast local networks to cloud computing. - Explain the different types of system hardening techniques.
Taught by
Google Career Certificates