Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Prepárate para una nueva carrera en ciberseguridad, que podrás completar en alrededor de seis meses, sin necesidad de contar con experiencia ni acreditar título universitario. Con esta formación profesional diseñada por Google, podrás acceder a nuevas oportunidades laborales en un campo de alto crecimiento. La ciberseguridad se centra en proteger los datos de las amenazas cibernéticas, como el fraude y la suplantación de identidad, y en evitar el acceso no autorizado a los sistemas y redes informáticas. Las/los analistas de ciberseguridad utilizan una variedad de métodos, tecnologías y procesos para proteger de estos riesgos y amenazas externas, a una empresa u organización y a las personas que compran sus productos o utilizan sus servicios.
Además,en caso de ocurrir un incidente, deberán investigar e informar de sus hallazgos.
Al completar este Certificado, llevado adelante por especialistas en ciberseguridad de Google, habrás adquirido las habilidades y herramientas necesarias para un trabajo de nivel inicial en el campo de la ciberseguridad. Podrás finalizar el programa en alrededor de 6 meses, con una dedicación menor a 10 horas semanales.
Con tu preparación, podrás aspirar a trabajos de analista de seguridad o ciberseguridad, analista del Centro de Operaciones de Seguridad (SOC) y más.
Syllabus
- Course 1: Foundations of Cybersecurity
- Course 2: Play It Safe: Manage Security Risks
- Course 3: Connect and Protect: Networks and Network Security
- Course 4: Tools of the Trade: Linux and SQL
- Course 5: Assets, Threats, and Vulnerabilities
- Course 6: Sound the Alarm: Detection and Response
- Course 7: Automate Cybersecurity Tasks with Python
- Course 8: Put It to Work: Prepare for Cybersecurity Jobs
- Course 9: Accelerate Your Job Search with AI
Courses
-
This is the first course in the Google Cybersecurity Certificate. In this course, learners will be introduced to the cybersecurity profession, including the primary job responsibilities and core skills of entry-level analysts; significant events that led to the development of the cybersecurity field; and security’s continued importance to organizational operations. Learners will also explore the Certified Information Systems Security Professional (CISSP) eight security domains, common security frameworks and controls, as well as the confidentiality, integrity, and availability (CIA) triad. This course covers a wide variety of cybersecurity topics to provide an overview of what’s to come in this certificate program. Learners who complete the eight courses in the Google Cybersecurity Certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Identify how security attacks impact business operations. - Explore the job responsibilities and core skills of an entry-level cybersecurity analyst. - Recognize how past and present attacks on organizations led to the development of the cybersecurity field. - Learn the CISSP eight security domains. - Identify security domains, frameworks, and controls. - Explain security ethics. - Recognize common tools used by cybersecurity analysts.
-
This course focuses on foundational computing skills that support the work of a security analyst. It begins with an introduction to computer operating systems, followed by a closer exploration of Linux, an operating system commonly used by security professionals. By the end of this course, learners will be able to use the Linux command line through the Bash shell to navigate and manage the file system and to authenticate and authorize users, and they will also be able to use SQL to communicate with a database. By the end of this course, you will: - Explain the relationship between operating systems, applications, and hardware. - Compare a graphical user interface to a command line interface. - Identify the unique features of common Linux distributions. - Navigate and manage the file system using Linux commands via the Bash shell. - Use Linux commands via the Bash shell to authenticate and authorize users. - Describe how a relational database is organized. - Use SQL to retrieve information from a database. - Apply filters to SQL queries and use joins to combine multiple tables.
-
This is the fifth course in the Google Cybersecurity Certificate. These courses will further explore the importance of protecting organizational assets from threats, risks, and vulnerabilities. They will also continue to develop an understanding of asset classification and how to use the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF), as well as security controls, to protect assets and mitigate risk. Additionally, learners will gain an understanding of how to develop a threat actor mindset to help protect assets from ever-evolving threat actor tactics and techniques. By the end of this course, you will: - Learn effective data handling processes. - Discuss the role of encryption and hashing in securing assets. - Describe how to effectively use authentication and authorization. - Explain how common vulnerability exposures are identified by MITRE. - Analyze an attack surface to find risks and vulnerabilities. - Identify threats, such as social engineering, malware, and web-based exploits. - Summarize the threat modeling process.
-
This is the sixth course in the Google Cybersecurity Certificate. Learners will focus on incident detection and response. They will learn what defines a security incident and explain the incident response lifecycle, including the roles and responsibilities of incident response teams. Learners will analyze and interpret network communications to detect security incidents using packet sniffing tools to capture network traffic. By assessing and analyzing artifacts, learners will explore the incident investigation and response processes and procedures. Additionally, they will develop a conceptual overview of log data and their role in intrusion detection systems (IDS) and Security Information Event Management (SIEM) tools. Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Explain the lifecycle of an incident. - Describe the tools used in documentation, detection, and management of incidents. - Analyze packets to interpret network communications. - Perform artifact investigations to analyze and verify security incidents. - Identify the steps to contain, eradicate, and recover from an incident. - Determine how to read and analyze logs during incident investigation. - Interpret the basic syntax and components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools. - Perform queries in Security Information and Event Management (SIEM) tools to investigate an event.
-
This is the seventh course in the Google Cybersecurity Certificate. In this course, learners will be introduced to the Python programming language and learn how to apply it to a security setting to automate tasks. First, learners will focus on key foundational Python programming concepts, including data types, variables, conditional statements and iterative statements. Next, they will learn to work effectively with Python by developing functions, using libraries and modules, and making their code readable. Following this, they will explore working with string and list data. A final component of learning to automate tasks through Python will be an exploration of how to import and parse files, and then the course will conclude with a focus on debugging. By the end of this course, you will: - Explain how the Python programming language is used in cybersecurity. - Write conditional and iterative statements in Python. - Create new, user-defined Python functions. - Use Python to work with strings and lists. - Use regular expressions to extract information from text. - Use Python to open and read the contents of a file. - Identify best practices to improve code readability. - Practice debugging code.
-
This is the eighth course in the Google Cybersecurity Certificate. In this course, learners will define incident escalation from a security analyst perspective and explore the various security incident classification types. Learners will recognize the impact security incidents can have on an organization if they are not properly escalated and resolved. Learners will also be able to define what a stakeholder is and recognize which security incidents are tied to specific stakeholders. They will develop communication and collaboration skills needed to inform and influence stakeholders within their organizations. Furthermore, they will explore how to ethically operate as security professionals. Learners will also discover how to engage with the larger security community and will receive an introduction to the use of AI in cybersecurity for professional workflows. By the end of this course, you will: - Determine when and how to escalate a security incident. - Explain how having an ethical mindset supports a cybersecurity professional's ability to protect assets and data. - Communicate sensitive information with care and confidentiality. - Use reliable sources to remain current on the latest cybersecurity threats, risks, vulnerabilities, and tools. - Engage with the cybersecurity community. - Understand the many ways to use AI to streamline workflows and help with Cybersecurity tasks.
-
This course takes a deeper dive into concepts introduced in the first course, with an emphasis on recognizing the focus of the CISSP eight security domains, steps of risk management, security frameworks and controls (e.g., NIST, CIA triad, OWASP), as well as common security threats, risks, and vulnerabilities. Additionally, learners are provided with an opportunity to explore and analyze SIEM data, use a playbook to respond to identified threats, risks, and vulnerabilities, and conduct a security audit. By the end of this course, you will: - Identify the common threats, risks, and vulnerabilities to business operations. - Understand the threats, risks, and vulnerabilities that entry-level cybersecurity analysts are most focused on. - Comprehend the purpose of security frameworks and controls. - Describe the confidentiality, integrity, and availability (CIA) triad. - Explain the National Institute of Standards and Technology (NIST) framework. - Explore and practice conducting a security audit. - Use a playbook to respond to threats, risks, and vulnerabilities.
-
This course provides a brief introduction to network architecture, operations, intrusion tactics, and security hardening. Learners will also be introduced to common network protocols and how systems use the TCP/IP model to communicate within a network. Learners will gain an understanding of network level vulnerabilities and how to secure a network against those vulnerabilities. Network security topics will include firewalls, virtual private networks (VPNs), system hardening, and virtual private networks. By the end of this course, you will: - Describe the structure of different computer networks. - Illustrate how data is sent and received over a network. - Recognize common network protocols. - Identify common network security measures and protocols. - Explain how to secure a network against intrusion tactics. - Compare and contrast local networks to cloud computing. - Explain the different types of system hardening techniques.
Taught by
Google Career Certificates
Tags
Reviews
5.0 rating, based on 2 Class Central reviews
Showing Class Central Sort
-
The Google Cybersecurity course is very beginner-friendly and well structured. It explains core concepts like security principles, risk management, networking, Linux, and SIEM tools in a clear way. The hands-on labs and real-world examples make it easier to understand how cybersecurity works in practice. A great starting point for anyone who wants to enter the cybersecurity field.
-
Very good Nice course really helpful and learn cyber security for IT professional. and security professional