├── Course 1 - Foundations of Cybersecurity ├── Portfolio Activity - Draft a professional statement.md ├── Week 1 - Welcome to the exciting world of cybersecurity │ └── Google Cybersecurity Certificate overview.png └── summary.md ├── Course 2 - Play It Safe - Manage Security Risks ├── Portfolio Activity - Conduct a security audit, Part 1.md ├── Portfolio Activity - Conduct a security audit, Part 2.md └── summary.md ├── Course 3 - Connect and Protect - Networks and Network Security ├── Activity - Analysis of network hardening.md ├── Activity - Analyze network attacks.md ├── Activity - Analyze network layer communication.md ├── Activity - Apply OS hardening techniques.md ├── Course 3 Glossary.md ├── Portfolio Activity - Use the NIST Cybersecurity Framework to respond to a security incident.md ├── Week 1 - Network architecture │ └── NetworkArchitecture.md ├── Week 2 - Network operations │ └── NetworkOperations.md ├── Week 3 - Secure against network intrusions │ └── SecureAgainstNetwork.md ├── Week 4 - Security hardening │ └── SecurityHardening.md └── summary.md ├── Course 4 - Tools of the Trade - Linux and SQL ├── Activity - Find files with Linux commands.md ├── Activity - Select the user interface.md ├── Course 4 Glossary.md ├── Portfolio Activity - Use Linux commands to manage file permissions.md ├── Week 1 - Introduction to operating systems │ └── Introduction to OS.md ├── Week 2 - The Linux operating system │ └── Linux.md ├── Week 3 - Linux commands in the Bash shell │ └── Linux Commands.md └── Week 4 - Databases and SQL │ └── Databases.md ├── Course 5 - Assets, Threats, and Vulnerabilities ├── Activity - Classify the assets connected to a home network.md ├── Activity - Determine appropriate data handling practices.md ├── Activity - Filter malicious emails.md ├── Activity - Identify the attack vectors of a USB drive ├── Activity - Improve authentication, authorization, and accounting for a small business.md ├── Course 5 Glossary.md ├── Self-reflection - Approach cybersecurity with an attacker mindset ├── Week 1 - Introduction to asset security │ └── Asset Security.md ├── Week 2 - Protect organizational assets │ └── Protect Organizational Assets.md └── Week 3 - Vulnerabilities in systems │ └── Vulnerabilities in systems.md ├── Course 6 - Sound the Alarm Detection and Response ├── gallery │ ├── ADA_R-125_DNS.png │ ├── CS_R-125_dialog-box.png │ ├── CS_R-125_packet-capture.png │ ├── IP4 header with its 13 fields.png │ ├── IPv6-with-its-8-fields.png │ ├── S20G003.png │ ├── S29G004.png │ └── Wireshark-homepage.png ├── week1.md └── week2.md └── README.md /Course 1 - Foundations of Cybersecurity/Portfolio Activity - Draft a professional statement.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 1 - Foundations of Cybersecurity/Portfolio Activity - Draft a professional statement.md -------------------------------------------------------------------------------- /Course 1 - Foundations of Cybersecurity/Week 1 - Welcome to the exciting world of cybersecurity/Google Cybersecurity Certificate overview.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 1 - Foundations of Cybersecurity/Week 1 - Welcome to the exciting world of cybersecurity/Google Cybersecurity Certificate overview.png -------------------------------------------------------------------------------- /Course 1 - Foundations of Cybersecurity/summary.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 1 - Foundations of Cybersecurity/summary.md -------------------------------------------------------------------------------- /Course 2 - Play It Safe - Manage Security Risks/Portfolio Activity - Conduct a security audit, Part 1.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 2 - Play It Safe - Manage Security Risks/Portfolio Activity - Conduct a security audit, Part 1.md -------------------------------------------------------------------------------- /Course 2 - Play It Safe - Manage Security Risks/Portfolio Activity - Conduct a security audit, Part 2.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 2 - Play It Safe - Manage Security Risks/Portfolio Activity - Conduct a security audit, Part 2.md -------------------------------------------------------------------------------- /Course 2 - Play It Safe - Manage Security Risks/summary.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 2 - Play It Safe - Manage Security Risks/summary.md -------------------------------------------------------------------------------- /Course 3 - Connect and Protect - Networks and Network Security/Activity - Analysis of network hardening.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 3 - Connect and Protect - Networks and Network Security/Activity - Analysis of network hardening.md -------------------------------------------------------------------------------- /Course 3 - Connect and Protect - Networks and Network Security/Activity - Analyze network attacks.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 3 - Connect and Protect - Networks and Network Security/Activity - Analyze network attacks.md -------------------------------------------------------------------------------- /Course 3 - Connect and Protect - Networks and Network Security/Activity - Analyze network layer communication.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 3 - Connect and Protect - Networks and Network Security/Activity - Analyze network layer communication.md -------------------------------------------------------------------------------- /Course 3 - Connect and Protect - Networks and Network Security/Activity - Apply OS hardening techniques.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 3 - Connect and Protect - Networks and Network Security/Activity - Apply OS hardening techniques.md -------------------------------------------------------------------------------- /Course 3 - Connect and Protect - Networks and Network Security/Course 3 Glossary.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 3 - Connect and Protect - Networks and Network Security/Course 3 Glossary.md -------------------------------------------------------------------------------- /Course 3 - Connect and Protect - Networks and Network Security/Portfolio Activity - Use the NIST Cybersecurity Framework to respond to a security incident.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 3 - Connect and Protect - Networks and Network Security/Portfolio Activity - Use the NIST Cybersecurity Framework to respond to a security incident.md -------------------------------------------------------------------------------- /Course 3 - Connect and Protect - Networks and Network Security/Week 1 - Network architecture/NetworkArchitecture.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 3 - Connect and Protect - Networks and Network Security/Week 1 - Network architecture/NetworkArchitecture.md -------------------------------------------------------------------------------- /Course 3 - Connect and Protect - Networks and Network Security/Week 2 - Network operations/NetworkOperations.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 3 - Connect and Protect - Networks and Network Security/Week 2 - Network operations/NetworkOperations.md -------------------------------------------------------------------------------- /Course 3 - Connect and Protect - Networks and Network Security/Week 3 - Secure against network intrusions/SecureAgainstNetwork.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 3 - Connect and Protect - Networks and Network Security/Week 3 - Secure against network intrusions/SecureAgainstNetwork.md -------------------------------------------------------------------------------- /Course 3 - Connect and Protect - Networks and Network Security/Week 4 - Security hardening/SecurityHardening.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 3 - Connect and Protect - Networks and Network Security/Week 4 - Security hardening/SecurityHardening.md -------------------------------------------------------------------------------- /Course 3 - Connect and Protect - Networks and Network Security/summary.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 3 - Connect and Protect - Networks and Network Security/summary.md -------------------------------------------------------------------------------- /Course 4 - Tools of the Trade - Linux and SQL/Activity - Find files with Linux commands.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 4 - Tools of the Trade - Linux and SQL/Activity - Find files with Linux commands.md -------------------------------------------------------------------------------- /Course 4 - Tools of the Trade - Linux and SQL/Activity - Select the user interface.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 4 - Tools of the Trade - Linux and SQL/Activity - Select the user interface.md -------------------------------------------------------------------------------- /Course 4 - Tools of the Trade - Linux and SQL/Course 4 Glossary.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 4 - Tools of the Trade - Linux and SQL/Course 4 Glossary.md -------------------------------------------------------------------------------- /Course 4 - Tools of the Trade - Linux and SQL/Portfolio Activity - Use Linux commands to manage file permissions.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 4 - Tools of the Trade - Linux and SQL/Portfolio Activity - Use Linux commands to manage file permissions.md -------------------------------------------------------------------------------- /Course 4 - Tools of the Trade - Linux and SQL/Week 1 - Introduction to operating systems/Introduction to OS.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 4 - Tools of the Trade - Linux and SQL/Week 1 - Introduction to operating systems/Introduction to OS.md -------------------------------------------------------------------------------- /Course 4 - Tools of the Trade - Linux and SQL/Week 2 - The Linux operating system/Linux.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 4 - Tools of the Trade - Linux and SQL/Week 2 - The Linux operating system/Linux.md -------------------------------------------------------------------------------- /Course 4 - Tools of the Trade - Linux and SQL/Week 3 - Linux commands in the Bash shell/Linux Commands.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 4 - Tools of the Trade - Linux and SQL/Week 3 - Linux commands in the Bash shell/Linux Commands.md -------------------------------------------------------------------------------- /Course 4 - Tools of the Trade - Linux and SQL/Week 4 - Databases and SQL/Databases.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 4 - Tools of the Trade - Linux and SQL/Week 4 - Databases and SQL/Databases.md -------------------------------------------------------------------------------- /Course 5 - Assets, Threats, and Vulnerabilities/Activity - Classify the assets connected to a home network.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 5 - Assets, Threats, and Vulnerabilities/Activity - Classify the assets connected to a home network.md -------------------------------------------------------------------------------- /Course 5 - Assets, Threats, and Vulnerabilities/Activity - Determine appropriate data handling practices.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 5 - Assets, Threats, and Vulnerabilities/Activity - Determine appropriate data handling practices.md -------------------------------------------------------------------------------- /Course 5 - Assets, Threats, and Vulnerabilities/Activity - Filter malicious emails.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 5 - Assets, Threats, and Vulnerabilities/Activity - Filter malicious emails.md -------------------------------------------------------------------------------- /Course 5 - Assets, Threats, and Vulnerabilities/Activity - Identify the attack vectors of a USB drive: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 5 - Assets, Threats, and Vulnerabilities/Activity - Identify the attack vectors of a USB drive -------------------------------------------------------------------------------- /Course 5 - Assets, Threats, and Vulnerabilities/Activity - Improve authentication, authorization, and accounting for a small business.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 5 - Assets, Threats, and Vulnerabilities/Activity - Improve authentication, authorization, and accounting for a small business.md -------------------------------------------------------------------------------- /Course 5 - Assets, Threats, and Vulnerabilities/Course 5 Glossary.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 5 - Assets, Threats, and Vulnerabilities/Course 5 Glossary.md -------------------------------------------------------------------------------- /Course 5 - Assets, Threats, and Vulnerabilities/Self-reflection - Approach cybersecurity with an attacker mindset: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 5 - Assets, Threats, and Vulnerabilities/Self-reflection - Approach cybersecurity with an attacker mindset -------------------------------------------------------------------------------- /Course 5 - Assets, Threats, and Vulnerabilities/Week 1 - Introduction to asset security/Asset Security.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 5 - Assets, Threats, and Vulnerabilities/Week 1 - Introduction to asset security/Asset Security.md -------------------------------------------------------------------------------- /Course 5 - Assets, Threats, and Vulnerabilities/Week 2 - Protect organizational assets/Protect Organizational Assets.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 5 - Assets, Threats, and Vulnerabilities/Week 2 - Protect organizational assets/Protect Organizational Assets.md -------------------------------------------------------------------------------- /Course 5 - Assets, Threats, and Vulnerabilities/Week 3 - Vulnerabilities in systems/Vulnerabilities in systems.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 5 - Assets, Threats, and Vulnerabilities/Week 3 - Vulnerabilities in systems/Vulnerabilities in systems.md -------------------------------------------------------------------------------- /Course 6 - Sound the Alarm Detection and Response/gallery/ADA_R-125_DNS.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 6 - Sound the Alarm Detection and Response/gallery/ADA_R-125_DNS.png -------------------------------------------------------------------------------- /Course 6 - Sound the Alarm Detection and Response/gallery/CS_R-125_dialog-box.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 6 - Sound the Alarm Detection and Response/gallery/CS_R-125_dialog-box.png -------------------------------------------------------------------------------- /Course 6 - Sound the Alarm Detection and Response/gallery/CS_R-125_packet-capture.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 6 - Sound the Alarm Detection and Response/gallery/CS_R-125_packet-capture.png -------------------------------------------------------------------------------- /Course 6 - Sound the Alarm Detection and Response/gallery/IP4 header with its 13 fields.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 6 - Sound the Alarm Detection and Response/gallery/IP4 header with its 13 fields.png -------------------------------------------------------------------------------- /Course 6 - Sound the Alarm Detection and Response/gallery/IPv6-with-its-8-fields.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 6 - Sound the Alarm Detection and Response/gallery/IPv6-with-its-8-fields.png -------------------------------------------------------------------------------- /Course 6 - Sound the Alarm Detection and Response/gallery/S20G003.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 6 - Sound the Alarm Detection and Response/gallery/S20G003.png -------------------------------------------------------------------------------- /Course 6 - Sound the Alarm Detection and Response/gallery/S29G004.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 6 - Sound the Alarm Detection and Response/gallery/S29G004.png -------------------------------------------------------------------------------- /Course 6 - Sound the Alarm Detection and Response/gallery/Wireshark-homepage.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 6 - Sound the Alarm Detection and Response/gallery/Wireshark-homepage.png -------------------------------------------------------------------------------- /Course 6 - Sound the Alarm Detection and Response/week1.md: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /Course 6 - Sound the Alarm Detection and Response/week2.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/Course 6 - Sound the Alarm Detection and Response/week2.md -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/matpakke/Google-Cybersecurity/HEAD/README.md --------------------------------------------------------------------------------