I'm beginning my learning in Foundations of Cybersecurity
I know learning can be hard, but I have the patience, determination, and discipline to reach my goals.
When I'm stuck, I'll find a solution, like…
Take a breath
Break it down
Ask for help
Research
Stay positive
Talk through it
Hello, and welcome to the Google Cybersecurity Certificate! In this program, you will explore the growing field of cybersecurity, learn how cybersecurity is crucial to organizations and the people they serve, and develop relevant skills for a future career in the field. By completing the eight courses in this certificate program, you'll prepare for entry-level jobs in cybersecurity, such as cybersecurity analyst, security analyst, and security operations center (SOC) analyst. No prior experience in cybersecurity is required to complete this program.
Why are skills in cybersecurity in such high demand? The world is undergoing a digital transformation. Every day, global access to the internet is expanding, introducing more devices, more applications, and an even larger amount of data to the World Wide Web. As a result, threats, risks, and vulnerabilities are expanding and causing a significant amount of harm to organizations and people. Cybersecurity professionals are in high demand to help keep organizations, people, and data safe.
Throughout the program, you will have multiple opportunities to develop your cybersecurity knowledge and skills. You will explore concepts and scenarios to learn what an entry-level cybersecurity analyst must know and be able to do to thrive in the cybersecurity profession.
The Google Cybersecurity Certificate has eight courses that focus and build upon core concepts and skills related to the daily work of cybersecurity professionals, including foundational cybersecurity models and frameworks that are used to mitigate risk; protecting networks and data; using programming to automate tasks; identifying and responding to security incidents; and communicating and collaborating with stakeholders. Additionally, you will apply what you’ve learned in each course by completing portfolio projects that can be used to showcase your understanding of essential cybersecurity concepts to potential employers. The courses of the program are as follows:
Foundations of Cybersecurity (current course)
After completing all eight courses, Google Cybersecurity Certificate graduates have access to job search resources, courtesy of Google. You’ll have the opportunity to:
Build your resume, participate in mock interviews, and receive job search tips through Big Interview, a job-training platform that’s free for program graduates.
Improve your interview technique with Interview Warmup, a tool built by Google with certificate graduates in mind. Access cybersecurity-specific practice questions, transcripts of your responses, and automatic insights that help you grow your skills and confidence.
Access thousands of job postings and free one-on-one career coaching with Career Circle. (You must be eligible to work in the U.S. to join.)
Claim your Google Cybersecurity Certificate badge, and share your achievement on LinkedIn® professional networking services to stand out among other candidates to potential employers.
Prepare for the CompTIA Security+ exam, the industry-leading certification for cybersecurity roles. You’ll earn a dual credential when you complete both the Google Cybersecurity Certificate and the CompTIA Security+ exam.
Congratulations on taking this first step to build your skills for a career in cybersecurity. Enjoy the journey!
Summary:
The Google Cybersecurity Certificate is a comprehensive program designed to equip individuals with essential skills for entry-level cybersecurity roles such as cybersecurity analyst, security analyst, and SOC analyst. No prior experience is needed. The program consists of eight courses covering key topics like risk management, network protection, programming for automation, incident response, and communication with stakeholders. Each course includes portfolio projects to showcase your learning.
As cybersecurity professionals are in high demand due to increasing digital threats, this certificate prepares learners to thrive in this field. Graduates gain access to job search resources such as resume building, mock interviews, and career coaching through Career Circle. Additionally, graduates can earn the CompTIA Security+ certification, providing a dual credential.
This program is an opportunity to gain practical skills, grow your cybersecurity expertise, and improve your career prospects in a rapidly expanding field.
The Google Cybersecurity Certificate includes eight key courses that progressively build your knowledge and skills. The courses are:
Foundations of Cybersecurity – Introduction to key cybersecurity concepts.
Play It Safe: Manage Security Risks – Focuses on risk management and mitigation.
Connect and Protect: Networks and Network Security – Covers network protection techniques.
Tools of the Trade: Linux and SQL – Teaches important tools like Linux and SQL.
Assets, Threats, and Vulnerabilities – Identifies key security risks and how to address them.
Sound the Alarm: Detection and Response – Explores how to detect and respond to security incidents.
Automate Cybersecurity Tasks with Python – Introduces programming automation for security tasks.
Put It to Work: Prepare for Cybersecurity Jobs – Helps you apply the knowledge gained and prepare for real-world cybersecurity roles.
The program provides practical opportunities to develop job-ready skills and includes tools such as Interview Warmup for improving interview techniques, access to job search platforms, and the chance to earn a Google Cybersecurity Certificate badge for showcasing your achievements.
Graduates can also prepare for the CompTIA Security+ exam, further boosting their credentials in the cybersecurity job market.
After completing the Google Cybersecurity Certificate, graduates have access to valuable job search resources provided by Google, such as:
Resume building and mock interviews through the Big Interview platform, which is free for program graduates.
Interview Warmup, a Google-built tool that offers cybersecurity-specific practice questions, provides transcripts of responses, and delivers automatic feedback to help improve your interview skills and confidence.
Career Circle offers free one-on-one career coaching and access to thousands of job postings (eligibility to work in the U.S. is required to join).
A Google Cybersecurity Certificate badge, which can be shared on LinkedIn to stand out to potential employers.
Additionally, the program prepares graduates for the CompTIA Security+ exam, the industry-leading certification for cybersecurity roles. Graduates earn a dual credential by completing both the Google Cybersecurity Certificate and the CompTIA Security+ exam.
The certificate is a great stepping stone toward a rewarding career in cybersecurity, with ample resources to help you succeed in the job market.
1. Foundations of Cybersecurity
In this course, you will:
Define the field of security
Recognize core skills and knowledge needed to become a security analyst
Identify how security attacks impact business operations
Identify eight security domains
Define security frameworks and controls
Skill sets:
Communicating effectively
Collaborating with others
Identifying threats, risks, and vulnerabilities
Problem-solving
2. Play It Safe: Manage Security Risks
In this course, you will:
Recognize and explain the focus of eight security domains
Identify the steps of risk management
Describe the CIA triad
Identify security principles
Define and describe the purpose of a playbook
Explain how entry-level security analysts use SIEM dashboards
Skill sets:
Applying the CIA triad to workplace situations
Analyzing log data
Identifying the phases of an incident response playbook
3. Connect and Protect: Networks and Network Security
In this course, you will:
Define types of networks
Explain how data is sent and received over a network
Recognize common network protocols
Compare and contrast local networks to cloud computing
Explain how to secure a network against intrusion tactics
Skill sets:
Configuring a firewall
Recognizing components of computer networks and cloud computing
Analyzing threats
Implementing security hardening
4. Tools of the Trade: Linux and SQL
In this course, you will:
Describe the main functions of an operating system
Explain the relationship between operating systems, applications, and hardware
Compare a graphical user interface to a command line interface
Navigate the file system using Linux commands via the Bash shell
Use SQL to retrieve information from a database
Skill sets:
Interacting with both a graphical user interface (GUI) and command line interface (CLI)
Querying a database with SQL
Filtering on a particular word with the Linux command line
Authenticating and authorizing users with the Linux command line
5. Assets, Threats, and Vulnerabilities
In this course, you will:
Explain security’s role in mitigating organizational risk
Describe the defense in depth strategy
Explain how vulnerability assessments are used to assess potential risk
Develop an attacker mindset to recognize threats
Discuss the role encryption and hashing play in securing assets
Identify forms of social engineering, malware, and web-based exploits
Skill sets:
Classifying assets
Decrypting a message
Searching the CVE database for vulnerable applications
Analyzing attack surfaces
Applying the PASTA threat modeling framework
6. Sound the Alarm: Detection and Response
In this course, you will:
Explain the lifecycle of an incident
Use packet sniffing tools to capture and view network communications
Perform artifact investigations to analyze and verify security incidents
Identify the steps to contain, eradicate, and recover from an incident
Interpret the basic syntax and components of signatures and logs in IDS and NIDS tools
Skill sets:
Capturing, viewing, and analyzing a packet
Investigating a suspicious hash file
Following a playbook
Examining alerts, logs, and rules
Performing queries with SIEM tools
7. Automate Cybersecurity Tasks with Python
In this course, you will:
Explain how the Python programming language is used in security
Write a simple algorithm
Use regular expressions in Python to extract information from text
Use Python to automate tasks performed by security professionals
Use Python to parse a file
Skill sets:
Working with strings and their index values
Applying regular expressions (regex)
Importing and parsing a file
Debugging code
8. Put It to Work: Prepare for Cybersecurity Jobs
In this course, you will:
Define stakeholders and describe their security roles
Communicate sensitive information with care and confidentiality
Identify reliable sources within the security community
Determine opportunities to become engaged with the security community
Determine ways to establish and advance a career in security, by engaging with the security community
Find, apply for, and prepare for job interviews
Skill sets:
Creating a dashboard
Creating or updating a resume
Using the STAR method for interview questions
Drafting an elevator pitch
Here is a list of best practices that will help you complete the courses in the program in a timely manner:
Plan your time: Setting regular study times and following them each week can help you make learning a part of your routine. Use a calendar or timetable to create a schedule, and list what you plan to do each day in order to set achievable goals. Find a space that allows you to focus when you watch the videos, review the readings, and complete the activities.
Work at your own pace: Everyone learns differently, so this program has been designed to let you work at your own pace. Although your personalized deadlines start when you enroll, feel free to move through the program at the speed that works best for you. There is no penalty for late assignments; to earn your certificate, all you have to do is complete all of the work. You can extend your deadlines at any time by going to Overview in the navigation panel and selecting Switch Sessions. If you have already missed previous deadlines, select Reset my deadlines instead.
Be curious: If you find an idea that gets you excited, act on it! Ask questions, search for more details online, explore the links that interest you, and take notes on your discoveries. The steps you take to support your learning along the way will advance your knowledge, create more opportunities in this high-growth field, and help you qualify for jobs.
Take notes: Notes will help you remember important information in the future, especially as you’re preparing to enter a new job field. In addition, taking notes is an effective way to make connections between topics and gain a better understanding of those topics.
Review exemplars: Exemplars are completed assignments that fully meet an activity's criteria. Many activities in this program have exemplars for you to validate your work or check for errors. Although there are often many ways to complete an assignment, exemplars offer guidance and inspiration about how to complete the activity.
Build your career identity: Your career identity is the unique value you bring to the workforce. Watch this video to learn about the key components of career identity and write your own career identity statement. Discovering and defining your own career identity makes you better equipped to choose a career path that aligns with your strengths, values, and goals and is more effective in your chosen profession.
Study together: It can be hard to find the time to progress through a Google Career Certificate with all life’s distractions. Register for Study Group – live study sessions hosted Monday through Thursday that offer you dedicated time and space to focus on your coursework alongside a community of your peers. Participation in Study Group is optional for our learners.
Connect with other learners: If you have a question, chances are, you’re not alone. Reach out in the discussion forum to ask for help from other learners in this program. You can also visit Coursera’s private Google Cybersecurity Community to expand your network, discuss career journeys, and share experiences. Check out the quick start guide.
Update your profile: Consider updating your profile on Coursera with your photo, career goals, and more. When other learners find you in the discussion forums, they can click on your name to access your profile and get to know you better.
To complete certain activities in the program, you will need to use digital documents, spreadsheets, presentations, and/or labs. Security professionals use these software tools to collaborate within their teams and organizations. If you need more information about using a particular tool, refer to these resources:
Microsoft Word: Help and learning: Microsoft Support page for Word
Google Docs: Help Center page for Google Docs
Microsoft Excel: Help and learning: Microsoft Support page for Excel
Google Sheets: Help Center page for Google Sheets
Microsoft PowerPoint: Help and learning: Microsoft Support page for PowerPoint
How to use Google Slides: Help Center page for Google Slides
Common problems with labs: Troubleshooting help for Qwiklabs activities
This program covers a lot of terms and concepts, some of which you may already know and some of which may be unfamiliar to you. To review terms and help you prepare for graded quizzes, refer to the following glossaries:
Module glossaries: At the end of each module’s content, you can review a glossary of terms from that module. Each module’s glossary builds upon the terms from the previous modules in that course. The module glossaries are not downloadable; however, all of the terms and definitions are included in the course and certificate glossaries, which are downloadable.
Certificate glossary: The certificate glossary includes all of the terms in the entire certificate program and is a helpful resource that you can reference throughout the program or at any time in the future.
Course glossaries: At the end of each course, you can access and download a glossary that covers all of the terms in that course.
You can access and download the certificate glossaries and save them on your computer. You can always find the course and certificate glossaries through the course’s Resources section. To access the Cybersecurity Certificate glossary, click the link below and select Use Template.
Here are some best practices for successfully completing the Google Cybersecurity Certificate:
Plan Your Time: Set a regular study schedule, create a timetable, and set daily goals to stay on track. Find a focused study space for watching videos and completing activities.
Work at Your Own Pace: Move through the program at your speed without penalties for late assignments. You can adjust deadlines as needed.
Stay Curious: Explore topics that interest you by asking questions, searching for details online, and taking notes to deepen your understanding.
Take Notes: Notes will help with information retention and making connections between topics.
Review Exemplars: Use completed assignments as guides to validate your work and find inspiration for your tasks.
Build Your Career Identity: Develop your unique career identity by reflecting on your strengths, values, and goals. Watch the provided video for guidance.
Study Together: Join optional live study sessions with peers or connect in the discussion forum to ask questions and network with other learners.
Use Digital Tools: Complete activities using documents, spreadsheets, and presentations. Reference help guides for Microsoft and Google tools.
Glossaries: Review module, course, and certificate glossaries to reinforce learning and prepare for quizzes. Download course and certificate glossaries for future reference.