- Level Foundation
- Duration 27 hours
- Course by Google
-
Offered by
About
This is the fourth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the third Google Cybersecurity Certificate course. In this course, you will explore computing skills that you’ll use on-the-job as a cybersecurity analyst. First, you'll practice using Linux, an operating system commonly used by cybersecurity professionals. For example, you'll use the Linux command line through the Bash shell to navigate and manage the file system and authenticate users. Then, you'll use SQL to communicate with a database. Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs. Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary. By the end of this course, you will: - Explain the relationship between operating systems, applications, and hardware. - Compare a graphical user interface to a command line interface. - Identify the unique features of common Linux distributions. - Navigate and manage the file system using Linux commands via the Bash shell. - Use Linux commands via the Bash shell to authenticate and authorize users. - Describe how a relational database is organized. - Use SQL to retrieve information from a database. - Apply filters to SQL queries and use joins to combine multiple tables.Modules
Get started with the course
1
Videos
- Introduction to Course 4
2
Readings
- Course 4 overview
- Helpful resources and tips
The wonderful world of operating systems
3
Videos
- Welcome to module 1
- Kim: My journey into computing
- Introduction to operating systems
1
Readings
- Compare operating systems
1
Quiz
- Test your knowledge: The wonderful world of operating systems
The operating system at work
2
Videos
- Inside the operating system
- Resource allocation via the OS
2
Readings
- Requests to the operating system
- Virtualization technology
1
Quiz
- Test your knowledge: The operating system at work
The user interface
1
Assignment
- Test your knowledge: The user interface
2
Videos
- GUI versus CLI
- Ellen: My path into cybersecurity
1
Readings
- The command line in use
1
Quiz
- Activity: Select the user interface
Review: Introduction to operating systems
1
Videos
- Wrap-up
1
Readings
- Glossary terms from module 1
1
Quiz
- Module 1 challenge
All about Linux
4
Videos
- Welcome to module 2
- Introduction to Linux
- Phil: Learn and grow in the cybersecurity field
- Linux architecture
1
Readings
- Linux architecture explained
1
Quiz
- Test your knowledge: All about Linux
Linux distributions
2
External Tool
- Activity: Install software in a Linux distribution
- Optional Exemplar: Install software in a Linux distribution
2
Videos
- Linux distributions
- KALI LINUX ™
4
Readings
- More Linux distributions
- Package managers for installing applications
- Resources for completing Linux labs
- Lab tips and troubleshooting steps
1
Quiz
- Test your knowledge: Linux distributions
The shell
2
External Tool
- Activity: Examine input and output in the shell
- Optional Exemplar: Examine input and output in the shell
2
Videos
- Introduction to the shell
- Input and output in the shell
1
Readings
- Different types of shells
1
Quiz
- Test your knowledge: The shell
Review: The Linux operating system
1
Videos
- Wrap-up
1
Readings
- Glossary terms from module 2
1
Quiz
- Module 2 challenge
Navigate the Linux file system
2
External Tool
- Activity: Find files with Linux commands
- Optional Exemplar: Find files with Linux commands
3
Videos
- Welcome to module 3
- Linux commands via the Bash shell
- Core commands for navigation and reading files
1
Readings
- Navigate Linux and read file content
1
Quiz
- Test your knowledge: Navigate the Linux file system in Bash
Manage file content in Bash
4
External Tool
- Activity: Filter with grep
- Optional Exemplar: Filter with grep
- Activity: Manage files with Linux commands
- Optional Exemplar: Manage files with Linux commands
2
Videos
- Find what you need with Linux
- Create and modify directories and files
2
Readings
- Filter content in Linux
- Manage directories and files
1
Quiz
- Test your knowledge: Manage file content in Bash
Authenticate and authorize users
1
Assignment
- Portfolio Activity: Use Linux commands to manage file permissions
4
External Tool
- Activity: Manage authorization
- Optional Exemplar: Manage authorization
- Activity: Add and manage users with Linux commands
- Optional Exemplar: Add and manage users with Linux commands
3
Videos
- File permissions and ownership
- Change permissions
- Add and delete users
3
Readings
- Permission commands
- Portfolio Activity Exemplar: Use Linux commands to manage file permissions
- Responsible use of sudo
1
Quiz
- Test your knowledge: Authenticate and authorize users
Get help in Linux
2
External Tool
- Activity: Get help in the command line
- Optional Exemplar: Get help in the command line
3
Videos
- Damar: My journey into Linux commands
- The Linux community
- Man pages within the shell
1
Readings
- Linux resources
1
Quiz
- Test your knowledge: Get help in Linux
Review: Linux commands in the Bash shell
1
Videos
- Wrap-up
2
Readings
- Reference guide: Linux
- Glossary terms from module 3
1
Quiz
- Module 3 challenge
Introduction to SQL and Databases
4
Videos
- Welcome to module 4
- Introduction to databases
- Query databases with SQL
- Adedayo: SQL in cybersecurity
1
Readings
- SQL filtering versus Linux filtering
1
Quiz
- Test your knowledge: SQL and databases
SQL queries
4
External Tool
- Activity: Perform a SQL query
- Optional Exemplar: Perform a SQL query
- Activity: Filter a SQL query
- Optional Exemplar: Filter a SQL query
2
Videos
- Basic queries
- Basic filters on SQL queries
3
Readings
- Query a database
- Resources for completing SQL labs
- The WHERE clause and basic operators
1
Quiz
- Test your knowledge: SQL queries
More SQL filters
1
Assignment
- Portfolio Activity: Apply filters to SQL queries
4
External Tool
- Activity: Apply more filters in SQL
- Optional Exemplar: Apply more filters in SQL
- Activity: Filter with AND, OR, and NOT
- Optional Exemplar: Filter with AND, OR, and NOT
2
Videos
- Filter dates and numbers
- Filters with AND, OR, and NOT
3
Readings
- Operators for filtering dates and numbers
- More on filters with AND, OR, and NOT
- Portfolio Activity Exemplar: Apply filters to SQL queries
1
Quiz
- Test your knowledge: More SQL filters
SQL joins
2
External Tool
- Activity: Complete a join
- Optional Exemplar: Complete a join
2
Videos
- Join tables in SQL
- Types of joins
2
Readings
- Compare types of joins
- Continuous learning in SQL
1
Quiz
- Test your knowledge: SQL joins
Review: Databases and SQL
1
Videos
- Wrap-up
2
Readings
- Reference guide: SQL
- Glossary terms from module 4
1
Quiz
- Module 4 challenge
Congratulations on completing Course 4!
1
Videos
- Course wrap-up
3
Readings
- Reflect and connect with peers
- Course 4 glossary
- Get started on the next course
Auto Summary
Explore essential cybersecurity skills in "Tools of the Trade: Linux and SQL," part of the Google Cybersecurity Certificate. Ideal for beginners, this course dives into using Linux and SQL for cybersecurity tasks. Learn from Google cybersecurity experts through engaging videos and hands-on activities. Gain proficiency in navigating Linux systems, managing files, and using SQL for database communication. With a 1620-minute duration, this foundational course prepares you for entry-level cybersecurity roles. Available on Coursera with Starter and Professional subscription options. Perfect for aspiring cybersecurity analysts.

Google Career Certificates