Welcome to my Google cybersecurity portfolio. This repository showcases various tasks, projects, notes, and write-ups completed during my journey to earn the Google Cybersecurity Professional Certificate.
You can view my certificate of completion on Credly or Coursera.
Throughout the Google Cybersecurity Professional Certificate Program, I gained foundational knowledge and hands-on experience in the following areas:
Risk Management
Threat Analysis
Network Security
Incident Response
Linux
Python
SQL
SIEM Tools:
Splunk
Chronicle
Network Protocol Analyzers:
Wireshark
Tcpdump
IDS/IPS Tools:
Suricata
Firewalls
Here are the projects I completed, along with the skills and knowledge gained:
Projects | Skills/Knowledge Gained |
---|---|
Conduct a Security Audit | INFOSEC NIST Risk Management Framework Security Audits NIST Cybersecurity Framework Incident Response Playbooks CISSP CIA triad |
Network Security | TCP/IP model Network Architecture Network Communication Security Hardening Network Security Cloud Networks |
Linux & SQL | Command-line Interface SQL Linux Bash |
Assets, Threats, & Vulnerabilities | Authentication Vulnerability Assessment Cryptography Asset Classification Threat Modelling Analysis |
Detection & Response | Incident Lifecycle Incident Journal |
Tcpdump & Wireshark | Packet Analyzer |
IDS & SIEM | Intrusion Detection System (IDS) : Suricata Security Information and Event Management (SIEM): Chronicle Splunk |
Automation with Python | Computer Programming Python Programming Coding PEP 8 Style Guide |
During my coursework and projects, I used several tools to enhance my cybersecurity skills:
Google Workspace (Drive, Docs, Sheets, Slides)
Markdown Language
Tcpdump
Wireshark
Linux OS
SQL
Chronicle
Splunk
Suricata
Python
Each directory in this repository holds the files for each of the courses in the certificate, listed in the order they were completed:
- Foundations of Cybersecurity
- Play It Safe: Manage Security Risks
- Connect and Protect: Networks and Network Security
- Tools of the Trade: Linux and SQL
- Assets, Threats, and Vulnerabilities
- Sound the Alarm: Detection and Response
- Automate Cybersecurity Tasks with Python
- Put It to Work: Prepare for Cybersecurity Jobs (No files needed)
This program has given me the necessary skills and knowledge to understand how security teams protect their organizations and customers. I look forward to contributing to cybersecurity and continuously expanding my expertise.
Please feel free to explore my projects, and do not hesitate to reach out to me on LinkedIn.