The Web Weaves, You Stand Guard

In the vast maze of the digital, cybersecurity serves as a guiding compass. Prepare to navigate with precision.

Journey with us, mastering the nuances and intricacies of the cyber world. Your role: the safeguard of digital realms. Embrace it.

 

GET EDUCATED
INTRODUCING ONLINE COURSE

GOOGLE CYBERSECURITY

PROFESSIONAL CERTIFICATE
  • Understand the importance of cybersecurity practices and their impact for organizations.
  • Identify common risks, threats, and vulnerabilities, as well as techniques to mitigate them.
  • Protect networks, devices, people, and data from unauthorized access and cyberattacks using Security Information and Event Management (SIEM) tools.
  • Gain hands-on experience with Python, Linux, and SQL.

After just three months, you'll be ready to step into the IT world

 

  • 75% of certificate graduates report a positive career outcome (e.g., new job, promotion, or raise) within six months of completion
  • In addition to expert training and hands-on projects, you'll complete a case study that you can share with potential employers to showcase your new skill set.
  • Have specific skills that top employers are hiring for right now.

PROFESSIONAL CERTIFICATE STRUCTURE

COURSE 1

Foundations of Cybersecurity

In this course, you will be introduced to the world of cybersecurity through an interactive curriculum developed by Google. 

  • Recognize core skills and knowledge needed to become a cybersecurity analyst
  • Identify how security attacks impact business operations
  • Explain security ethics
  • Identify common tools used by cybersecurity analysts

Skills: Information Security (INFOSEC), Historical Attacks, Ethics in cybersecurity, 

COURSE 2

Play It Safe: Manage Security Risks

In this course, you will take a deeper dive into concepts introduced in the first course, with an emphasis on how cybersecurity professionals use frameworks and controls to protect business operations.

  • Identify the primary threats, risks, and vulnerabilities to business operations
  • Examine how organizations use security frameworks and controls to protect business operations
  • Define commonly used Security Information and Event Management (SIEM) tool
  • Use a playbook to respond to threats, risks, and vulnerabilities

Skills: Information Security (INFOSEC), Security Audits, Incident Response Playbooks, NIST Risk Management Framework (RMF), 

COURSE 3

Connect and Protect: Networks and Network Security

In this course, you will explore how networks connect multiple devices and allow them to communicate.

  • Define the types of networks and components of networks
  • Illustrate how data is sent and received over a network
  • Understand how to secure a network against intrusion tactics
  • Describe system hardening techniques

Skills: Network Architecture, Transmission Control Protocol / Internet Protocol (TCP/IP)

COURSE 4

Tools of the Trade: Linux and SQL

In this course, you will explore computing skills that you’ll use on-the-job as a cybersecurity analyst.

  • Explain the relationship between operating systems, applications, and hardware
  • Compare a graphical user interface to a command line interfac
  • Navigate and manage the file system using Linux commands via the Bash shell
  • Use SQL to retrieve information from a database

 

Skills: Linux, Command Line Interface (CLI), Bash, SQL

COURSE 5

Assets, Threats, and Vulnerabilities

In this course, you will explore the concepts of assets, threats, and vulnerabilities.

  • Classify assets
  • Analyze an attack surface to find risks and vulnerabilities
  • Identify threats, such as social engineering, malware and web-based exploits
  • Summarize the threat modeling process

 

 Skills: Vulnerability Assessment, Threat Analysis, Authentication, 

COURSE 6

Sound the Alarm: Detection and Response

In this course, you will focus on incident detection and response.

  • Identify the steps to contain, eradicate, and recover from an incident
  • Analyze packets to interpret network communications
  • Understand basic syntax, components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools
  • Perform queries in Security Information and Event Management (SIEM) tools to investigate an event 

 Skills: Security Information and Event Management (SIEM) Tools, Packet Analyzer, Intrusion Detection Systems (IDS)

COURSE 7

Automat Cybersecurity Tasks With Python 

In this course, you will be introduced to the Python programming language and apply it in a cybersecurity setting to automate tasks.

  • Explain how the Python programming language is used in cybersecurity
  • Create new, user-defined Python functions
  • Use regular expressions to extract information from text
  • Practice debugging code

 

Skills: Computer Programming, Python Programming, Coding, PEP 8 Style Guide

COURSE 8

Put It to Work: Prepare for Cybersecurity Jobs

In this course, you will focus on making decisions and escalating incidents to stakeholders.

  • Determine when and how to escalate a security incident
  • Engage with the cybersecurity community
  • Find and apply for cybersecurity jobs
  • Prepare for job interviews

 

Skills: Job Preparedness, Stakeholder Communication, Integrity and Discretion,Escalation, Resume and Portfolio Preparation

This Course Is For You If...

  • Students and Graduate in information technology disciplines looking to expand their professional skill set and delve into cybersecurity.

  • IT Professionals aiming to refresh their knowledge, deepen their understanding of modern threats, and familiarize themselves with prevention methods.

  • Business Owners and Entrepreneurs who want to grasp how to better protect their data and information systems.

  • Individuals without a technical background but are interested in a career in cybersecurity, seeking a comprehensible entry into the field.

  • Organizations and IT Departments aspiring to enhance the qualifications of their staff in the realm of cybersecurity.

  • People valuing online privacy and security, wanting to better understand how to protect themselves on the internet.

NICE TO MEET YOU

LEARN FROM EXPERIENCED IT PROFESSIONALS

The course is led by seasoned professionals from Google:

  • Toni, a Security Engineering Manager at Google
  • Ashley, a Customer Engineering Enablement Lead for Security Operations Sales at Google
  • Chris, a Chief Information Security Officer for Google Fiber.
  • Kim, a Technical Program Manager at Google.
  • Da'Queshia, a Security Engineer at Google.
  • Dave, a Principal Security Strategist at Google.
  • Angel, a Security Engineer at Google.
  • Dion, a Program Manager at Google.
  • Emily, a Program Manager at Google.

This last course was really amazing!! This course really helps me to prepare for any cybersecurity role. I enjoyed the topic about engaging with the security community.

I will definitely recommend to my friends, my colleagues and to anyone to take this Google Cybersecurity Professional Certificate course. In fact, this course gave me confidence to seek a new learning opportunity. 

Syrick G, August 2023

I am extremely grateful for the remarkable course you've provided. The content's depth, engaging approach, and expert instructors made learning truly enjoyable. The interactive assignments and practical insights were invaluable. This course exceeded my expectations and ignited a passion for the subject. Thank you for the exceptional experience. Looking forward to more!

Rapking R, August 2023

I highly recommend the Google Cybersecurity Certificate to anyone interested in pursuing a career in cybersecurity or looking to expand their knowledge in the field. The program's hands-on approach, comprehensive curriculum, and industry-relevant skills make it an excellent choice for individuals seeking practical and effective cybersecurity training.

 
Kondwani L, July 2023

Course

1450€

including VAT

GET STARTED TODAY!

GOOGLE CYBERSECURITY
PROFESSIONAL CERTIFICATE

Learning format

The courses are offered in a flexible, online environment and conclude with a certificate of completion that speaks to your competencies in a contemporary and evolving marketplace.

The total volume of training: 162 hours (216 academic hours) of independent work (including work on homework).

Payment by invoice

Kindly provide your billing information in the comment field during registration. An invoice will be issued within 3 business days after registration for the training.

Before registering for the training, we kindly ask you to familiarize yourself with the curriculum of and terms of the training organization.

Ettevõtluskeskus OÜ is an authorized partner of Eesti Töötukassa, the Unemployment Office.

By registering for the course, you acknowledge and agree to the terms of use regarding the personal data provided to the Entrepreneurship Center (Ettevõtluskeskus OÜ).

As the digital world beckons, seize the opportunity to elevate your skills with us.
Dive deep, learn robustly, and be at the forefront of cyber resilience.
Join the course and shape your future in the expansive realm of cybersecurity.

HESITATING TO TAKE THE LEAP?

We genuinely understand the intricacies and challenges of self-paced learning. That's why our dedication to student success goes beyond mere content delivery:

>> Dynamic Progress Tracking: We closely monitor each student's journey, noting their progress, strengths, and areas of challenge. This allows us to proactively step in when necessary, ensuring that no student feels left behind.

>> Motivational Assistance: Learning can sometimes bring moments of doubt or frustration. In such instances, our team is right there to motivate and provide the push needed to overcome obstacles. Your success is our primary goal, and we're committed to ensuring you get there.

>> Always Accessible: Whether you have a course-related query, technical issue, or simply need guidance, our support team is a message away. We pride ourselves on being responsive and genuinely invested in resolving your concerns.

>> A Constant Companion in Your Learning Journey: The path of self-education can sometimes feel lonely. But with us, you'll always feel the presence of a supportive community. Every step of the way, we're here, ensuring you not only learn but thrive.

Remember, every milestone you achieve is celebrated by us as well. At Ettevõtluskeskus, you're never alone in your educational journey.