Google
Google Cybersecurity Professional Certificate
Google

Google Cybersecurity Professional Certificate

Get on the fast track to a career in cybersecurity. In this certificate program, you'll learn in-demand skills, and get AI training from Google experts. Learn at your own pace, no degree or experience required. Additionally, when you enroll today, you’ll get access to Google AI Essentials at no cost. Offer ends 11/30*

Google Career Certificates

Top Instructor

Sponsored by University of Texas at Austin

729,995 already enrolled

Earn a career credential that demonstrates your expertise
4.8

(34,431 reviews)

Beginner level
No prior experience required
6 months
at 7 hours a week
Flexible schedule
Learn at your own pace
Earn a career credential that demonstrates your expertise
4.8

(34,431 reviews)

Beginner level
No prior experience required
6 months
at 7 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Understand the importance of cybersecurity practices and their impact for organizations.

  • Identify common risks, threats, and vulnerabilities, as well as techniques to mitigate them.

  • Protect networks, devices, people, and data from unauthorized access and cyberattacks using Security Information and Event Management (SIEM) tools.

  • Gain hands-on experience with Python, Linux, and SQL.

Details to know

Shareable certificate

Add to your LinkedIn profile

Industry certification
Taught in English

See how employees at top companies are mastering in-demand skills

Placeholder

Prepare for a career in cybersecurity

  • Receive professional-level training from Google
  • Demonstrate your proficiency in portfolio-ready projects
  • Earn an employer-recognized certificate from Google
  • Qualify for in-demand job titles: cybersecurity analyst, security analyst, security operations center (SOC) analyst
Placeholder
$100,000+
median U.S. salary for cybersecurity
¹
213,000+
U.S. job openings in cybersecurity
¹
75%
of certificate graduates report career improvement
²

Get exclusive access to career resources upon completion

  • Resume review

    Improve your resume and LinkedIn with personalized feedback

  • Interview prep

    Practice your skills with interactive tools and mock interviews

  • Career support

    Plan your career move with Coursera’s job search guide

Connect with 150+ U.S. hiring organizations in Google’s Employer Consortium

  • Placeholder
  • Placeholder
  • Placeholder
  • Placeholder
  • Placeholder
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

Professional Certificate - 8 course series

Foundations of Cybersecurity

Course 114 hours4.8 (27,209 ratings)

What you'll learn

  • Recognize core skills and knowledge needed to become a cybersecurity analyst

  • Identify how security attacks impact business operations

  • Explain security ethics

  • Identify common tools used by cybersecurity analysts

Skills you'll gain

Category: Cybersecurity
Category: Network Security
Category: Security Information and Event Management (SIEM)
Category: Computer Security Incident Management
Category: Security Software
Category: Computer Security
Category: Information Systems Security
Category: Data Governance
Category: Data Security
Category: Enterprise Security
Category: Incident Management
Category: Security Strategy
Category: Software Development
Category: Data Strategy
Category: Security Management
Category: Safety and Security
Category: Software Development Tools
Category: Security Controls
Category: Data Management
Category: Data Ethics
Category: Cyber Attacks

Play It Safe: Manage Security Risks

Course 211 hours4.8 (7,973 ratings)

What you'll learn

  • Identify the primary threats, risks, and vulnerabilities to business operations

  • Examine how organizations use security frameworks and controls to protect business operations

  • Define commonly used Security Information and Event Management (SIEM) tools

  • Use a playbook to respond to threats, risks, and vulnerabilities

Skills you'll gain

Category: Cybersecurity
Category: Computer Security Incident Management
Category: Risk Management
Category: Incident Response
Category: Auditing
Category: Risk Management Framework
Category: Security Strategy
Category: Security Controls
Category: Security Information and Event Management (SIEM)
Category: Incident Management
Category: Security Management
Category: Open Web Application Security Project (OWASP)
Category: Web Applications
Category: Safety and Security
Category: Internal Auditing
Category: Cyber Risk
Category: Application Security
Category: Network Security

Connect and Protect: Networks and Network Security

Course 314 hours4.8 (5,183 ratings)

What you'll learn

  • Define the types of networks and components of networks

  • Illustrate how data is sent and received over a network

  • Understand how to secure a network against intrusion tactics

  • Describe system hardening techniques

Skills you'll gain

Category: Cybersecurity
Category: General Networking
Category: Network Protocols
Category: Information Systems Security
Category: Cyber Attacks
Category: Computer Networking
Category: Security Engineering
Category: TCP/IP
Category: Network Infrastructure
Category: Hardening
Category: Network Security
Category: Vulnerability Management
Category: Virtual Private Networks (VPN)
Category: Information Technology Architecture
Category: Network Support
Category: Networking Hardware
Category: Network Architecture
Category: Network Engineering
Category: Network Administration
Category: Enterprise Security
Category: Network Troubleshooting
Category: Infrastructure Security
Category: Cloud Solutions
Category: Information Technology
Category: Computer Hardware
Category: IT Infrastructure
Category: Cloud Security
Category: Firewall
Category: Network Planning And Design
Category: IT Security Architecture
Category: Cloud Computing
Category: Data Security

Tools of the Trade: Linux and SQL

Course 426 hours4.8 (4,485 ratings)

What you'll learn

  • Explain the relationship between operating systems, applications, and hardware

  • Compare a graphical user interface to a command line interface

  • Navigate and manage the file system using Linux commands via the Bash shell

  • Use SQL to retrieve information from a database

Skills you'll gain

Category: Operating Systems
Category: Linux
Category: Computing Platforms
Category: Linux Administration
Category: Query Languages
Category: Database Systems
Category: Database Development
Category: Unix Shell
Category: Linux Commands
Category: Unix
Category: SQL
Category: Database Management
Category: Command-Line Interface
Category: Relational Databases
Category: System Software
Category: Linux Servers
Category: Database Management Systems
Category: Systems Administration
Category: Computer Science
Category: Server Administration
Category: Computer Systems
Category: Database Application
Category: User Accounts
Category: Records Management
Category: File Management
Category: Data Management
Category: Databases
Category: Data Storage
Category: User Provisioning
Category: Identity and Access Management
Category: Shell Script
Category: Network Security
Category: Bash (Scripting Language)
Category: Scripting Languages
Category: Database Theory
Category: IT Infrastructure
Category: Authorization (Computing)
Category: Document Management
Category: Database Architecture and Administration
Category: Application Security
Category: File Systems
Category: Cybersecurity

Assets, Threats, and Vulnerabilities

Course 525 hours4.8 (2,970 ratings)

What you'll learn

  • Classify assets

  • Analyze an attack surface to find risks and vulnerabilities

  • Identify threats, such as social engineering, malware and web-based exploits

  • Summarize the threat modeling process

Skills you'll gain

Category: Cybersecurity
Category: Vulnerability Assessments
Category: Cyber Security Assessment
Category: Authentications
Category: IT Security Architecture
Category: Threat Modeling
Category: Security Engineering
Category: Security Management
Category: Vulnerability
Category: Information Systems Security
Category: Security Strategy
Category: Identity and Access Management
Category: Security Controls
Category: Vulnerability Management
Category: NIST 800-53
Category: Data Governance
Category: Authorization (Computing)
Category: Risk Mitigation
Category: Threat Management
Category: Cyber Security Policies
Category: Risk Management
Category: Information Technology
Category: Enterprise Risk Management (ERM)
Category: Network Security
Category: Safety and Security
Category: Cyber Risk
Category: Risk Control
Category: Cyber Governance
Category: Information Technology Architecture
Category: Enterprise Security
Category: Data Strategy
Category: Malware Protection
Category: Data Security
Category: Application Security
Category: Cryptography
Category: Encryption
Category: Business Risk Management
Category: Information Privacy
Category: Security Software
Category: Data Management
Category: Cyber Attacks
Category: Cyber Security Strategy
Category: Asset Protection
Category: Information Assurance

Sound the Alarm: Detection and Response

Course 624 hours4.8 (2,460 ratings)

What you'll learn

  • Identify the steps to contain, eradicate, and recover from an incident

  • Analyze packets to interpret network communications

  • Understand basic syntax, components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools

  • Perform queries in Security Information and Event Management (SIEM) tools to investigate an event

Skills you'll gain

Category: Cybersecurity
Category: Computer Security Incident Management
Category: Incident Management
Category: Incident Response
Category: Network Monitoring
Category: Network Security
Category: Network Performance Management
Category: Security Information and Event Management (SIEM)
Category: Network Administration
Category: General Networking
Category: Threat Detection
Category: Network Infrastructure
Category: Threat Management
Category: Cyber Security Strategy
Category: Intrusion Detection and Prevention
Category: Network Engineering
Category: Computer Networking

Automate Cybersecurity Tasks with Python

Course 729 hours4.7 (2,493 ratings)

What you'll learn

  • Explain how the Python programming language is used in cybersecurity

  • Create new, user-defined Python functions

  • Use regular expressions to extract information from text

  • Practice debugging code

Skills you'll gain

Category: Computer Programming
Category: Python Programming
Category: Computer Science
Category: Scripting
Category: Scripting Languages
Category: Debugging
Category: IT Automation
Category: Automation
Category: Network Security
Category: Software Engineering
Category: Cybersecurity
Category: Programming Principles
Category: Information Technology
Category: Systems Administration
Category: Robotic Process Automation

Put It to Work: Prepare for Cybersecurity Jobs

Course 819 hours4.8 (3,705 ratings)

What you'll learn

  • Determine when and how to escalate a security incident

  • Engage with the cybersecurity community

  • Apply for cybersecurity jobs and prepare for interviews.

  • Gain a competitive edge by learning AI skills from Google experts.

  • Boost your cybersecurity skills with AI
  • Decode complex security frameworks with AI
  • Use AI to help identify bugs
  • Refine code with help from AI
  • Understand system vulnerabilities with AI
  • Prioritize alerts with AI

Skills you'll gain

Category: Cybersecurity
Category: Security Management
Category: Security Strategy
Category: Incident Management
Category: Risk Control
Category: Interviewing Skills
Category: Asset Protection
Category: Stakeholder Communications
Category: Business Risk Management
Category: Computer Security Incident Management
Category: Interpersonal Communications
Category: Risk Mitigation
Category: Security Awareness
Category: Data Security
Category: Stakeholder Management
Category: Stakeholder Engagement
Category: Human Resources
Category: Recruitment
Category: Communication
Category: Enterprise Security
Category: Infrastructure Security
Category: Incident Response
Category: Communication Strategies
Category: Network Security
Category: Professional Networking
Category: Information Systems Security
Category: Human Resources Management and Planning

Instructor

Google Career Certificates

Top Instructor

Google
325 Courses11,012,530 learners

Offered by

Google

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Placeholder

Open new doors with Coursera Plus

Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

¹Lightcast™ US Job Postings (median salary with 0-5 years experience), Jan. 1, 2022 - Dec. 31, 2022). ²Positive career outcome (e.g., new job, promotion, or raise) within six months of completion. Based on program graduate survey, United States 2022. *Claim this limited-time offer by November 30, 11:59 PM PT. Valid for new Google Professional Certificate purchase only, limited to one per person. Offer only valid on English and Spanish certificate versions. Cannot be used in conjunction with other offers. Coursera reserves the right to modify or cancel the promotion at any time. Free enrollment into Google AI Essentials triggered upon purchase of Google Professional Certificate subscription. Access to Google AI Essentials is 180 days from purchase date of Google Professional Certificate. Coursera reserves the right to revoke Google AI Essentials access if the learner does not pay for Google Professional Certificate. Offer value may differ based on location. Terms for promotional offers apply.