0% found this document useful (0 votes)
11 views1 page

Coursera UF0AMSLFWKIZ

Muhammad Namiq has completed the Google Cybersecurity Certificate, which consists of eight online courses focused on foundational cybersecurity skills. The program equips learners with knowledge in Python, Linux, SQL, and various cybersecurity tools, preparing them for entry-level roles. This certificate does not confer university credit or verify learner identity.

Uploaded by

yahiyakalaty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views1 page

Coursera UF0AMSLFWKIZ

Muhammad Namiq has completed the Google Cybersecurity Certificate, which consists of eight online courses focused on foundational cybersecurity skills. The program equips learners with knowledge in Python, Linux, SQL, and various cybersecurity tools, preparing them for entry-level roles. This certificate does not confer university credit or verify learner identity.

Uploaded by

yahiyakalaty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

8 Courses

Mar 2, 2025

Muhammad Namiq Amanda Brophy


Global Director of
has successfully completed the online, non-credit Professional Google Career
Certificate Certificates

Foundations of
Cybersecurity

Play It Safe: Manage


Google Cybersecurity
Security Risks
Those who earn the Google Cybersecurity Certificate have completed
Connect and Protect:
Networks and Network eight courses, developed by Google, that include hands-on, practice-
Security based assessments and are designed to prepare them for entry-level
Tools of the Trade: Linux and roles in cybersecurity. They are competent in beginner-level Python,
SQL Linux, SQL, Security Information and Event Management (SIEM) tools,
Assets, Threats, and and Intrusion Detection Systems (IDS). They know how to identify
Vulnerabilities common cybersecurity risks, threats, and vulnerabilities, as well as the
Sound the Alarm: Detection techniques to mitigate.
and Response

Automate Cybersecurity
Tasks with Python

Put It to Work: Prepare for


Cybersecurity Jobs

The online specialization named in this certificate may draw on material from courses taught on-campus, but the included Verify this certificate at:
courses are not equivalent to on-campus courses. Participation in this online specialization does not constitute enrollment
https://coursera.org/verify/profession
at this university. This certificate does not confer a University grade, course credit or degree, and it does not verify the
identity of the learner. al-cert/UF0AMSLFWKIZ

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy