0% found this document useful (0 votes)
8 views1 page

Coursera 9JAQAC9NUMMW

Luis Hernandez Velazquez has completed the Google Cybersecurity Certificate, which includes eight online courses focused on foundational cybersecurity skills. The program covers topics such as Python, Linux, SQL, and risk management, preparing participants for entry-level roles in cybersecurity. This certificate does not confer university credit or verify learner identity.

Uploaded by

lmh316
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views1 page

Coursera 9JAQAC9NUMMW

Luis Hernandez Velazquez has completed the Google Cybersecurity Certificate, which includes eight online courses focused on foundational cybersecurity skills. The program covers topics such as Python, Linux, SQL, and risk management, preparing participants for entry-level roles in cybersecurity. This certificate does not confer university credit or verify learner identity.

Uploaded by

lmh316
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

8 Courses

Mar 12, 2024

Luis Hernandez Velazquez Amanda Brophy


Global Director of
has successfully completed the online, non-credit Professional Google Career
Certificate Certificates

Foundations of
Cybersecurity

Play It Safe: Manage


Google Cybersecurity
Security Risks
Those who earn the Google Cybersecurity Certificate have completed
Connect and Protect:
Networks and Network eight courses, developed by Google, that include hands-on, practice-
Security based assessments and are designed to prepare them for entry-level
Tools of the Trade: Linux and roles in cybersecurity. They are competent in beginner-level Python,
SQL Linux, SQL, Security Information and Event Management (SIEM) tools,
Assets, Threats, and and Intrusion Detection Systems (IDS). They know how to identify
Vulnerabilities common cybersecurity risks, threats, and vulnerabilities, as well as the
Sound the Alarm: Detection techniques to mitigate.
and Response

Automate Cybersecurity
Tasks with Python

Put It to Work: Prepare for


Cybersecurity Jobs

The online specialization named in this certificate may draw on material from courses taught on-campus, but the included Verify this certificate at:
courses are not equivalent to on-campus courses. Participation in this online specialization does not constitute enrollment
https://coursera.org/verify/profession
at this university. This certificate does not confer a University grade, course credit or degree, and it does not verify the
identity of the learner. al-cert/9JAQAC9NUMMW

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy