Google
Google Cybersecurity Professional Certificate

Discover new skills with $120 off courses from industry experts. Save now.

Google

Google Cybersecurity Professional Certificate

Get on the fast track to a career in cybersecurity. In this certificate program, you'll learn in-demand skills, and get AI training from Google experts. Learn at your own pace, no degree or experience required.

1,115,483 already enrolled

Included with Coursera Plus

Earn a career credential that demonstrates your expertise

(48,278 reviews)

Beginner level
No prior experience required
6 months at 7 hours a week
Flexible schedule
Earn a career credential
Share your expertise with employers
Earn a career credential that demonstrates your expertise

(48,278 reviews)

Beginner level
No prior experience required
6 months at 7 hours a week
Flexible schedule
Earn a career credential
Share your expertise with employers

What you'll learn

  • Understand the importance of cybersecurity practices and their impact for organizations.

  • Identify common risks, threats, and vulnerabilities, as well as techniques to mitigate them.

  • Protect networks, devices, people, and data from unauthorized access and cyberattacks using Security Information and Event Management (SIEM) tools.

  • Gain hands-on experience with Python, Linux, and SQL.

Overview

What’s included

Shareable certificate

Add to your LinkedIn profile

Taught in English
Recently updated!

May 2025

169 practice exercises

Professional Certificate - 9 course series

What you'll learn

  • Recognize core skills and knowledge needed to become a cybersecurity analyst

  • Identify how security attacks impact business operations

  • Explain security ethics

  • Identify common tools used by cybersecurity analysts

Skills you'll gain

Category: Cybersecurity
Category: Security Information and Event Management (SIEM)
Category: Security Controls
Category: Information Assurance
Category: Network Security
Category: Cyber Security Strategy
Category: Compliance Management
Category: Data Ethics
Category: Information Systems Security
Category: Application Security
Category: Cyber Risk
Category: Information Systems Security Assessment Framework (ISSAF)
Category: Ethical Standards And Conduct

What you'll learn

  • Identify the primary threats, risks, and vulnerabilities to business operations

  • Examine how organizations use security frameworks and controls to protect business operations

  • Define commonly used Security Information and Event Management (SIEM) tools

  • Use a playbook to respond to threats, risks, and vulnerabilities

Skills you'll gain

Category: Security Information and Event Management (SIEM)
Category: Security Controls
Category: Risk Management
Category: Cybersecurity
Category: Auditing
Category: Incident Response
Category: Compliance Auditing
Category: Vulnerability Management
Category: Information Assurance
Category: Open Web Application Security Project (OWASP)
Category: Threat Detection
Category: Threat Management
Category: Enterprise Security
Category: Risk Analysis
Category: Information Systems Security

What you'll learn

  • Define the types of networks and components of networks

  • Illustrate how data is sent and received over a network

  • Understand how to secure a network against intrusion tactics

  • Describe system hardening techniques

Skills you'll gain

Category: Network Security
Category: Hardening
Category: Network Protocols
Category: Computer Networking
Category: Virtual Private Networks (VPN)
Category: Network Architecture
Category: Firewall
Category: Cloud Computing
Category: TCP/IP
Category: Cybersecurity
Category: Encryption
Category: Intrusion Detection and Prevention
Category: Vulnerability Assessments
Category: Network Infrastructure
Category: Cloud Security

What you'll learn

  • Explain the relationship between operating systems, applications, and hardware

  • Compare a graphical user interface to a command line interface

  • Navigate and manage the file system using Linux commands via the Bash shell

  • Use SQL to retrieve information from a database

Skills you'll gain

Category: Operating Systems
Category: Linux Commands
Category: SQL
Category: Linux
Category: Bash (Scripting Language)
Category: Authentications
Category: Unix
Category: Relational Databases
Category: Command-Line Interface
Category: Authorization (Computing)
Category: User Accounts
Category: Database Management
Category: File Systems

What you'll learn

  • Classify assets

  • Analyze an attack surface to find risks and vulnerabilities

  • Identify threats, such as social engineering, malware and web-based exploits

  • Summarize the threat modeling process

Skills you'll gain

Category: Security Controls
Category: Authentications
Category: Threat Modeling
Category: Vulnerability Management
Category: Authorization (Computing)
Category: Cybersecurity
Category: Vulnerability Assessments
Category: Cyber Risk
Category: MITRE ATT&CK Framework
Category: Malware Protection
Category: NIST 800-53
Category: Cryptography
Category: Data Security
Category: Cyber Threat Intelligence
Category: Risk Management Framework
Category: Threat Detection
Category: Cyber Attacks
Category: Identity and Access Management
Category: Security Strategy
Category: Threat Management

What you'll learn

  • Identify the steps to contain, eradicate, and recover from an incident

  • Analyze packets to interpret network communications

  • Understand basic syntax, components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools

  • Perform queries in Security Information and Event Management (SIEM) tools to investigate an event

Skills you'll gain

Category: Security Information and Event Management (SIEM)
Category: Incident Response
Category: Intrusion Detection and Prevention
Category: Technical Documentation
Category: Splunk
Category: Network Analysis
Category: TCP/IP
Category: Computer Security Incident Management
Category: Event Monitoring
Category: Network Security
Category: Continuous Monitoring
Category: Incident Management
Category: Threat Detection
Category: Network Monitoring
Category: Security Management

What you'll learn

  • Explain how the Python programming language is used in cybersecurity

  • Create new, user-defined Python functions

  • Use regular expressions to extract information from text

  • Practice debugging code

Skills you'll gain

Category: Python Programming
Category: Scripting
Category: File Management
Category: Debugging
Category: Algorithms
Category: Integrated Development Environments
Category: Data Structures
Category: Automation
Category: Cyber Security Assessment
Category: Computer Programming
Category: Cybersecurity
Category: Programming Principles

What you'll learn

  • Determine when and how to escalate a security incident

  • Engage with the cybersecurity community

  • Apply for cybersecurity jobs and prepare for interviews.

  • Gain a competitive edge by learning AI skills from Google experts.

  • Boost your cybersecurity skills with AI
  • Decode complex security frameworks with AI
  • Use AI to help identify bugs
  • Refine code with help from AI
  • Understand system vulnerabilities with AI
  • Prioritize alerts with AI

Skills you'll gain

Category: Artificial Intelligence
Category: Data Security
Category: Technical Communication
Category: Security Management
Category: Incident Response
Category: Incident Management
Category: Cybersecurity
Category: Personally Identifiable Information
Category: Security Awareness
Category: Data Ethics
Category: Computer Security Incident Management
Category: Cyber Threat Intelligence

What you'll learn

  • Uncover your skills and explore new career possibilities, with support from tools like Career Dreamer.

  • Keep your applications organized with Google Sheets.

  • Build a stand out resume and a step-by-step job search plan—with help from Gemini.

  • Prepare for interviews and practice responding to questions using NotebookLM and Gemini Live.

Skills you'll gain

Category: Generative AI
Category: Communication
Category: Professional Development
Category: Applicant Tracking Systems
Category: Interviewing Skills
Category: Personal Attributes

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Build toward a degree

When you complete this Professional Certificate, you may be able to have your learning recognized for credit if you are admitted and enroll in one of the following online degree programs.¹

 

Instructor

Google

Top Instructor

Google
336 Courses13,611,840 learners

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions

¹ Median salary and job opening data are sourced from Lightcast™ Job Postings Report. Content Creator, Machine Learning Engineer and Salesforce Development Representative (1/1/2024 - 12/31/2024) All other job roles (9/1/2024 - 9/1/2025) ² Positive career outcome (e.g., new job, promotion, or raise) within six months of completion. Based on program graduate survey, United States 2022.