Projects, notes, and write-ups I have done while completing the Google Cybersecurity Certificate
☆143Oct 3, 2023Updated 2 years ago
Alternatives and similar repositories for google-cybersecurity
Users that are interested in google-cybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Misc notes from Google's Cybersecurity Professional Certificate☆83Aug 6, 2024Updated last year
- I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilitie…☆155Jul 19, 2025Updated 9 months ago
- A Repo to keep the CyberSecurity-IIITA projects☆17Aug 9, 2017Updated 8 years ago
- Project for CyberSecurity Bachelor☆16Mar 9, 2022Updated 4 years ago
- Coursera☆21May 30, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Cybersecurity Internship Project☆120Jun 18, 2022Updated 3 years ago
- A collection of python cybersecurity projects☆49Jan 27, 2024Updated 2 years ago
- This repository is a collection of detailed notes, summaries, and resources to help you prepare for the Google Cybersecurity Professional…☆70Sep 13, 2024Updated last year
- Coding labs from the Automate Cybersecurity Tasks with Python course from Google's Cybersecurity Professional Certificate.☆11Jan 26, 2024Updated 2 years ago
- This repository holds some very beginner projects that I worked on related to cybersecurity.☆25Sep 23, 2024Updated last year
- This repository contains projects and activities that have been completed within the CyberSecurity Bootcamp.☆16May 24, 2022Updated 3 years ago
- Investigating attacks using Splunk Enterprise logs and creating SPL intrusion detection searches based on known attacker TTPs and anomaly…☆29Nov 19, 2023Updated 2 years ago
- Hands-on cybersecurity training projects for beginners to learn vulnerability management and essential skills☆207Jun 20, 2024Updated last year
- Google Cybersecurity Professional Certificate☆18Sep 21, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Several simple projects done in Python for network monitoring for Cybersecurity and high availability. All the modules needed are in thei…☆32Apr 14, 2025Updated last year
- ☆12Aug 17, 2021Updated 4 years ago
- OSCP Prep notes☆14Oct 18, 2020Updated 5 years ago
- Resources for DFIR. And more.☆11Jul 3, 2024Updated last year
- Password Manager is a simple and secure application designed to store and manage your passwords. Developed using Java, it employs AES enc…☆56Sep 10, 2024Updated last year
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆23Jan 23, 2023Updated 3 years ago
- Threat Detection Engineering 101 Project☆20Oct 17, 2024Updated last year
- Study notes for the CompTIA Security+ certification☆81Aug 30, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The purpose of this repository is to concentrate information, concepts and studies for the Certified in Cybersecurity (ISC²) exam.☆52Apr 18, 2023Updated 3 years ago
- All credits to Matt Walker (Author of "CEH Certified Ethical Hacker All-in-One Exam Guide" ISBN 1264269943)☆11Feb 5, 2022Updated 4 years ago
- TOGAF9 Study Guide☆16Jul 26, 2018Updated 7 years ago
- ISC2-CC-Study-Material☆1,285Mar 11, 2024Updated 2 years ago
- Bat Script to collect system and network information from Windows machines without external agents. Ideal for vulnerability assessment an…☆14Jan 27, 2025Updated last year
- A collection of hacking / penetration testing resources to make you better!☆12Oct 1, 2020Updated 5 years ago
- ☆23Jul 17, 2024Updated last year
- Google Cyber Security Specialization - Activities☆16Dec 4, 2023Updated 2 years ago
- A simple python based Key-Logger project in Cyber Security☆47Jan 30, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆46Apr 15, 2023Updated 3 years ago
- Suggestions, questions, and brainstorming☆21May 18, 2020Updated 5 years ago
- ☆22Feb 3, 2026Updated 2 months ago
- Welcome to the Cybersecurity Career Accelerator Repository! This repository is tailored to help aspiring cybersecurity professionals prep…☆355Oct 1, 2025Updated 7 months ago
- Basic tool for Information Gathering 🚀☆27Mar 26, 2024Updated 2 years ago
- Google Analytics Sample Code for Configuration APIs☆30Mar 25, 2014Updated 12 years ago
- a simple keylogger in python that sends the keystrokes to the server (Telegram)☆23Apr 8, 2026Updated 3 weeks ago