Skip to content

This Project is Part Of The Google Cyber Security Certificate, Showcasing My Understanding Of Core Cyber Security Principles And Practical Scenarios. The Response Below Reflect My Analysis And Solutions To Real-World Activities And Case Studies Covered Throughout The Course - Decrypt Mike

Notifications You must be signed in to change notification settings

DecryptMike/GCyber-Security-Course

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

72 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

DecryptMike Logo

🛡️ Google Cybersecurity Professional Certificate Course Activities

Welcome to my Google Cybersecurity Professional Certificate course activity repository, created under (Decrypt Mike). This repository showcases my understanding of core cybersecurity principles through real-world scenarios, analysis, and hands-on case study responses. Organized by chapters, it features dedicated sections for portfolio activities and excludes practice folders/
This repository is intended strictly for reference and personal development — not for collaboration or reuse.

📚 Table of Contents


🎯 Purpose

This repository serves as a structured collection of my progress and solutions for portfolio activities completed during the Google Cybersecurity Professional Certificate course. It is organized by chapters to ensure clarity and easy navigation for learning and reference purposes.


📂 Directory Structure

The repository follows a chapter-based directory format:

  • Chapters 1 – 7
    Each folder contains documents labeled in the format:
    Course Name - Chapter - Module

These documents include my responses, solutions, and analysis for each respective topic or activity covered in the course.


🚀 Getting Started

  1. Navigate to the relevant chapter folder.
  2. Open the labeled document containing portfolio activity responses.
  3. Use the content as a reference to understand real-world cybersecurity application.

⚠️ Please note: The solutions provided are for educational reference only and are not guaranteed to be the only or best answers.


🧰 Tech Stack

These are the primary tools and technologies I utilized throughout the course and in completing the portfolio activities:

  • 🔐 NIST Cybersecurity Framework
  • 🔍 Wireshark
  • 🖥️ Linux Command Line
  • 🧑‍💻 Bash & Shell Scripting
  • 🐍 Python (for scripting basics)
  • 📊 SQL (Data querying)
  • 🧱 CIA Triad & Risk Management Concepts
  • 🔎 Malware Analysis & Packet Inspection
  • 📑 Documentation & Report Writing

📄 License

  • This repository is licensed under the (Default Copyright Law) which prohibits the redistribution or reuse of its content.
  • However, others are welcome to explore, gain insights, and utilize the materials solely for personal learning and reference purposes.

📫 Contact

Personal
H4ck3rByt3s Profile

Professional
Decrypt Mike LinkedIn

About

This Project is Part Of The Google Cyber Security Certificate, Showcasing My Understanding Of Core Cyber Security Principles And Practical Scenarios. The Response Below Reflect My Analysis And Solutions To Real-World Activities And Case Studies Covered Throughout The Course - Decrypt Mike

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published