SlideShare a Scribd company logo
5 Courses
Technical Support
Fundamentals
The Bits and Bytes of
Computer Networking
Operating Systems and You:
Becoming a Power User
System Administration and
IT Infrastructure Services
IT Security: Defense against
the digital dark arts
Google
20.Ara.2020
MUSTAFA TOPÇU
has successfully completed the online, non-credit Professional
Certificate
Google IT Support
Whether you’ve been tinkering with IT or are completely new to the
field, you’ve come to the right place. This five-course certificate,
developed by Googlers, includes industry-relevant curriculum
designed to prepare you for an entry-level role in IT support. Think in-
person or remote help desk work, either in small shops or at a global
company, like Google!
The online specialization named in this certificate may draw on material from courses taught on-campus, but the included
courses are not equivalent to on-campus courses. Participation in this online specialization does not constitute enrollment
at this university. This certificate does not confer a University grade, course credit or degree, and it does not verify the
identity of the learner.
Verify this certificate at:
coursera.org/verify/professional-cert/PYWSJJLDRBM2

More Related Content

What's hot

Malicious software
Malicious softwareMalicious software
Malicious software
Dr.Florence Dayana
 
Testing and troubleshooting networks
Testing and troubleshooting networksTesting and troubleshooting networks
Testing and troubleshooting networks
Online
 
Lambdas, Collections Framework, Stream API
Lambdas, Collections Framework, Stream APILambdas, Collections Framework, Stream API
Lambdas, Collections Framework, Stream API
Prabu U
 
ACM code of ethics
ACM code of ethicsACM code of ethics
ACM code of ethics
Muhammad Haroon
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
Pina Parmar
 
Control Structures in Visual Basic
Control Structures in  Visual BasicControl Structures in  Visual Basic
Control Structures in Visual BasicTushar Jain
 
Introduction to Java Programming
Introduction to Java ProgrammingIntroduction to Java Programming
Introduction to Java Programming
Ravi Kant Sahu
 
Exception handling
Exception handlingException handling
Exception handlingIblesoft
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computing
Uc Man
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
APNIC
 
Exception Handling
Exception HandlingException Handling
Exception Handlingbackdoor
 
Security Principles and Protection Mechanism
Security Principles and Protection MechanismSecurity Principles and Protection Mechanism
Security Principles and Protection Mechanism
Mona Rajput
 
Software testing and process
Software testing and processSoftware testing and process
Software testing and process
gouravkalbalia
 
SNMP
SNMPSNMP
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
Yovan Chandel
 
Pseudocode
PseudocodePseudocode
Pseudocode
Harsha Madushanka
 
Control structures in java
Control structures in javaControl structures in java
Control structures in java
VINOTH R
 
1..Net Framework Architecture-(c#)
1..Net Framework Architecture-(c#)1..Net Framework Architecture-(c#)
1..Net Framework Architecture-(c#)
Shoaib Ghachi
 
Exception Handling
Exception HandlingException Handling
Exception Handling
Reddhi Basu
 

What's hot (20)

Malicious software
Malicious softwareMalicious software
Malicious software
 
Software testing Report
Software testing ReportSoftware testing Report
Software testing Report
 
Testing and troubleshooting networks
Testing and troubleshooting networksTesting and troubleshooting networks
Testing and troubleshooting networks
 
Lambdas, Collections Framework, Stream API
Lambdas, Collections Framework, Stream APILambdas, Collections Framework, Stream API
Lambdas, Collections Framework, Stream API
 
ACM code of ethics
ACM code of ethicsACM code of ethics
ACM code of ethics
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Control Structures in Visual Basic
Control Structures in  Visual BasicControl Structures in  Visual Basic
Control Structures in Visual Basic
 
Introduction to Java Programming
Introduction to Java ProgrammingIntroduction to Java Programming
Introduction to Java Programming
 
Exception handling
Exception handlingException handling
Exception handling
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computing
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Exception Handling
Exception HandlingException Handling
Exception Handling
 
Security Principles and Protection Mechanism
Security Principles and Protection MechanismSecurity Principles and Protection Mechanism
Security Principles and Protection Mechanism
 
Software testing and process
Software testing and processSoftware testing and process
Software testing and process
 
SNMP
SNMPSNMP
SNMP
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Pseudocode
PseudocodePseudocode
Pseudocode
 
Control structures in java
Control structures in javaControl structures in java
Control structures in java
 
1..Net Framework Architecture-(c#)
1..Net Framework Architecture-(c#)1..Net Framework Architecture-(c#)
1..Net Framework Architecture-(c#)
 
Exception Handling
Exception HandlingException Handling
Exception Handling
 

Similar to Google IT Support

Google & JFF Recruitment Deck - Community Colleges
Google & JFF Recruitment Deck - Community CollegesGoogle & JFF Recruitment Deck - Community Colleges
Google & JFF Recruitment Deck - Community Colleges
TaylorSprague9
 
IT Networking Courses
IT Networking CoursesIT Networking Courses
IT Networking Courses
vitseo1
 
Coursera GCP Cloud Engineer
Coursera GCP Cloud EngineerCoursera GCP Cloud Engineer
Coursera GCP Cloud Engineer
Maharaja P
 
CompTIA A+ Security Certification Training Courses in Dallas & Arlington, TX
CompTIA A+ Security Certification Training Courses in Dallas & Arlington, TXCompTIA A+ Security Certification Training Courses in Dallas & Arlington, TX
CompTIA A+ Security Certification Training Courses in Dallas & Arlington, TX
CCI Training Center
 
Master of IT
Master of ITMaster of IT
Master of IT
vitseo1
 
Coursera - Architecting with Google Compute Engine
Coursera - Architecting with Google Compute EngineCoursera - Architecting with Google Compute Engine
Coursera - Architecting with Google Compute Engine
Maharaja P
 
Coursera Googke Cloud Certification Cloud Architect
Coursera Googke Cloud Certification Cloud ArchitectCoursera Googke Cloud Certification Cloud Architect
Coursera Googke Cloud Certification Cloud Architect
Maharaja P
 
Top Certification for 2023 Top 10 Certifications Top Professional Certifications
Top Certification for 2023 Top 10 Certifications Top Professional CertificationsTop Certification for 2023 Top 10 Certifications Top Professional Certifications
Top Certification for 2023 Top 10 Certifications Top Professional Certifications
jeetendra mandal
 
Coursera Data Engg Big Data and Machine Learning GCP
Coursera Data Engg Big Data and Machine Learning GCPCoursera Data Engg Big Data and Machine Learning GCP
Coursera Data Engg Big Data and Machine Learning GCP
Maharaja P
 
Master of it Australia
Master of it AustraliaMaster of it Australia
Master of it Australia
viteduau
 
Coursera digital product management
Coursera digital product managementCoursera digital product management
Coursera digital product management
Guillaume Fillebeen
 
IT Networking Courses
IT Networking CoursesIT Networking Courses
IT Networking Courses
vitseo1
 
Level 4 Diploma in Information Technology (120 credits)
 Level 4 Diploma in Information Technology (120 credits) Level 4 Diploma in Information Technology (120 credits)
Level 4 Diploma in Information Technology (120 credits)
London School of International Business
 
IT Fundamentals for Cybersecurity
IT Fundamentals for CybersecurityIT Fundamentals for Cybersecurity
IT Fundamentals for Cybersecurity
Mustafa TOPÇU
 
Level 5 Diploma in Information Technology
Level 5 Diploma in Information TechnologyLevel 5 Diploma in Information Technology
Level 5 Diploma in Information Technology
London School of International Business
 
Master of IT
Master of ITMaster of IT
Master of IT
vitseo1
 
Coursera Security in Google Cloud Platform
Coursera Security in Google Cloud PlatformCoursera Security in Google Cloud Platform
Coursera Security in Google Cloud Platform
Maharaja P
 
Architecting with Google Compute Engine
Architecting with Google Compute EngineArchitecting with Google Compute Engine
Architecting with Google Compute Engine
Nicolas Benjamin Cruz Carpio
 
Level 5 Diploma in IT Networking
Level 5 Diploma in IT NetworkingLevel 5 Diploma in IT Networking
Level 5 Diploma in IT Networking
London School of International Business
 
Computer & network administration, cyber security it training course programs...
Computer & network administration, cyber security it training course programs...Computer & network administration, cyber security it training course programs...
Computer & network administration, cyber security it training course programs...
CCI Training Center
 

Similar to Google IT Support (20)

Google & JFF Recruitment Deck - Community Colleges
Google & JFF Recruitment Deck - Community CollegesGoogle & JFF Recruitment Deck - Community Colleges
Google & JFF Recruitment Deck - Community Colleges
 
IT Networking Courses
IT Networking CoursesIT Networking Courses
IT Networking Courses
 
Coursera GCP Cloud Engineer
Coursera GCP Cloud EngineerCoursera GCP Cloud Engineer
Coursera GCP Cloud Engineer
 
CompTIA A+ Security Certification Training Courses in Dallas & Arlington, TX
CompTIA A+ Security Certification Training Courses in Dallas & Arlington, TXCompTIA A+ Security Certification Training Courses in Dallas & Arlington, TX
CompTIA A+ Security Certification Training Courses in Dallas & Arlington, TX
 
Master of IT
Master of ITMaster of IT
Master of IT
 
Coursera - Architecting with Google Compute Engine
Coursera - Architecting with Google Compute EngineCoursera - Architecting with Google Compute Engine
Coursera - Architecting with Google Compute Engine
 
Coursera Googke Cloud Certification Cloud Architect
Coursera Googke Cloud Certification Cloud ArchitectCoursera Googke Cloud Certification Cloud Architect
Coursera Googke Cloud Certification Cloud Architect
 
Top Certification for 2023 Top 10 Certifications Top Professional Certifications
Top Certification for 2023 Top 10 Certifications Top Professional CertificationsTop Certification for 2023 Top 10 Certifications Top Professional Certifications
Top Certification for 2023 Top 10 Certifications Top Professional Certifications
 
Coursera Data Engg Big Data and Machine Learning GCP
Coursera Data Engg Big Data and Machine Learning GCPCoursera Data Engg Big Data and Machine Learning GCP
Coursera Data Engg Big Data and Machine Learning GCP
 
Master of it Australia
Master of it AustraliaMaster of it Australia
Master of it Australia
 
Coursera digital product management
Coursera digital product managementCoursera digital product management
Coursera digital product management
 
IT Networking Courses
IT Networking CoursesIT Networking Courses
IT Networking Courses
 
Level 4 Diploma in Information Technology (120 credits)
 Level 4 Diploma in Information Technology (120 credits) Level 4 Diploma in Information Technology (120 credits)
Level 4 Diploma in Information Technology (120 credits)
 
IT Fundamentals for Cybersecurity
IT Fundamentals for CybersecurityIT Fundamentals for Cybersecurity
IT Fundamentals for Cybersecurity
 
Level 5 Diploma in Information Technology
Level 5 Diploma in Information TechnologyLevel 5 Diploma in Information Technology
Level 5 Diploma in Information Technology
 
Master of IT
Master of ITMaster of IT
Master of IT
 
Coursera Security in Google Cloud Platform
Coursera Security in Google Cloud PlatformCoursera Security in Google Cloud Platform
Coursera Security in Google Cloud Platform
 
Architecting with Google Compute Engine
Architecting with Google Compute EngineArchitecting with Google Compute Engine
Architecting with Google Compute Engine
 
Level 5 Diploma in IT Networking
Level 5 Diploma in IT NetworkingLevel 5 Diploma in IT Networking
Level 5 Diploma in IT Networking
 
Computer & network administration, cyber security it training course programs...
Computer & network administration, cyber security it training course programs...Computer & network administration, cyber security it training course programs...
Computer & network administration, cyber security it training course programs...
 

More from Mustafa TOPÇU

Aws Fundamentals Specialization
Aws Fundamentals SpecializationAws Fundamentals Specialization
Aws Fundamentals Specialization
Mustafa TOPÇU
 
IBM Cybersecurity Analyst
IBM Cybersecurity AnalystIBM Cybersecurity Analyst
IBM Cybersecurity Analyst
Mustafa TOPÇU
 
Information Security - BilgeIs
Information Security - BilgeIsInformation Security - BilgeIs
Information Security - BilgeIs
Mustafa TOPÇU
 
ICSI CyberSecurity Essentials
ICSI CyberSecurity EssentialsICSI CyberSecurity Essentials
ICSI CyberSecurity Essentials
Mustafa TOPÇU
 
Fortinet Network Security Expert Certificate (NSE 2)
Fortinet Network Security Expert Certificate (NSE 2)Fortinet Network Security Expert Certificate (NSE 2)
Fortinet Network Security Expert Certificate (NSE 2)
Mustafa TOPÇU
 
Fortinet Network Security Expert Certificate (NSE 1)
Fortinet Network Security Expert Certificate (NSE 1)Fortinet Network Security Expert Certificate (NSE 1)
Fortinet Network Security Expert Certificate (NSE 1)
Mustafa TOPÇU
 

More from Mustafa TOPÇU (6)

Aws Fundamentals Specialization
Aws Fundamentals SpecializationAws Fundamentals Specialization
Aws Fundamentals Specialization
 
IBM Cybersecurity Analyst
IBM Cybersecurity AnalystIBM Cybersecurity Analyst
IBM Cybersecurity Analyst
 
Information Security - BilgeIs
Information Security - BilgeIsInformation Security - BilgeIs
Information Security - BilgeIs
 
ICSI CyberSecurity Essentials
ICSI CyberSecurity EssentialsICSI CyberSecurity Essentials
ICSI CyberSecurity Essentials
 
Fortinet Network Security Expert Certificate (NSE 2)
Fortinet Network Security Expert Certificate (NSE 2)Fortinet Network Security Expert Certificate (NSE 2)
Fortinet Network Security Expert Certificate (NSE 2)
 
Fortinet Network Security Expert Certificate (NSE 1)
Fortinet Network Security Expert Certificate (NSE 1)Fortinet Network Security Expert Certificate (NSE 1)
Fortinet Network Security Expert Certificate (NSE 1)
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Google IT Support

  • 1. 5 Courses Technical Support Fundamentals The Bits and Bytes of Computer Networking Operating Systems and You: Becoming a Power User System Administration and IT Infrastructure Services IT Security: Defense against the digital dark arts Google 20.Ara.2020 MUSTAFA TOPÇU has successfully completed the online, non-credit Professional Certificate Google IT Support Whether you’ve been tinkering with IT or are completely new to the field, you’ve come to the right place. This five-course certificate, developed by Googlers, includes industry-relevant curriculum designed to prepare you for an entry-level role in IT support. Think in- person or remote help desk work, either in small shops or at a global company, like Google! The online specialization named in this certificate may draw on material from courses taught on-campus, but the included courses are not equivalent to on-campus courses. Participation in this online specialization does not constitute enrollment at this university. This certificate does not confer a University grade, course credit or degree, and it does not verify the identity of the learner. Verify this certificate at: coursera.org/verify/professional-cert/PYWSJJLDRBM2