Course 4: Tools of the Trade: Linux and SQL

Course 4 of the Coursera Google Cybersecurity Professional Certification program takes us into ‘the wonderful world of operating systems.’ While I might not describe operating systems quite so enthusiastically (those are their words, not mine), this course did open my eyes to the intricate workings behind our colorful, neatly arranged computer screens. But that’s just the tip of the learnings iceberg as the course goes on to cover Linux and SQL, and everything else in between. 

The modules for Tools of the Trade: Linux and SQL are:

  • Module 1: Introduction to operating systems
  • Module 2: The Linux operating system
  • Module 3: Linux commands in the Bash Shell
  • Module 4: Databases and SQL

Key Concepts Learned and Skills Acquired

As mentioned earlier, there is a lot to know about the processes that go on behind the operating system, and how it relates to the hardware, the applications, and the user. One key learning here is that the two types of user interface—the graphical user interface (GUI) and the command line interface (CLI) are both useful for controlling the functions of the OS, but the CLI is more efficient when for cybersecurity tasks. 

A major portion of the course focuses on Linux, its components and its distributions, particularly those that are widely used in security such as KALI LINUX, Ubuntu, Parrot, Red Hat, and CentOS. Another key lesson was on Linux commands in the Bash shell, which is very valuable for navigating and managing the file system to authenticate users. Learners are given a crash course on common commands for navigating the Linux Filesystem Hierarchy Standard (using ls, cd, pwd), reading file content (using cat, head, tail), filtering (grep, find), and more. I also learned about file permissions and ownerships as well as adding and deleting users. All these are essential for working with data in security.

The last module covered important lessons on relational databases and how Structured Query Language (SQL) is used to retrieve information from these databases. Aside from common queries like SELECT, FROM, ORDER BY, the module delved into the more critical function of SQL which is filtering. Using operators such as WHERE, LIKE, BETWEEN, and various symbols, it’s easy to find data that match certain criteria. There are also enlightening discussions on how Linux and SQL, both widely utilized in security, differ in purpose, syntax, and structure. Bottom line is that Linux commands are used for logs stored in a text file while SQL is best for data stored in tables.

Course Structure and Learning Materials

Video lessons and readings make up a major part of Tools of the Trade: Linux and SQL, with the addition of practice exercises and quizzes. But this course introduces an activity that upped my interest many levels higher: a hands-on Linux lab within the Qwiklabs environment. Learners are given 60 minutes to complete the lab, but like I did, most should be able to finish well before the time limit. This is because the activity comes with clear instructions and prompts that make it easy to achieve the defined objectives.

There was also a Portfolio Activity on using Linux commands for managing user file permissions. This was designed to be an exercise which course completers could use to showcase their familiarity with Linux file permissions. 

While there are so many ways you can filter data with Linux and SQL, there is only so much you can take up in one course and thus, only the most common are taken up here. However, there is no shortage of links to resources shared in the modules for learners to study and practice on their own. 

What I Found Most Interesting/Enjoyable

Course 4 of the Coursera Google Cybersecurity Certification is without doubt, the most enjoyable of the courses so far. This is because of the hands-on lab activities for both Linux and SQL, which really gave me a taste of how security analysts interact with systems and databases in real-world scenarios. It was thrilling to type in commands, see what the output is, and find out if you got the answer right. You can’t proceed to the next task if you aren’t able to answer all questions of the current task correctly. 

Among the practice labs covered in Linux were installing distributions, finding, managing, and filtering files as well as managing user permissions. In the SQL lessons, hands-on exercises were given on performing SQL queries, applying filters such as AND, OR, and NOT to queries, and completing SQL joins. 

What I Found Most Challenging

Google Cybersecurity Certification Course 4 provided me with so much to chew on, both theoretically and in practice, that I honestly did not feel any difficulty at any point. If there were instances where I had to change some of my input to get the right answer, it did not bring any frustration. I was instead excited at finding out if I got it right the second time around. 

As with many basically all courses in this cybersecurity certification program, there is always the expectation that the learner will do further independent study and practice outside of what the modules cover. So perhaps in my case, the challenge is more on being able to elevate my knowledge by learning further on my own. At any rate, the start I’ve gotten from this course has been invaluable, providing a solid foundation in both Linux and SQL.

In Their Words: Insights from a Google Professional

Damar, a security engineer at Google, offers some practical advice to those learning Linux:

The best advice I can give someone that’s trying to learn Linux and Linux commands is, don’t get discouraged by any small hiccups that come up. Just keep with it. Stick with it. Think of it as when you first learned to swim, right, you probably weren’t that great at it. It was frustrating, and you were probably a little scared, but you’re stuck with it and I hope that you’re able to swim now.

He also adds that there is “a plethora of support resources when learning Linux” and learners should simply leverage these resources to further their mastery of Linux.

Google CyberSecurity Certification Course 4: Final Thoughts

If I had to describe Course 4 Tools of the Trade: Linux and SQL in one word, it would be fun. Honestly, diving into Linux and SQL was like opening up a new toolbox and discovering all these amazing gadgets you can actually use. The hands-on labs were a highlight for me—typing commands, troubleshooting, and getting instant feedback felt like solving little puzzles that all made sense in the end.

While there’s definitely more to learn beyond what the course covered, it gave me a solid start and the confidence to keep exploring on my own. Plus, I now know my way around Linux commands and SQL queries—so I’d call that a win! Fingers crossed the next course is just as exciting, perhaps more.