Work Safer With Work Safer, public sector organizations can benefit from a cloud first, zero trust security model that provides always up-to-date protection against cyber-attacks. The endpoint security covers mobile devices, desktop devices, Chromebook laptops, and meeting room hardware giving an elevated user experience for all users. DDoS mitigation and network threat intelligence in Google Cloud This session discusses mitigation techniques provided by Google Cloud to protect workloads from distributed denial-of-services (DDoS) attacks using Google Cloud Armor and its advanced threat intelligence features. Mitigation topics covered in this course include Adaptive Protection, bot management, rate limiting, and managed protection. Assured Controls in Google Workspace Assured Controls helps you meet compliance standards in regulated markets such as the public sector. Learn how you can control provider actions related to your data.
Overview
Syllabus
- Cloud-first, zero trust cybersecurity with Google Cloud
- The increased risk of cybersecurity attacks
- How Google can protect your business
- Google Workspace Security and Resilience Framework
- How Google Workspace sets the foundation for security
- Quiz: Cloud-first, zero trust cybersecurity with Google Cloud
- BeyondCorp and reCAPTCHA
- Introduction to BeyondCorp
- BeyondCorp Architecture
- reCAPTCHA overview
- Introduction to Chrome Enterprise
- Demo: BeyondCorp
- Quiz: BeyondCorp and reCaptcha
- Securing Cloud Applications with Identity Aware Proxy (IAP) using Zero-Trust
- CyberSecurity with Chronicle, Crowdstrike, and Palo Alto Networks
- Chronicle
- Google Cloud and Palo Alto Networks
- CrowdStrike
- Work Safer Use Cases
- Quiz: CyberSecurity with Chronicle, Crowdstrike, and Palo Alto Networks
- Assured Controls in Google Workspace
- Introduction to Assured Controls
- Google's Solution to Compliance
- Assured Controls Products
- Scope of Coverage
- Implementing Assured Controls
- Quiz: Assured Controls in Google Workspace
- DDos Mitigation
- Module Introduction
- Cloud Network Security Overview
- Google Cloud Load Balancing
- Google Cloud Armor Overview
- Quiz: DDos mitigation and network threat intelligence
- Google Cloud Armor Features and Benefits
- Cloud Armor Features and Benefits
- WAF Rules
- Adaptive Protection
- Cloud Armor Per-Client Rate Limiting
- Cloud Armor Bot Management
- Named IP Lists
- Quiz: Cloud Armor Features and Benefits
- Bot Management with Google Cloud Armor and reCAPTCHA
- Cloud Logging, Monitoring, and Telemetry
- Cloud Logging
- Cloud Monitoring
- The Security Command Center
- Quiz: Logging, monitoring, and telemetry
- Course Resources
- Work Safer Slides
- DDos Mitigation and Network Threat Intelligence in Google Cloud Slides
- Your Next Steps
- Course Badge