This self-paced training course will give participants all they need for managing security in Google Cloud Platform. Get started to view the recorded lessons!
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor. Participants learn mitigations for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. To get the most out of this course, participants should have: *Prior completion of Google Cloud Platform Fundamentals:Core Infrastructure or equivalent experience * Prior completion of GCP and Hybrid Networking Deep Dive or equivalent experience * Knowledge of foundational concepts in information security, such as: * Vulnerability, threat, attack surface * Confidentiality, integrity, availability * Common threat types and their mitigation strategies * Public-key cryptography * Public and private key pairs * Certificates * Cipher types * Certificate authorities * Transport Layer Security/Secure Sockets Layer encrypted communication * Public key infrastructures * Security policy * Basic proficiency with command-line tools and Linux operating system environments * Systems Operations experience deploying and managing applications, on-premises or in a public cloud environment * Reading comprehension of code in Python or Javascript
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor. Participants learn mitigations for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. To get the most out of this course, participants should have: *Prior completion of Google Cloud Platform Fundamentals:Core Infrastructure or equivalent experience * Prior completion of GCP and Hybrid Networking Deep Dive or equivalent experience * Knowledge of foundational concepts in information security, such as: * Vulnerability, threat, attack surface * Confidentiality, integrity, availability * Common threat types and their mitigation strategies * Public-key cryptography * Public and private key pairs * Certificates * Cipher types * Certificate authorities * Transport Layer Security/Secure Sockets Layer encrypted communication * Public key infrastructures * Security policy * Basic proficiency with command-line tools and Linux operating system environments * Systems Operations experience deploying and managing applications, on-premises or in a public cloud environment * Reading comprehension of code in Python or Javascript