This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.
Overview
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.
Syllabus
- Welcome to Security Best Practices in Google Cloud 0mins
- Welcome to Security Best Practices in Google Cloud 0mins
- Securing Compute Engine: Techniques and Best Practices 36mins
- Securing Compute Engine: Techniques and Best Practices 32mins
- Securing Cloud Data: Techniques and Best Practices 34mins
- Securing Cloud Data: Techniques and Best Practices 36mins
- Application Security: Techniques and Best Practices 27mins
- Application Security: Techniques and Best Practices 27mins
- Securing Google Kubernetes Engine: Techniques and Best Practices 22mins
- Securing Google Kubernetes Engine: Techniques and Best Practices 23mins
- Course Resources 0mins
- Course Resources 0mins
Taught by
Google Cloud