This self-paced training course gives participants broad study of security controls and techniques on Google Cloud.
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments. This is the second course of the Security in Google Cloud series. After completing this course, enroll in the Mitigating Security Vulnerabilities on Google Cloud course.
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments. This is the second course of the Security in Google Cloud series. After completing this course, enroll in the Mitigating Security Vulnerabilities on Google Cloud course.