Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Google

Security Best Practices in Google Cloud

Google via Google Cloud Skills Boost

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.

Syllabus

  • Welcome to Security Best Practices in Google Cloud
    • Welcome and Getting Started Guide!
  • Securing Compute Engine: Techniques and Best Practices
    • Module overview
    • Service accounts, IAM roles, and API scopes
    • Lab Intro: Configuring, Using, and Auditing VM Service Accounts and Scopes
    • Configuring, Using, and Auditing VM Service Accounts and Scopes
    • Connecting to virtual machines
    • Connecting to VMs without external IPs
    • OS Login
    • Organization policy controls
    • Shielded VMs
    • Confidential VMs
    • Certificate Authority Service
    • What Certificate Authority Service provides
    • Compute Engine best practices
    • Module review
    • Quiz: Securing Compute Engine
  • Securing Cloud Data: Techniques and Best Practices
    • Module overview
    • Cloud Storage IAM permissions and ACLs
    • Auditing cloud data
    • Signed URLs and policy documents
    • Encrypting with CMEK and CSEK
    • Lab Intro: Using Customer-Supplied Encryption Keys with Cloud Storage
    • Using Customer-Supplied Encryption Keys with Cloud Storage
    • Lab Intro: Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS
    • Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS
    • Cloud HSM
    • Demo: Using and Verifying Keys in Cloud HSM
    • BigQuery IAM roles and authorized views
    • Lab Intro: Creating a BigQuery Authorized View
    • Creating a BigQuery Authorized View
    • Storage best practices
    • Module review
    • Module Quiz
  • Application Security: Techniques and Best Practices
    • Module overview
    • Types of application security vulnerabilities
    • Web Security Scanner
    • Lab Intro: Identify Application Vulnerabilities with Security Command Center
    • Identify Application Vulnerabilities with Security Command Center
    • Threat: Identity and Oauth phishing
    • Identity-Aware Proxy (IAP)
    • Lab Intro: Securing Compute Engine Applications with BeyondCorp Enterprise
    • Securing Compute Engine Applications with BeyondCorp Enterprise
    • Secret Manager
    • Lab Intro: Configuring and Using Credentials with Secret Manager
    • Configuring and Using Credentials with Secret Manager
    • Module review
    • Quiz: Application Security
  • Securing Google Kubernetes Engine: Techniques and Best Practices
    • Module overview
    • Introduction to Kubernetes/GKE
    • Authentication and authorization
    • Hardening your clusters
    • Securing your workloads
    • Monitoring and logging
    • Module review
    • Module Quiz
  • Course Resources
    • Security Best Practices in Google Cloud - Course Resources
  • Your Next Steps
    • Course Badge

Reviews

Start your review of Security Best Practices in Google Cloud

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.