Join Sign in

Abdulaziz alfaifi

Member since 2025

Silver League

1622 points
Mitigate Threats and Vulnerabilities with Security Command Center Earned نوفمبر 11, 2025 EST
Build a Secure Google Cloud Network Earned نوفمبر 11, 2025 EST
Google Kubernetes Engine Best Practices: Security Earned نوفمبر 10, 2025 EST
Securing your Network with Cloud Armor Earned نوفمبر 10, 2025 EST
Implement Cloud Security Fundamentals on Google Cloud Earned نوفمبر 9, 2025 EST

Complete the intermediate Mitigate Threats and Vulnerabilities with Security Command Center skill badge course to demonstrate skills in the following: preventing and managing environment threats, identifying and mitigating application vulnerabilities, and responding to security anomalies.

Learn more

Earn a skill badge by completing the Build a Secure Google Cloud Network skill badge course, where you will learn about multiple networking-related resources to build, scale, and secure your applications on Google Cloud.

Learn more

Get Anthos Ready. This Google Kubernetes Engine-centric quest of best practice hands-on labs focuses on security at scale when deploying and managing production GKE environments -- specifically role-based access control, hardening, VPC networking, and binary authorization.

Learn more

Learn to secure your deployments on Google Cloud, including: how to use Cloud Armor bot management to mitigate bot risk and control access from automated clients; use Cloud Armor denylists to restrict or allow access to your HTTP(S) load balancer at the edge of the Google Cloud; apply Cloud Armor security policies to restrict access to cache objects on Cloud CDN and Google Cloud Storage; and mitigate common vulnerabilities using Cloud Armor WAF rules.

Learn more

Complete the intermediate Implement Cloud Security Fundamentals on Google Cloud skill badge course to demonstrate skills in the following: creating and assigning roles with Identity and Access Management (IAM); creating and managing service accounts; enabling private connectivity across virtual private cloud (VPC) networks; restricting application access using Identity-Aware Proxy; managing keys and encrypted data using Cloud Key Management Service (KMS); and creating a private Kubernetes cluster.

Learn more