Dołącz Zaloguj się

Abdulaziz alfaifi

Jest członkiem od 2025

Liga srebrna

1622 pkt.
Mitigate Threats and Vulnerabilities with Security Command Center Earned lis 11, 2025 EST
Budowanie bezpiecznej sieci Google Cloud Earned lis 11, 2025 EST
Google Kubernetes Engine Best Practices: Security Earned lis 10, 2025 EST
Securing your Network with Cloud Armor Earned lis 10, 2025 EST
Implement Cloud Security Fundamentals on Google Cloud Earned lis 9, 2025 EST

Complete the intermediate Mitigate Threats and Vulnerabilities with Security Command Center skill badge course to demonstrate skills in the following: preventing and managing environment threats, identifying and mitigating application vulnerabilities, and responding to security anomalies.

Więcej informacji

Aby zdobyć odznakę umiejętności, ukończ szkolenie Budowanie bezpiecznej sieci Google Cloud, w trakcie którego poznasz różne związane z siecią zasoby do budowania, skalowania i zabezpieczania aplikacji w Google Cloud.

Więcej informacji

Get Anthos Ready. This Google Kubernetes Engine-centric quest of best practice hands-on labs focuses on security at scale when deploying and managing production GKE environments -- specifically role-based access control, hardening, VPC networking, and binary authorization.

Więcej informacji

Learn to secure your deployments on Google Cloud, including: how to use Cloud Armor bot management to mitigate bot risk and control access from automated clients; use Cloud Armor denylists to restrict or allow access to your HTTP(S) load balancer at the edge of the Google Cloud; apply Cloud Armor security policies to restrict access to cache objects on Cloud CDN and Google Cloud Storage; and mitigate common vulnerabilities using Cloud Armor WAF rules.

Więcej informacji

Complete the intermediate Implement Cloud Security Fundamentals on Google Cloud skill badge course to demonstrate skills in the following: creating and assigning roles with Identity and Access Management (IAM); creating and managing service accounts; enabling private connectivity across virtual private cloud (VPC) networks; restricting application access using Identity-Aware Proxy; managing keys and encrypted data using Cloud Key Management Service (KMS); and creating a private Kubernetes cluster.

Więcej informacji