Feyzullah Ertan
Mitglied seit 2022
Silver League
1000 Punkte
Mitglied seit 2022
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Identity, Resource Manager, IAM, Virtual Private Cloud firewalls, Cloud Load Balancing, Cloud Peering, Cloud Interconnect, and VPC Service Controls. This is the first course of the Security in Google Cloud series. After completing this course, enroll in the Security Best Practices in Google Cloud course.
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.
In this self-paced training course, participants learn mitigations for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. They also learn about the Security Command Center, cloud logging and audit logging, and using Forseti to view overall compliance with your organization's security policies.
Mit dem Skill-Logo zum Kurs Grundlegende Sicherheitsfunktionen in Google Cloud implementieren weisen Sie fortgeschrittene Kenntnisse in folgenden Bereichen nach: Erstellen und Zuweisen von Rollen mit Identity and Access Management (IAM); Erstellen und Verwalten von Dienstkonten; Herstellen einer privaten Verbindung zwischen Virtual Private Cloud-Netzwerken (VPC); Beschränken des Anwendungszugriffs mithilfe von Identity-Aware Proxy; Verwalten von Schlüsseln und verschlüsselten Daten mit Cloud Key Management Service (KMS); und Erstellen eines privaten Kubernetes-Clusters.