Teilnehmen Anmelden

Feyzullah Ertan

Mitglied seit 2022

Silver League

1000 Punkte
Managing Security in Google Cloud Earned Feb 15, 2023 EST
Security Best Practices in Google Cloud Earned Feb 15, 2023 EST
Mitigating Security Vulnerabilities on Google Cloud Earned Feb 14, 2023 EST
Grundlegende Sicherheitsfunktionen in Google Cloud implementieren Earned Feb 14, 2023 EST

This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Identity, Resource Manager, IAM, Virtual Private Cloud firewalls, Cloud Load Balancing, Cloud Peering, Cloud Interconnect, and VPC Service Controls. This is the first course of the Security in Google Cloud series. After completing this course, enroll in the Security Best Practices in Google Cloud course.

Weitere Informationen

This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.

Weitere Informationen

In this self-paced training course, participants learn mitigations for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. They also learn about the Security Command Center, cloud logging and audit logging, and using Forseti to view overall compliance with your organization's security policies.

Weitere Informationen

Mit dem Skill-Logo zum Kurs Grundlegende Sicherheitsfunktionen in Google Cloud implementieren weisen Sie fortgeschrittene Kenntnisse in folgenden Bereichen nach: Erstellen und Zuweisen von Rollen mit Identity and Access Management (IAM); Erstellen und Verwalten von Dienstkonten; Herstellen einer privaten Verbindung zwischen Virtual Private Cloud-Netzwerken (VPC); Beschränken des Anwendungszugriffs mithilfe von Identity-Aware Proxy; Verwalten von Schlüsseln und verschlüsselten Daten mit Cloud Key Management Service (KMS); und Erstellen eines privaten Kubernetes-Clusters.

Weitere Informationen