- Level Professional
- Duration 12 hours
- Course by Google Cloud
-
Offered by
About
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.Modules
Welcome to the course
1
Readings
- Welcome and Getting Started Guide!
Course Feedback
1
Readings
- How to Send Feedback
Module Overview
1
Videos
- Module Overview
Service accounts, IAM roles, and API scopes
1
External Tool
- Lab: Configuring, Using, and Auditing VM Service Accounts and Scopes
3
Videos
- Service accounts, IAM roles, and API scopes
- Lab Intro: Configuring, Using, and Auditing VM Service Accounts and Scopes
- Getting Started with Google Cloud and Qwiklabs
Managing VM logins
3
Videos
- Connecting to virtual machines
- Connecting to VMs without external IPs
- OS Login
Organization policy controls
1
Videos
- Organization policy controls
Shielded VMs and Confidential VMs
2
Videos
- Shielded VMs
- Confidential VMs
Certificate Authority Service
2
Videos
- Certificate Authority Service
- What Certificate Authority Service provides
Compute Engine Best Practices
1
Videos
- Compute Engine best practices
Module Review
1
Assignment
- Securing Compute Engine: Techniques and Best Practices
1
Videos
- Module review
Module Overview
1
Videos
- Module Overview
Cloud Storage IAM permissions and ACLs
1
Videos
- Cloud Storage IAM permissions and ACLs
Auditing cloud data
1
Videos
- Auditing cloud data
Signed URLs and policy documents
1
Videos
- Signed URLs and policy documents
Encrypting with CMEK and CSEK
2
External Tool
- Lab: Using Customer-Supplied Encryption Keys with Cloud Storage
- Lab: Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS
3
Videos
- Encrypting with CMEK and CSEK
- Lab Intro: Using Customer-Supplied Encryption Keys with Cloud Storage
- Lab Intro: Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS
Cloud HSM
2
Videos
- Cloud HSM
- Demo: Using and Verifying Keys in Cloud HSM
BigQuery IAM roles and authorized views
1
External Tool
- Lab: Creating a BigQuery Authorized View
2
Videos
- BigQuery IAM Roles and Authorized Views
- Lab Intro: Creating a BigQuery Authorized View
Storage best practices
1
Videos
- Storage best practices
Module Review
1
Assignment
- Module Quiz
1
Videos
- Module Review
Module Overview
1
Videos
- Module Overview
Types of application security vulnerabilities
1
Videos
- Types of application security vulnerabilities
Web Security Scanner
1
External Tool
- Lab: Identify Application Vulnerabilities with Security Command Center
2
Videos
- Web Security Scanner
- Lab Intro: Identify Application Vulnerabilities with Security Command Center
Threat: Identity and Oauth phishing
1
Videos
- Threat: Identity and Oauth phishing
Identity-Aware Proxy
1
External Tool
- Lab: Securing Compute Engine Applications with BeyondCorp Enterprise
2
Videos
- Identity-Aware Proxy (IAP)
- Lab Intro: Securing Compute Engine Applications with BeyondCorp Enterprise
Secret Manager
1
External Tool
- Lab: Configuring and Using Credentials with Secret Manager
2
Videos
- Secret Manager
- Lab Intro: Configuring and Using Credentials with Secret Manager
Module Review
1
Assignment
- Application Security: Techniques and Best Practices
1
Videos
- Module review
Module Overview
1
Videos
- Module Overview
Introduction to Kubernetes/GKE
1
Videos
- Introduction to Kubernetes/GKE
Authentication and authorization
1
Videos
- Authentication and authorization
Hardening your clusters
1
Videos
- Hardening your Clusters
Securing Your Workloads
1
Videos
- Securing Your Workloads
Monitoring and logging
1
Videos
- Monitoring and logging
Module review
1
Assignment
- Securing Google Kubernetes Engine: Techniques and Best Practices
1
Videos
- Module review
Auto Summary
Unlock the full potential of security within the Google Cloud environment with this comprehensive course designed for IT and computer science professionals. Led by Coursera, "Security Best Practices in Google Cloud" offers an in-depth exploration of essential security controls and techniques critical for safeguarding your cloud infrastructure. This professional-level course spans 720 minutes, providing a blend of recorded lectures, practical demonstrations, and hands-on labs. Throughout the course, participants will learn to deploy and manage key security components, such as Cloud Storage access controls, Security Keys, Customer-Supplied Encryption Keys, and API access controls. Additional topics include the implementation of scoping, shielded VMs, encryption practices, signed URLs, and securing Kubernetes environments. Ideal for professionals seeking to enhance their expertise in Google Cloud security, the course is available through a Starter subscription, making it accessible for those ready to elevate their cloud security skills. Join now to master the art of securing your Google Cloud solutions effectively.

Google Cloud Training