Managing Security in Google Cloud Platform
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor. Participants learn mitigations for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. To get the most out of this course, participants should have: *Prior completion of Google Cloud Platform Fundamentals:Core Infrastructure or equivalent experience * Prior completion of GCP and Hybrid Networking Deep Dive or equivalent experience * Knowledge of foundational concepts in information security, such as: * Vulnerability, threat, attack surface * Confidentiality, integrity, availability * Common threat types and their mitigation strategies * Public-key cryptography * Public and private key pairs * Certificates * Cipher types * Certificate authorities * Transport Layer Security/Secure Sockets Layer encrypted communication * Public key infrastructures * Security policy * Basic proficiency with command-line tools and Linux operating system environments * Systems Operations experience deploying and managing applications, on-premises or in a public cloud environment * Reading comprehension of code in Python or Javascript
What you'll learn
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor. Participants learn mitigations for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. To get the most out of this course, participants should have: *Prior completion of Google Cloud Platform Fundamentals:Core Infrastructure or equivalent experience
- Prior completion of GCP and Hybrid Networking Deep Dive or equivalent experience
- Knowledge of foundational concepts in information security, such as:
- Vulnerability, threat, attack surface
- Confidentiality, integrity, availability
- Common threat types and their mitigation strategies
- Public-key cryptography
- Public and private key pairs
- Certificates
- Cipher types
- Certificate authorities
- Transport Layer Security/Secure Sockets Layer encrypted communication
- Public key infrastructures
- Security policy
- Basic proficiency with command-line tools and Linux operating system environments
- Systems Operations experience deploying and managing applications, on-premises or in a public cloud environment
- Reading comprehension of code in Python or Javascript
Table of contents
- Overview 1m
- Cloud Identity Overview 2m
- The Google Admin Console 2m
- Syncing with Microsoft Active Directory 1m
- Using Managed Service for Microsoft Active Directory 8m
- Choosing between Google authentication and SAML-based SSO 2m
- Managing GCP Permissions and Groups 2m
- Lab Intro:Defining Users with Cloud Identity Console 1m
- Lab Demo:Defining Users with Cloud Identity Console 6m
- Overview 1m
- Resource Manager Overview 1m
- Resource Manager Objects 2m
- GCP Resource Manager Accounts 3m
- Resource Manager Labels 2m
- IAM Roles 4m
- IAM Policies 2m
- IAM Best Practices 3m
- Lab Intro:Configuring IAM and Custom Roles 0m
- Getting Started With GCP And Qwiklabs 4m
- Lab: Configuring Cloud IAM 0m
- IAM Recommender 3m
- IAM Troubleshooter 2m
- IAM Audit Logs 4m
- Overview 1m
- VPC Firewall Rules 5m
- VPC Firewall Defaults 2m
- VPC Firewall Best Practices 3m
- Lab Intro:Configuring VPC Firewalls 0m
- Lab: Configuring VPC Firewalls 0m
- Load Balancing and SSL Policies 3m
- Interconnect and SSL Peering Options 5m
- Cloud Interconnect 2m
- Best Practices for VPC Networks 4m
- VPC Service Controls 10m
- Demo - VPC Service Controls 3m
- VPC Flow Logs 2m
- Lab Intro: Using and Viewing VPC Flow Logs in Cloud Logging 0m
- Lab: Configuring and Using VPC Flow Logs in Cloud Logging 0m