Mitigating Security Vulnerabilities on Google Cloud Platform
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor. Participants learn mitigations for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use.
What you'll learn
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor. Participants learn mitigations for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use.
Table of contents
- Overview 1m
- DDoS Attack Overview 1m
- DDoS Mitigation and Prevention on GCP 5m
- Using Cloud Armor 1m
- Getting Started with Google Cloud and Qwiklabs 4m
- Lab Intro:Configuring Traffic Blacklisting with Cloud Armor 0m
- Lab: Configuring GCLB, CDN, traffic blacklisting with Cloud Armor 0m
- Security Partner Products 1m
- Infrastructure, Data Protection, Logging and Compliance Partners 1m
- Overview 1m
- Security Command Center Overview 4m
- Stackdriver monitoring and logging overview 2m
- Stackdriver components 3m
- Stackdriver logs 2m
- Lab Intro:Installing Stackdriver Agents 0m
- Lab: Installing Stackdriver Agents 0m
- Lab Intro:Configuring and Using Stackdriver Monitoring and Logging 0m
- Lab: Configuring and using Stackdriver logging and monitoring 0m
- Cloud Audit Logging 4m
- Lab Intro:Configuring and Viewing Audit Logs in Stackdriver 0m
- Lab: Configuring and Viewing Audit Logs in Stackdriver 0m
- Deploying and Using Forseti 4m
- Lab Demo:Inventorying and Scanning a Deployment with Forseti Inventory 7m