Mitigating Security Vulnerabilities on Google Cloud Platform
This course gives participants broad study of security controls and techniques on Google Cloud Platform.
What you'll learn
This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor.
Table of contents
- Overview 1m
- Compute Engine Identity and API Access 2m
- VM and API Scopes 2m
- Connecting to Virtual Machines 6m
- Organization Policy Service 2m
- Organization Policy Constraints 2m
- Compute Engine Security 4m
- Configuring, using, and auditing VM service accounts and scopes 0m
- Encryption Overview 3m
- Customer Supplied and Managed Keys 2m
- Encrypting Disks with Customer-Supplied Encryption Keys 0m
- Review 3m
- Overview 2m
- Cloud Storage Permissions and Roles 3m
- Auditing Storage Buckets 2m
- Signed URLS and Signed Policy Documents 4m
- Encryption, CSEK, CMEK Review 2m
- Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS 0m
- Using Customer-Supplied Encryption Keys with Cloud Storage 0m
- BigQuery IAM Roles and Authorized Views 2m
- Creating a BigQuery authorized view 0m
- Cloud Storage Best Practices 2m
- Big Query Storage Best Practices 1m
- Review 2m
- Overview 1m
- Application Vulnerabilities 4m
- How Cloud Security Scanner Works 3m
- Avoiding Unwanted Impact 2m
- Using Cloud Security Scanner to find vulnerabilities in an App Engine application 0m
- Types of Phishing Attacks 3m
- Cloud Identity-Aware Proxy (Cloud IAP) 2m
- Configuring Identity Aware Proxy to Protect a Project 0m
- Review 3m