Simple play icon Course
Skills

Security Best Practices in Google Cloud

by Google Cloud

This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.

What you'll learn

This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.

Table of contents

Welcome to Security Best Practices in Google Cloud
0mins

Course FAQ

What will you learn in this Google Cloud course?

In this Google Cloud security course, you will learn about Cloud Storage access control, security keys, customer-supplied encryption keys, API access controls, scoping, shielded VMs, and securing Kubernetes environments.

What are virtual machines?

A virtual machine is a compute resource that uses software instead of a physical computer to run programs and deploy apps. Each virtual machine runs its own operating system and functions separately from othe virtual machines.

What is Kubernetes?

Kubernetes is a portable, extensible, open-source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation.

What are phishing attacks?

Phishing attacks are a type of social engineering where an attacker sends a fradulent message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure.

What is CMEK and CSEK?

Customer-managed encryption keys (CMEK) is a way to control Google's ability to decrypt data at rest by disabling the keys used to protect data.

Customer-supplied encryption keys (CSEK) are a feature in Google Cloud Storage where you can supply your own encryption keys. Google uses these keys to protect the Google-generated keys used to encrypt and decrypt your data.

About the author

Google Cloud can help solve your toughest problems and grow your business. With Google Cloud, their infrastructure is your infrastructure. Their tools are your tools. And their innovations are your innovations.

Ready to upskill? Get started