- Course
G Suite Security
In this course you will focus on the various aspects of G Suite Security including user password policies and how to enable and enforce two step verification (2SV) for your users. You will learn about application security and understand how to whitelist and block API access to your account. You will see how G Suite can easily be integrated with a number of predefined 3rd party applications. You will also become familiar with the SSO options in G Suite. Finally you will understand how to spot potential security risks within your organization and learn how to address them using the tools available in the admin console.
- Course
G Suite Security
In this course you will focus on the various aspects of G Suite Security including user password policies and how to enable and enforce two step verification (2SV) for your users. You will learn about application security and understand how to whitelist and block API access to your account. You will see how G Suite can easily be integrated with a number of predefined 3rd party applications. You will also become familiar with the SSO options in G Suite. Finally you will understand how to spot potential security risks within your organization and learn how to address them using the tools available in the admin console.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Cloud
What you'll learn
In this course you will focus on the various aspects of G Suite Security including user password policies and how to enable and enforce two step verification (2SV) for your users. You will learn about application security and understand how to whitelist and block API access to your account. You will see how G Suite can easily be integrated with a number of predefined 3rd party applications. You will also become familiar with the SSO options in G Suite. Finally you will understand how to spot potential security risks within your organization and learn how to address them using the tools available in the admin console.