Mitigating Security Vulnerabilities on Google Cloud
In this self-paced training course, participants learn mitigations for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. They also learn about the Security Command Center, cloud logging and audit logging, and using Forseti to view overall compliance with your organization's security policies.
What you'll learn
In this self-paced training course, participants learn mitigations for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. They also learn about the Security Command Center, cloud logging and audit logging, and using Forseti to view overall compliance with your organization's security policies.
Table of contents
- Module Overview 1m
- DDoS Attack Overview 1m
- DDoS Mitigation and Prevention on Google Cloud 5m
- Using Google Cloud Armor 1m
- Getting Started With GCP And Qwiklabs 4m
- Lab Intro: Configuring GCLB, CDN, traffic blocklisting with Cloud Armor 0m
- Lab: Configuring GCLB, CDN, traffic blocklisting with Cloud Armor 0m
- Security Partner Products 1m
- Infrastructure, Data Protection, Logging and Compliance Partners 1m
- Module Overview 1m
- Security Command Center overview 4m
- Demo: Using Security Command Center 6m
- Cloud monitoring and logging overview 2m
- Google Operations components 3m
- Cloud logs 2m
- Lab Intro: Installing Cloud Logging and Monitoring Agents 0m
- Lab: Installing Cloud Logging and Monitoring Agents 0m
- Lab Intro: Configuring and Using Cloud Logging and Monitoring 0m
- Lab: Configuring and Using Cloud Logging and Monitoring 0m
- Cloud Audit Logging 4m
- Lab Intro: Configuring and Viewing Cloud Audit Logs 0m
- Lab: Configuring and Viewing Cloud Audit Logs 0m
- Deploying and Using Forseti 4m
- Lab Intro: Inventorying and Scanning a Deployment with Forseti Inventory 0m
- Lab Demo: Inventorying and Scanning a Deployment with Forseti Inventory 7m
Course FAQ
In this course, you will learn you will learn how to mitigate attacks on your Google Cloud-based infrastructure. Some of the attacks include: phishing attacks, content classification threats, Distributed Denial of Service attacks. You will also learn about Security Command Center, cloud and audit logging, and Forseti.
Security Command Center is the canonical security and data risk database for Google Cloud.
Forseti Security helps you secure your Google Cloud Platform. Forseti takes a snapshot of resources on a recurring cadence, so you will always have a history of what has been in your cloud.
Cloud logging allways you to store, search, analyze, monitor, and alert on logging data events from Google. Audit logging is a security-relevant chronological record, set of records, or destination and source of records that provide evidence of past events.
There are no prerequisites for this cyber security course.