Security Best Practices in Google Cloud

This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.
Course info
Level
Intermediate
Updated
Apr 14, 2021
Duration
1h 48m
Table of contents
Welcome to Security Best Practices in Google Cloud
Securing Compute Engine: Techniques and Best Practices
Securing Cloud Data: Techniques and Best Practices
Application Security: Techniques and Best Practices
Securing Kubernetes: Techniques and Best Practices
Course Resources
Description
Course info
Level
Intermediate
Updated
Apr 14, 2021
Duration
1h 48m
Description

This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.

Course FAQ
Course FAQ
What will you learn in this Google Cloud course?

In this Google Cloud security course, you will learn about Cloud Storage access control, security keys, customer-supplied encryption keys, API access controls, scoping, shielded VMs, and securing Kubernetes environments.

What are virtual machines?

A virtual machine is a compute resource that uses software instead of a physical computer to run programs and deploy apps. Each virtual machine runs its own operating system and functions separately from othe virtual machines.

What is Kubernetes?

Kubernetes is a portable, extensible, open-source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation.

What are phishing attacks?

Phishing attacks are a type of social engineering where an attacker sends a fradulent message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure.

What is CMEK and CSEK?

Customer-managed encryption keys (CMEK) is a way to control Google's ability to decrypt data at rest by disabling the keys used to protect data.

Customer-supplied encryption keys (CSEK) are a feature in Google Cloud Storage where you can supply your own encryption keys. Google uses these keys to protect the Google-generated keys used to encrypt and decrypt your data.

About the author
About the author

Build, innovate, and scale with Google Cloud Platform.

More from the author
More courses by Google Cloud