Expanded

Security Best Practices in Google Cloud

This self-paced training course gives participants broad study of security controls and techniques on Google Cloud.
Course info
Level
Intermediate
Updated
Oct 19, 2021
Duration
1h 44m
Table of contents
Welcome to Security Best Practices in Google Cloud
Securing Compute Engine: Techniques and Best Practices
Securing Cloud Data: Techniques and Best Practices
Application Security: Techniques and Best Practices
Securing Kubernetes: Techniques and Best Practices
Course Resources
Description
Course info
Level
Intermediate
Updated
Oct 19, 2021
Duration
1h 44m
Your 10-day individual free trial includes:

Expanded library

This course and over 7,000+ additional courses from our full course library.

Hands-on library

Practice and apply knowledge faster in real-world scenarios with projects and interactive courses.
*Available on Premium only
Description

This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments. This is the second course of the Security in Google Cloud series. After completing this course, enroll in the Mitigating Security Vulnerabilities on Google Cloud course.

About the author
About the author

Build, innovate, and scale with Google Cloud Platform.

More from the author
Developing Data Models with LookML
Intermediate
2h 37m
Nov 24, 2021
Migrating to Google Cloud
Intermediate
4h 55m
Nov 3, 2021
More courses by Google Cloud