- Course
Security Best Practices in Google Cloud
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.
- Course
Security Best Practices in Google Cloud
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Cloud
What you'll learn
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.
Security Best Practices in Google Cloud
-
Module Overview | 1m 4s
-
Compute Engine Identity and API Access | 1m 51s
-
VM and API Scopes | 1m 48s
-
Connecting to Virtual Machines | 5m 54s
-
Organization Policy Service | 1m 37s
-
Organization Policy Constraints | 1m 52s
-
Compute Engine Security | 3m 42s
-
Using shielded VMs to maintain the integrity of virtual machines | 4m 53s
-
Lab Intro: Configuring, Using, and Auditing VM Service Accounts and Scopes | 23s
-
Pluralsight: Getting Started with GCP and Qwiklabs | 3m 48s
-
Lab: Configuring, Using, and Auditing VM Service Accounts and Scopes | 10s
-
Encryption Overview | 3m 25s
-
Customer Supplied and Managed Keys | 1m 49s
-
Lab Intro: Encrypting Disks with Customer-Supplied Encryption Keys | 24s
-
Lab: Encrypting Disks with Customer-Supplied Encryption Keys | 10s