Security in Google Cloud

Paths

Security in Google Cloud

Author: Google Cloud

About this learning path: Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud... Read more

What you will learn

  • Understand the Google approach to security Manage their administrative identities using Cloud Identity.
  • Implement least privilege administrative access using Google Cloud Resource Manager, Cloud IAM.
  • Implement IP traffic controls using VPC firewalls and Cloud Armor Implement Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs.

Pre-requisites

To get the most out of this course, participants should have: * Prior completion of Google Cloud Platform Fundamentals: Core Infrastructure or equivalent experience (very strongly suggested) * Prior completion of GCP and Hybrid Networking Deep Dive or equivalent experience (strongly suggested) * Knowledge of foundational concepts in information security, such as * vulnerability, threat, attack surface * confidentiality, integrity, availability * common threat types and their mitigation strategies * public-key cryptography * public and private key pairs * certificates * cipher types * certificate authorities * Transport Layer Security/Secure Sockets Layer encrypted communication * public key infrastructures * security policy * Basic proficiency with command-line tools and Linux operating system environments * Systems Operations experience, deploying and managing applications, on-premises or in a public cloud environment * Reading comprehension of code in Python or Javascript

Beginner

This section introduces you to important concepts and terminology for working with Google Cloud Platform (GCP). You learn about, and compare, many of the computing and storage services available in Google Cloud Platform, including Google App Engine, Google Compute Engine, Google Kubernetes Engine, Google Cloud Storage, Google Cloud SQL, and BigQuery. You learn about important resource and policy management tools, such as the Google Cloud Resource Manager hierarchy and Google Cloud Identity and Access Management. Hands-on labs give you foundational skills for working with GCP.

Google Cloud Platform Fundamentals - Core Infrastructure

by Google Cloud

Feb 1, 2020 / 3h 17m

3h 17m

Start Course
Description

This course provides an overview of Google Cloud Platform products and services. Through a combination of presentations, demos, and hands-on labs, participants learn the value of Google Cloud Platform and how to incorporate cloud-based solutions into business strategies.

Table of contents
  1. Introducing Google Cloud Platform
  2. Getting Started with Google Cloud Platform
  3. Virtual Machines in the Cloud
  4. Storage in the Cloud
  5. Containers in the Cloud
  6. Applications in the Cloud
  7. Developing, Deploying and Monitoring in the Cloud
  8. Big Data and Machine Learning in the Cloud
  9. Summary and Review

Intermediate

This section gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor. Participants learn mitigations for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. To get the most out of this course, participants should have: * Prior completion of Google Cloud Platform Fundamentals: Core Infrastructure or equivalent experience * Prior completion of GCP and Hybrid Networking Deep Dive or equivalent experience * Knowledge of foundational concepts in information security, such as * vulnerability, threat, attack surface * confidentiality, integrity, availability * common threat types and their mitigation strategies * public-key cryptography * public and private key pairs * certificates * cipher types * certificate authorities * Transport Layer Security/Secure Sockets Layer encrypted communication * public key infrastructures * security policy * Basic proficiency with command-line tools and Linux operating system environments * Systems Operations experience, deploying and managing applications, on-premises or in a public cloud environment .

Managing Security in Google Cloud Platform

by Google Cloud

Sep 3, 2020 / 2h 2s

2h 2s

Start Course
Description

This self-paced training course gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor. Participants learn mitigations for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. To get the most out of this course, participants should have: *Prior completion of Google Cloud Platform Fundamentals:Core Infrastructure or equivalent experience

  • Prior completion of GCP and Hybrid Networking Deep Dive or equivalent experience
  • Knowledge of foundational concepts in information security, such as:
  • Vulnerability, threat, attack surface
  • Confidentiality, integrity, availability
  • Common threat types and their mitigation strategies
  • Public-key cryptography
  • Public and private key pairs
  • Certificates
  • Cipher types
  • Certificate authorities
  • Transport Layer Security/Secure Sockets Layer encrypted communication
  • Public key infrastructures
  • Security policy
  • Basic proficiency with command-line tools and Linux operating system environments
  • Systems Operations experience deploying and managing applications, on-premises or in a public cloud environment
  • Reading comprehension of code in Python or Javascript

Table of contents
  1. Welcome to Managing Security in Google Cloud Platform
  2. Foundations of GCP Security
  3. Cloud Identity
  4. Identity and Access Management (IAM)
  5. VPCs for Isolation and Security
  6. Course Resources

Advanced

This section teaches participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor. Participants learn mitigations for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. To get the most out of this course, participants should have: * Prior completion of Google Cloud Platform Fundamentals: Core Infrastructure or equivalent experience * Prior completion of GCP and Hybrid Networking Deep Dive or equivalent experience * Knowledge of foundational concepts in information security, such as * vulnerability, threat, attack surface * confidentiality, integrity, availability * common threat types and their mitigation strategies * public-key cryptography * public and private key pairs * certificates * cipher types * certificate authorities * Transport Layer Security/Secure Sockets Layer encrypted communication * public key infrastructures * security policy * Basic proficiency with command-line tools and Linux operating system environments * Systems Operations experience, deploying and managing applications, on-premises or in a public cloud environment *

Mitigating Vulnerabilities on Google Cloud

by Google Cloud

Sep 3, 2020 / 1h 2m

1h 2m

Start Course
Description

This self-paced training course gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor. Participants learn mitigations for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use.

Table of contents
  1. Welcome to Mitigating Security Vulnerabilities in Google Cloud
  2. Protecting against Distributed Denial of Service Attacks (DDoS)
  3. Content-Related Vulnerabilities: Techniques and Best Practices
  4. Monitoring, Logging, Auditing and Scanning
  5. Course Resources