- Home
- Courses
- Курсове с Инструктор
- Google Cloud Platform - GCP
- Google Cloud Certified - Speciality
- Security in Google Cloud Platform
Security in Google Cloud Platform
- 0 (Registered)
-
(0 Reviews)
Curriculum
- 10 Sections
- 56 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- Module 1: Foundations of GCP Security4
- Module 2: Cloud Identity4
- Module 3: Identity and Access Management4
- Module 4: Configuring Google Virtual Private Cloud for Isolation and Security8
- 5.1Configuring VPC firewalls (both ingress and egress rules)
- 5.2Load balancing and SSL policies
- 5.3Private Google API access
- 5.4SSL proxy use
- 5.5Best practices for structuring VPC networks
- 5.6Best security practices for VPNs
- 5.7Security considerations for interconnect and peering options
- 5.8Available security products from partners
- Module 5: Monitoring, Logging, Auditing, and Scanning4
- Module 6: Securing Compute Engine: techniques and best practices10
- 7.1Compute Engine service accounts, default and customer-defined
- 7.2IAM roles for VMs
- 7.3API scopes for VMs
- 7.4Managing SSH keys for Linux VMs
- 7.5Managing RDP logins for Windows VMs
- 7.6Organization policy controls: trusted images, public IP address, disabling serial port
- 7.7Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys
- 7.8Finding and remediating public access to VMs
- 7.9VM best practices
- 7.10Encrypting VM disks with customer-supplied encryption keys
- Module 7: Securing cloud data: techniques and best practices10
- 8.1Cloud Storage and IAM permissions
- 8.2Cloud Storage and ACLs
- 8.3Auditing cloud data, including finding and remediating publicly accessible data
- 8.4Signed Cloud Storage URLs
- 8.5Signed policy documents
- 8.6Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys
- 8.7Best practices, including deleting archived versions of objects after key rotation
- 8.8BigQuery authorized views
- 8.9BigQuery IAM roles
- 8.10Best practices, including preferring IAM permissions over ACLs
- Module 8: Protecting against Distributed Denial of Service Attacks: techniques and best practices3
- Module 9: Application Security: techniques and best practices5
- Module 10: Content-related vulnerabilities: techniques and best practices4
The shared security responsibility model
Next