Table of contents
Getting Started
3m 28s
Lock icon
Course Introduction | 2m 47s
Lock icon
About the Training Architect | 41s
Getting Started
10m 27s
Lock icon
Introducing our Demonstration Organization | 2m 13s
Lock icon
Protecting Your Google Cloud Account | 8m 14s
Identity and Access Management (IAM)
2h 19m 52s
Lock icon
GCP Resource Hierarchy | 5m 56s
Lock icon
Identity and Access Management (IAM) | 16m 32s
Lock icon
Navigating IAM | 6m 43s
Lock icon
Adding IAM Roles | 15m 22s
Lock icon
Folders | 11m 31s
Lock icon
Service Accounts | 17m 12s
Lock icon
Custom Roles | 11m 23s
Lock icon
Edit IAM Policy | 7m 13s
Lock icon
IAM Best Practices | 8m 15s
Lock icon
Putting it all Together | 9m 45s
Lock icon
QUIZ: Google Cloud IAM and SecurityQUIZ: Google Cloud IAM and Security | 30m
Securing GCP Network Infrastructure
2h 9m 36s
Lock icon
Virtual Private Cloud (VPC) | 7m 53s
Lock icon
Firewalls Basics | 6m 53s
Lock icon
Viewing Firewall Rules | 9m 20s
Lock icon
Create Targeted Firewall Rule | 6m 54s
Lock icon
Automate Firewall Rules for Webserver | 4m 49s
Lock icon
Limiting Exposure | 4m 6s
Lock icon
Google Cloud VPN | 9m 50s
Lock icon
Bastion Host | 15m 19s
Lock icon
Interactive Serial Console | 5m 38s
Lock icon
Routes | 9m 39s
Lock icon
Private Google Access | 9m 26s
Lock icon
Network IAM Roles | 9m 49s
Lock icon
QUIZ: Google Cloud VPC Security EssentialsQUIZ: Google Cloud VPC Security Essentials | 30m
Securing your Operating System
1h 49m 22s
Lock icon
OS Security Overview | 2m 55s
Lock icon
Limit OS Access by Location | 6m 27s
Lock icon
OS Updates | 9m 51s
Lock icon
Securing Scaling Instance Groups | 12m 54s
Lock icon
SSH Keys and Metadata | 8m 20s
Lock icon
Securing SSH Access to Linux Instances | 13m 33s
Lock icon
Linux Access and IAM Roles | 7m 17s
Lock icon
Windows Instance Access Management | 9m 47s
Lock icon
OS Security Best Practices and Acceptable Use | 8m 18s
Lock icon
QUIZ: Securing the Operating SystemQUIZ: Securing the Operating System | 30m
Securing Your Data
1h 25m 29s
Lock icon
Securing Cloud Storage | 1m 56s
Lock icon
Cloud Storage IAM Roles | 7m 10s
Lock icon
Demonstrating Storage IAM Scopes | 11m 2s
Lock icon
Access Control Lists (ACLs) | 10m 41s
Lock icon
Demonstrating ACLs | 11m 25s
Lock icon
Signed URLs | 7m 50s
Lock icon
Database Security | 5m 25s
Lock icon
QUIZ: Securing Your Data with Google CloudQUIZ: Securing Your Data with Google Cloud | 30m
Monitoring GCP
31m 39s
Lock icon
Logging and Monitoring with Stackdriver | 7m 58s
Lock icon
Viewing Stackdriver Logs | 11m 1s
Lock icon
Exporting Logs | 4m 50s
Lock icon
Monitoring and Alerts | 7m 50s
Google Cloud Platform and Auditing
37m 39s
Lock icon
Compliance on Google Cloud Platform | 7m 39s
Lock icon
QUIZ: Monitoring, Alerting, and Auditing within the Google CloudQUIZ: Monitoring, Alerting, and Auditing within the Google Cloud | 30m
GCP Encryption Options
55m 5s
Lock icon
Encryption on Google Cloud Platform | 9m 40s
Lock icon
Key Management Service | 5m 4s
Lock icon
Encryption Demonstration with KMS | 10m 21s
Lock icon
QUIZ: Google Cloud Encryption OptionsQUIZ: Google Cloud Encryption Options | 30m
Final Steps
1m 35s
Lock icon
Next Steps | 1m 35s
About the author
Matthew Ulasien
I'm a technology professional with over 20 years of experience, with my head firmly lost in the clouds.
More Courses by Matthew U.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon