Mitigating Security Vulnerabilities on Google Cloud
In this self-paced training course, participants learn mitigations for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use.
What you'll learn
In this self-paced training course, participants learn mitigations for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. They also learn about the Security Command Center, cloud logging and audit logging, and using Forseti to view overall compliance with your organization's security policies.
Table of contents
- Module overview 1m
- How DDoS attacks work 2m
- DDoS mitigation and prevention on Google Cloud 5m
- Using Google Cloud Armor 3m
- Types of complementary partner products 2m
- Lab Intro: Configuring Traffic Blocklisting with Google Cloud Armor 0m
- Lab: Configuring Traffic Blocklisting with Google Cloud Armor 0m
- Module review 2m
- Module overview 1m
- Security Command Center 3m
- Tiers and pricing 3m
- Demo: Using Security Command Center 6m
- Cloud Monitoring and Cloud Logging 6m
- Lab Intro: Configuring and Using Cloud Logging and Cloud Monitoring 0m
- Lab: Configuring and Using Cloud Logging and Cloud Monitoring 0m
- Cloud Audit Logs 4m
- Lab Intro: Configuring and Viewing Cloud Audit Logs 0m
- Lab: Configuring and Viewing Cloud Audit Logs 0m
- Cloud security automation 2m
- Module review 1m