Course
Skills
Security Best Practices in Google Cloud
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud.
What you'll learn
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.
Table of contents
Welcome to Security Best Practices in Google Cloud
0mins
Welcome to Security Best Practices in Google Cloud
0mins
Securing Compute Engine: Techniques and Best Practices
36mins
- Service accounts, IAM roles, and API scopes 4m
- Lab Intro: Configuring, Using, and Auditing VM Service Accounts and Scopes 0m
- Pluralsight: Getting Started with GCP and Qwiklabs 4m
- Connecting to virtual machines 4m
- Connecting to VMs without external IPs 2m
- OS Login 3m
- Organization policy controls 2m
- Shielded VMs 3m
- Confidential VMs 2m
- Certificate Authority Service 2m
- What Certificate Authority Service provides 2m
- Compute Engine best practices 3m
- Module review 3m
Securing Compute Engine: Techniques and Best Practices
32mins
- Module overview 1m
- Service accounts, IAM roles, and API scopes 4m
- Lab Intro: Configuring, Using, and Auditing VM Service Accounts and Scopes 0m
- Lab: Configuring, Using, and Auditing VM Service Accounts and Scopes 0m
- Connecting to virtual machines 4m
- Connecting to VMs without external IPs 2m
- OS Login 3m
- Organization policy controls 2m
- Shielded VMs 3m
- Confidential VMs 2m
- Certificate Authority Service 2m
- What Certificate Authority Service provides 2m
- Compute Engine best practices 3m
- Module review 3m
Securing Cloud Data: Techniques and Best Practices
34mins
- Module overview 2m
- Cloud Storage IAM permissions and ACLs 2m
- Auditing cloud data 2m
- Signed URLs and policy documents 4m
- Encrypting with CMEK and CSEK 8m
- Lab Intro: Using Customer-Supplied Encryption Keys with Cloud Storage 0m
- Lab Intro: Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS 1m
- Cloud HSM 3m
- Demo: Using and Verifying Keys in Cloud HSM 5m
- BigQuery IAM roles and authorized views 2m
- Lab Intro: Creating a BigQuery Authorized View 0m
- Storage best practices 3m
- Module review 2m
Securing Cloud Data: Techniques and Best Practices
36mins
- Module overview 2m
- Cloud Storage IAM permissions and ACLs 3m
- Auditing cloud data 2m
- Signed URLs and policy documents 4m
- Encrypting with CMEK and CSEK 9m
- Lab Intro: Using Customer-Supplied Encryption Keys with Cloud Storage 0m
- Lab: Using Customer-Supplied Encryption Keys with Cloud Storage 0m
- Lab Intro: Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS 1m
- Lab: Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS 0m
- Cloud HSM 4m
- Demo: Using and Verifying Keys in Cloud HSM 5m
- BigQuery IAM roles and authorized views 2m
- Lab Intro: Creating a BigQuery Authorized View 0m
- Lab: Creating a BigQuery Authorized View 0m
- Storage best practices 3m
- Module review 2m
Application Security: Techniques and Best Practices
27mins
- Module overview 1m
- Types of application security vulnerabilities 4m
- Web Security Scanner 5m
- Lab Intro: Identify Application Vulnerabilities with Security Command Center 0m
- Threat: Identity and Oauth phishing 3m
- Identity-Aware Proxy (IAP) 5m
- Lab Intro: Securing Compute Engine Applications with BeyondCorp Enterprise 0m
- Secret Manager 7m
- Lab Intro: Configuring and Using Credentials with Secret Manager 0m
- Module review 3m
Application Security: Techniques and Best Practices
27mins
- Module overview 1m
- Types of application security vulnerabilities 4m
- Web Security Scanner 5m
- Lab Intro: Identify Application Vulnerabilities with Security Command Center 0m
- Lab: Identify Application Vulnerabilities with Security Command Center 0m
- Threat: Identity and Oauth phishing 3m
- Identity-Aware Proxy (IAP) 5m
- Lab Intro: Securing Compute Engine Applications with BeyondCorp Enterprise 0m
- Lab: Securing Compute Engine Applications with BeyondCorp Enterprise 0m
- Secret Manager 7m
- Lab Intro: Configuring and Using Credentials with Secret Manager 0m
- Lab: Configuring and Using Credentials with Secret Manager 0m
- Module review 3m
Securing Google Kubernetes Engine: Techniques and Best Practices
22mins
Securing Google Kubernetes Engine: Techniques and Best Practices
23mins
Course Resources
0mins
Course Resources
0mins