Mitigating Security Vulnerabilities on Google Cloud Platform
- Offered byCoursera
Mitigating Security Vulnerabilities on Google Cloud Platform at Coursera Overview
Duration | 7 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
Mitigating Security Vulnerabilities on Google Cloud Platform at Coursera Highlights
- Taught by top companies and universities.
- Affordable programs and 7 day free trial.
- Shareable Certificate upon completion.
Mitigating Security Vulnerabilities on Google Cloud Platform at Coursera Course details
- This self-paced training course gives participants broad study of security controls and techniques on Google Cloud Platform.
- Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor. Participants learn mitigations for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use.
- To get the most out of this course, participants should have:
- * Prior completion of Google Cloud Platform Fundamentals: Core Infrastructure or equivalent experience
- * Prior completion of GCP and Hybrid Networking Deep Dive or equivalent experience
- * Knowledge of foundational concepts in information security, such as
- * vulnerability, threat, attack surface
- * confidentiality, integrity, availability
- * common threat types and their mitigation strategies
- * public-key cryptography
- * public and private key pairs
- * certificates
- * cipher types
- * certificate authorities
- * Transport Layer Security/Secure Sockets Layer encrypted communication
- * public key infrastructures
- * security policy
- * Basic proficiency with command-line tools and Linux operating system environments
- * Systems Operations experience, deploying and managing applications, on-premises or in a public cloud environment
- * Reading comprehension of code in Python or Javascript
- >>> By enrolling in this course you agree to the Qwiklabs Terms of Service as set out in the FAQ and located at: https://qwiklabs.com/terms_of_service <<<
Mitigating Security Vulnerabilities on Google Cloud Platform at Coursera Curriculum
Welcome to Mitigating Security Vulnerabilities in Google Cloud
Welcome and Getting Started Guide!
How to Send Feedback
Module Overview
DDoS Attack Overview
DDoS Mitigation and Prevention on GCP
Using Cloud Armor
Getting Started with Google Cloud and Qwiklabs
Lab Intro - Configuring Traffic Blacklisting with Cloud Armor
Security Partner Products
Infrastructure, Data Protection, Logging and Compliance Partners
Module Quiz
Content-Related Vulnerabilities: Techniques and Best Practices
Module Overview
What is Ransomware?
Mitigating the Threat of Ransomware
Misuse of Data and Content
Threat Mitigation Strategies for Content
Lab Intro - Redacting Sensitive Data with Data Loss Prevention API
Module Quiz
Monitoring, Logging, Auditing and Scanning
Module Overview
Security Command Center overview
Lab Demo: Using Security Command Center
Cloud monitoring and logging overview
Google Operations components
Cloud logs
Lab Intro: Installing Cloud Logging Agents
Lab Intro: Configuring and Using Cloud Logging and Monitoring
Cloud Audit Logging
Lab Intro: Configuring and Viewing Cloud Audit Logs
Deploying and Using Forseti
Lab Intro: Inventorying and Scanning a Deployment with Forseti Inventory
Lab Demo - Inventorying and Scanning a Deployment with Forseti
Module Quiz