Security Best Practices in Google Cloud
- Offered byCoursera
Security Best Practices in Google Cloud at Coursera Overview
Duration | 13 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
Security Best Practices in Google Cloud at Coursera Highlights
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Intermediate Level
- Approx. 13 hours to complete
- English Subtitles: English
Security Best Practices in Google Cloud at Coursera Course details
- This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.
- This course is part of multiple programs
- This course can be applied to multiple Specializations or Professional Certificates programs. Completing this course will count towards your learning in any of the following programs:
- Security in Google Cloud Platform Specialization
- Google Cloud Security Professional Certificate
Security Best Practices in Google Cloud at Coursera Curriculum
Welcome to Security Best Practices in Google Cloud
Welcome and Getting Started Guide!
How to Send Feedback
Securing Compute Engine: Techniques and Best Practices
Module Overview
Compute Engine Identity and API Access
VM and API Scopes
Connecting to Virtual Machines
Organization Policy Service
Organization Policy Constraints
Compute Engine Security
Using shielded VMs to maintain the integrity of virtual machines
Lab Intro: Configuring, using, and auditing VM service accounts and scopes
Encryption Overview
Customer Supplied and Managed Keys
Lab Intro: Encrypting Disks with Customer-Supplied Encryption Keys
Securing Compute Engine: Techniques and Best Practices
Securing Cloud Data: Techniques and Best Practices
Module Overview
Cloud Storage Permissions and Roles
Auditing Storage Buckets
Signed URLS and Signed Policy Documents
Encrypting Cloud Storage objects with CMEK and CSEK
Lab Intro: Using Customer-Supplied Encryption Keys with Cloud Storage
Lab Intro: Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS
What is an HSM?
Features of Google Cloud HSM
Demo: Using and Verifying Keys in Cloud HSM
BigQuery IAM Roles and Authorized Views
Lab Intro: Creating a BigQuery Authorized View
Cloud Storage Best Practices
Big Query Storage Best Practices
Securing Cloud Data: Techniques and Best Practices
Application Security: Techniques and Best Practices
Module Overview
Application Vulnerabilities
How Cloud Security Scanner Works
Avoiding Unwanted Impact
Lab Intro Using Cloud Security Scanner to Find Vulnerabilities in an App Engine Application
Types of Phishing Attacks
Identity-Aware Proxy (IAP)
Lab Intro Configuring Identity-Aware Proxy
Secret Manager
Lab Intro Configuring and Using Credentials with Secret Manager
Application Security: Techniques and Best Practices
Securing Kubernetes: Techniques and Best Practices
Module Overview
Introduction to Kubernetes/GKE
Authentication and Authorization
Hardening Your Clusters
Securing Your Workloads
Logging and Monitoring
Securing Kubernetes: Techniques and Best Practices