• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

Security in Google Cloud

Security in Google Cloud

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • Delivered Online

  • 3 days

  • All levels

Description

Duration

3 Days

18 CPD hours

This course is intended for

This class is intended for the following job roles:
[Cloud] information security analysts, architects, and engineers
Information security/cybersecurity specialists
Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles.
The course should also be useful to developers of cloud applications

Overview

This course teaches participants the following skills:
Understanding the Google approach to security Managing administrative identities using Cloud Identity.
Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM.
Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs

This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use.

Foundations of GCP Security

  • Google Cloud's approach to security

  • The shared security responsibility model

  • Threats mitigated by Google and by GCP

  • Access Transparency

Cloud Identity

  • Cloud Identity

  • Syncing with Microsoft Active Directory

  • Choosing between Google authentication and SAML-based SSO

  • GCP best practices

Identity and Access Management

  • GCP Resource Manager: projects, folders, and organizations

  • GCP IAM roles, including custom roles

  • GCP IAM policies, including organization policies

  • GCP IAM best practices

Configuring Google Virtual Private Cloud for Isolation and Security

  • Configuring VPC firewalls (both ingress and egress rules)

  • Load balancing and SSL policies

  • Private Google API access

  • SSL proxy use

  • Best practices for structuring VPC networks

  • Best security practices for VPNs

  • Security considerations for interconnect and peering options

  • Available security products from partners

Monitoring, Logging, Auditing, and Scanning

  • Stackdriver monitoring and logging

  • VPC flow logs

  • Cloud audit logging

  • Deploying and Using Forseti

Securing Compute Engine: techniques and best practices

  • Compute Engine service accounts, default and customer-defined

  • IAM roles for VMs

  • API scopes for VMs

  • Managing SSH keys for Linux VMs

  • Managing RDP logins for Windows VMs

  • Organization policy controls: trusted images, public IP address, disabling serial port

  • Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys

  • Finding and remediating public access to VMs

  • VM best practices

  • Encrypting VM disks with customer-supplied encryption keys

Securing cloud data: techniques and best practices

  • Cloud Storage and IAM permissions

  • Cloud Storage and ACLs

  • Auditing cloud data, including finding and remediating publicly accessible data

  • Signed Cloud Storage URLs

  • Signed policy documents

  • Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys

  • Best practices, including deleting archived versions of objects after key rotation

  • BigQuery authorized views

  • BigQuery IAM roles

  • Best practices, including preferring IAM permissions over ACLs

Protecting against Distributed Denial of Service Attacks: techniques and best practices

  • How DDoS attacks work

  • Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor

  • Types of complementary partner products

Application Security: techniques and best practices

  • Types of application security vulnerabilities

  • DoS protections in App Engine and Cloud Functions

  • Cloud Security Scanner

  • Threat: Identity and Oauth phishing

  • Identity Aware Proxy

Content-related vulnerabilities: techniques and best practices

  • Threat: Ransomware

  • Mitigations: Backups, IAM, Data Loss Prevention API

  • Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content

  • Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API

Additional course details:

Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward.

This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts.

Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success.

While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you.

Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

About The Provider

Nexus Human, established over 20 years ago, stands as a pillar of excellence in the realm of IT and Business Skills Training and education in Ireland and the UK....

Read more about Nexus Human

Tags

Reviews