[go: nahoru, domu]

Loading...
No results found.
    Share on LinkedIn Feed Twitter Facebook

    11

    Security Best Practices in Google Cloud

    11

    Security Best Practices in Google Cloud

    magic_button Cloud Security Cloud Key Management Access Control
    These skills were generated by A.I. Do you agree this course teaches these skills?
    11 hours 15 minutes Introductory universal_currency_alt 31 Credits

    This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.

    When you complete this course, you can earn the badge displayed here! View all the badges you have earned by visiting your profile page. Boost your cloud career by showing the world the skills you have developed!

    Badge for Security Best Practices in Google Cloud
    info
    Course Info
    Objectives
    • Apply techniques and best practices to secure Compute Engine
    • Apply techniques and best practices to secure cloud data
    • Apply techniques and best practices to secure applications
    • Apply techniques and best practices for securing Google Kubernetes Engine (GKE) resources.
    Prerequisites
    Prior completion of Google Cloud Fundamentals: Core Infrastructure or equivalent experience. Prior completion of Networking in Google Cloud or equivalent experience. Knowledge of foundational concepts in information security: Fundamental concepts: vulnerability, threat, attack surface confidentiality, integrity, availability, Common threat types and their mitigation strategies, Public-key cryptography, Public and private key pairs, Certificates Cipher types, Key width Certificate authorities, Transport Layer Security/Secure Sockets, Layer encrypted communication Public key infrastructures Security policy. Basic proficiency with command-line tools and Linux operating system environments. Systems Operations experience, including deploying and managing applications, either on-premises or in a public cloud environment. Reading comprehension of code in Python or JavaScript.
    Audience
    [Cloud] information security analysts, architects, and engineers. Information security/cybersecurity specialists. Cloud infrastructure architects. Also intended for Google and partner field personnel who work with customers in those job roles. Also useful for cloud application developers.
    Available languages
    English, 日本語, français, español (Latinoamérica), and português (Brasil)
    What do I do when I finish this course?
    After finishing this course, you can explore additional content in your learning path or browse the catalog.
    What badges can I earn?
    Upon finishing the required items in a course, you will earn a badge of completion. Badges can be viewed on your profile and shared with your social network.
    Interested in taking this course with one of our authorized on-demand partners?
    Explore Google Cloud content on Coursera and Pluralsight.
    Prefer learning with an instructor?
    View the public classroom schedule here.
    Can I take this course for free?
    When you enroll into most courses, you will be able to consume course materials like videos and documents for free. If a course consists of labs, you will need to purchase an individual subscription or credits to be able consume the labs. Labs can also be unlocked by any campaigns you participate in. All required activities in a course must be completed to be awarded the completion badge.
    Preview