English | Size: 690.12 MB
Best Practices for Securing Google Cloud Resources and Data
What you’ll learn
Use Identity and Access Management (IAM) to control access to resources Google Cloud
Use organization policies to control what can be done with resources in Google Cloud
Implement best practices to improve application and operations security
Apply security best practices for Compute Engine, Google Kubernetes Engine (GKE), and other Google Cloud services.
Use Data Loss Prevention service to protect sensitive and private data
Choose among Google Cloud security controls for a variety of security requirements
Whether you are a software developer, database administrator, DevOps engineer, data engineer, network engineer or architect, security is part of your job. This course gives you an overview of key security controls and services in Google Cloud and when to use them to protect resources and data. This course includes best practices for:
Managing identities including service accounts and federated identities
Controlling access to resource using IAM roles
Using organization policies to ensure consistent compliance with security policies
Protecting web applications against security risks
Using Apigee to protect APIs
Building secure containers
Securely managing secrets, such as passwords, API keys, and credentials
Protecting data in Cloud Storage as well as databases
Preventing data exfiltration using. Google Cloud’s Data Loss Prevention (DLP) service
Securing Compute Engine instances and Google Kubernetes Engine clusters
Using network security controls including Cloud NAT, Cloud Armor, Identity-Aware Proxy, and VPC Service Controls
This course is designed for those who are new to Google Cloud or want additional exposure to recommended ways to protect data and resources in Google Cloud. The course present an overview of principles, patterns, and practices that will help you improve the security of your Google Cloud environments.
This course does not delve into implementation details, such as the syntax of gcloud commands to implement a security measure on a virtual machine. Implementation details are covered in other courses, particularly the Google Cloud Associate Engineer: Get Certified course.
Let’s dive into learning about a variety of important best practices for protecting your Google Cloud environment.
Who this course is for:
If any links die or problem unrar, send request to