Security in Google Cloud Platform

Catalog Home Cloud, AWS, VMware & Citrix Google Cloud
3.228.10.64
Your Training Location:  

Security in Google Cloud Platform

Instructor Led
Loading Course Dates...
Failed
No available dates in this city.

  Available by Request
{{date.date_begin | date:'M/d'}} - {{date.date_end | date:'M/d/yyyy'}}
   Free{{date.date_price}}
 
ViewHide Additional Dates

This course gives participants a broad study of security controls and techniques on Google Cloud Platform.
Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution. Participants also learn mitigation techniques for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use.

Before taking this course, students should possess Knowledge of foundational concepts in information security:

  • Fundamental concepts including vulnerability, threat, attack surface, confidentiality, integrity, availability
  • Common threat types and their mitigation strategies
  • Public-key cryptography
  • Public and private key pairs
  • Certificate authorities
  • Transport Layer Security/Secure Sockets Layer encrypted communication
  • Public key infrastructures
  • Security policy
  • Basic proficiency with command-line tools and Linux operating system environments
  • Systems Operations experience, including deploying and managing applications, either on-premises or in a public cloud environment
  • Reading comprehension of code in Python or JavaScript

2 Days/Lecture & Lab

This course is designed for: cloud information security analysts, architects, and engineers, information security/cybersecurity specialists, cloud infrastructure architects, and developers of cloud applications.

  • Understanding the Google approach to security
  • Managing administrative identities using Cloud Identity.
  • Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM.
  • Implementing IP traffic controls using VPC firewalls and Cloud Armor
  • Implementing Identity Aware Proxy
  • Analyzing changes to the configuration or metadata of resources with GCP audit logs
  • Scanning for and redact sensitive data with the Data Loss Prevention API
  • Scanning a GCP deployment with Forseti
  • Remediating important types of vulnerabilities, especially in public access to data and VMs




< >

Copyright © 2020 ProTech. All Rights Reserved.

Sign In Create Account

Navigation

Social Media