Security Best Practices in Google Cloud

  • 4.6
Approx. 13 hours to complete

Course Summary

Learn about security best practices in Google Cloud with this course from Coursera. Gain knowledge on how to secure your data in the cloud and protect against cyber attacks.

Key Learning Points

  • Understand the importance of security in the cloud computing environment
  • Learn how to secure your data with encryption and access control
  • Protect against cyber attacks with best practices and tools

Job Positions & Salaries of people who have taken this course might have

    • USA: $118,000
    • India: ₹2,400,000
    • Spain: €52,000
    • USA: $118,000
    • India: ₹2,400,000
    • Spain: €52,000

    • USA: $124,000
    • India: ₹1,800,000
    • Spain: €60,000
    • USA: $118,000
    • India: ₹2,400,000
    • Spain: €52,000

    • USA: $124,000
    • India: ₹1,800,000
    • Spain: €60,000

    • USA: $135,000
    • India: ₹3,000,000
    • Spain: €75,000

Related Topics for further study


Learning Outcomes

  • Understand security best practices in the cloud computing environment
  • Learn how to secure data with encryption and access control
  • Protect against cyber attacks with best practices and tools

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of cloud computing
  • Familiarity with Google Cloud Platform

Course Difficulty Level

Intermediate

Course Format

  • Online
  • Self-paced

Similar Courses

  • Cloud Security Fundamentals
  • Google Cloud Platform Fundamentals: Core Infrastructure

Related Education Paths


Notable People in This Field

  • Field CTO, Palo Alto Networks
  • Microsoft Regional Director

Related Books

Description

This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.

Knowledge

  • Apply techniques and best practices to secure Compute Engine
  • Apply techniques and best practices to secure cloud data
  • Apply techniques and best practices to secure applications
  • Apply techniques and best practices to secure Kubernetes

Outline

  • Welcome to Security Best Practices in Google Cloud
  • Welcome and Getting Started Guide!
  • How to Send Feedback
  • Securing Compute Engine: Techniques and Best Practices
  • Module Overview
  • Compute Engine Identity and API Access
  • VM and API Scopes
  • Connecting to Virtual Machines
  • Organization Policy Service
  • Organization Policy Constraints
  • Compute Engine Security
  • Using shielded VMs to maintain the integrity of virtual machines
  • Lab Intro: Configuring, using, and auditing VM service accounts and scopes
  • Encryption Overview
  • Customer Supplied and Managed Keys
  • Lab Intro: Encrypting Disks with Customer-Supplied Encryption Keys
  • Securing Compute Engine: Techniques and Best Practices
  • Securing Cloud Data: Techniques and Best Practices
  • Module Overview
  • Cloud Storage Permissions and Roles
  • Auditing Storage Buckets
  • Signed URLS and Signed Policy Documents
  • Encrypting Cloud Storage objects with CMEK and CSEK
  • Lab Intro: Using Customer-Supplied Encryption Keys with Cloud Storage
  • Lab Intro: Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS
  • What is an HSM?
  • Features of Google Cloud HSM
  • Demo: Using and Verifying Keys in Cloud HSM
  • BigQuery IAM Roles and Authorized Views
  • Lab Intro: Creating a BigQuery Authorized View
  • Cloud Storage Best Practices
  • Big Query Storage Best Practices
  • Securing Cloud Data: Techniques and Best Practices
  • Application Security: Techniques and Best Practices
  • Module Overview
  • Application Vulnerabilities
  • How Cloud Security Scanner Works
  • Avoiding Unwanted Impact
  • Lab Intro Using Cloud Security Scanner to Find Vulnerabilities in an App Engine Application
  • Types of Phishing Attacks
  • Identity-Aware Proxy (IAP)
  • Lab Intro Configuring Identity-Aware Proxy
  • Secret Manager
  • Lab Intro Configuring and Using Credentials with Secret Manager
  • Application Security: Techniques and Best Practices
  • Securing Kubernetes: Techniques and Best Practices
  • Module Overview
  • Introduction to Kubernetes/GKE
  • Authentication and Authorization
  • Hardening Your Clusters
  • Securing Your Workloads
  • Logging and Monitoring
  • Securing Kubernetes: Techniques and Best Practices

Summary of User Reviews

Learn security best practices in Google Cloud with this course on Coursera. Students have found this course to be informative and well-structured, with a focus on practical application rather than just theory. One key aspect that many users appreciated was the hands-on labs and exercises that allowed them to practice what they learned in a simulated environment.

Pros from User Reviews

  • Informative and well-structured course content
  • Focus on practical application rather than just theory
  • Hands-on labs and exercises to practice what is learned

Cons from User Reviews

  • Some users found the course to be too basic
  • Limited discussion on advanced topics
  • The course may not be suitable for those without prior knowledge of Google Cloud
English
Available now
Approx. 13 hours to complete
Google Cloud Training
Google Cloud
Coursera

Instructor

Google Cloud Training

  • 4.6 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses