Sela

Security Best Practives in Google Cloud

Description
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.
Intended audience
[Cloud] information security analysts, architects, and engineers. Information security/cybersecurity specialists. Cloud infrastructure architects. Also intended for Google and partner field personnel who work with customers in those job roles. Also useful for cloud application developers.

Topics

Module Overview
Service accounts, IAM roles, and API scopes
Lab Intro: Configuring, Using, and Auditing VM Service Accounts and Scopes
Getting Started with Google Cloud and Qwiklabs
Connecting to virtual machines
Connecting to VMs without external IPs
OS Login
Organization policy controls
Shielded VMs
Confidential VMs
Certificate Authority Service
What Certificate Authority Service provides
Compute Engine best practices
Module review
Module Overview1m
Cloud Storage IAM permissions and ACLs
Auditing cloud data
Signed URLs and policy documents
Encrypting with CMEK and CSEK
Lab Intro: Using Customer-Supplied Encryption Keys with Cloud Storage
Lab Intro: Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS
Demo: Using and Verifying Keys in Cloud HSM
BigQuery IAM Roles and Authorized Views
Lab Intro: Creating a BigQuery Authorized View2
Storage best practices
Module Review
Module Overview
Types of application security vulnerabilities
Web Security Scanner
Lab Intro: Using Web Security Scanner to Find Vulnerabilities in an App Engine Application
Threat: Identity and Oauth phishing
Identity-Aware Proxy (IAP)
Lab Intro: Securing Compute Engine Applications with BeyondCorp Enterprise
Secret Manager
Lab Intro: Configuring and Using Credentials with Secret Manager
Module review
Module Overview
Introduction to Kubernetes/GKE
Authentication and authorization
Hardening your Clusters
Securing Your Workloads
Monitoring and logging
Module review

רוצה לדבר עם יועץ?

האם אתה בטוח שאתה רוצה לסגור את הטופס ולאבד את כל השינויים?