Security in the Google Cloud Platform Course Details:

Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution. Participants also learn mitigation techniques for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use.

    Nov 13 2024

    Date: 11/13/2024 - 11/15/2024 (Wednesday - Friday) | 9:00 AM - 5:00 PM (EDT)
    Location: ONLINE (Virtual Classroom Live)
    Delivery Format: VIRTUAL CLASSROOM LIVE Request Quote & Enroll

    Success! Your message has been sent to us.
    Error! There was an error sending your message.
    REQUEST MORE INFO:

    Security in the Google Cloud Platform

    November 13 - 15, 2024 | 9:00 AM - 5:00 PM (EDT) | Virtual Classroom Live


    How Did You Hear of Global IT Training?

    Join Our Email List?


*Please Note: Course Outline is subject to change without notice. Exact course outline will be provided at time of registration.
  • Understanding the Google approach to security
  • Managing administrative identities using Cloud Identity.
  • Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM.
  • Implementing IP traffic controls using VPC firewalls and Cloud Armor
  • Implementing Identity Aware Proxy
  • Analyzing changes to the configuration or metadata of resources with GCP audit logs
  • Scanning for and redact sensitive data with the Data Loss Prevention API
  • Scanning a GCP deployment with Forseti
  • Remediating important types of vulnerabilities, especially in public access to data and VMs

 

In addition to the following classes, Students should possess Knowledge of foundational concepts in information security:

 

  • Fundamental concepts including vulnerability, threat, attack surface, confidentiality, integrity, availability
  • Common threat types and their mitigation strategies
  • Public-key cryptography
  • Public and private key pairs
  • Certificate authorities
  • Transport Layer Security/Secure Sockets Layer encrypted communication
  • Public key infrastructures
  • Security policy
  • Basic proficiency with command-line tools and Linux operating system environments 
  • Systems Operations experience, including deploying and managing applications, either on-premises or in a public cloud environment
  • Reading comprehension of code in Python or JavaScript
  • Cloud information security analysts, architects, and engineers
  • Information security/cybersecurity specialists
  • Cloud infrastructure architects
  • Developers of cloud applications

Ready to Jumpstart Your IT Career?

CONTACT US NOW!