Security in Google Cloud

Our Security in Google Cloud Platform (GCP) course equips you with the skills to deploy and manage secure network architectures. You’ll learn to mitigate network vulnerabilities and gain hands-on experience with advanced tools such as the Security Command Center and Cloud Armor. This course is designed for GCP security professionals who have completed the Google Cloud Fundamentals: Core Infrastructure training or possess equivalent experience.
Course Details

Price:

$1,875.00

Days:

1

Location:

Virtual

Course Overview

Our Security in Google Cloud Platform (GCP) course equips you with the skills to deploy and manage secure network architectures. You’ll learn to mitigate network vulnerabilities and gain hands-on experience with advanced tools such as the Security Command Center and Cloud Armor. This course is designed for GCP security professionals who have completed the Google Cloud Fundamentals: Core Infrastructure training or possess equivalent experience.

– • Understand Google’s approach to security
– • Manage administration identities using Cloud Identity
– • Implement least privilege administration using Resource Manager and IAM
– • Implement Identity-Aware Proxy
– • Implement IP traffic controls using VPC firewalls and Google Cloud Armor
– • Remediate security vulnerabilities, especially public access to data and virtual machines
– • Scan for and redact sensitive data using the Cloud Data Loss Prevention API
– • Analyze changes to resource metadata configuration using audit logs
– • Scan a Google Cloud deployment with Forseti to remediate important types of vulnerabilities, especially in public access to data and VMs

No specific prerequisites are required for this course. Basic computer literacy and familiarity with fundamental concepts in the subject area are recommended for the best learning experience.

• Securing Compute Engine: Techniques and Best Practices
• Securing Compute Engine: Techniques and Best Practices
• Securing Compute Engine: Techniques and Best Practices
• Securing Compute Engine: Techniques and Best Practices
• Configuring Virtual Private Cloud for Isolation and Security
• Configuring Virtual Private Cloud for Isolation and Security
• Configuring Virtual Private Cloud for Isolation and Security
• Configuring Virtual Private Cloud for Isolation and Security
• Identity and Access Management (IAM)
• Identity and Access Management (IAM)
• Identity and Access Management (IAM)
• Identity and Access Management (IAM)
• Foundations of Google Cloud Security
• Foundations of Google Cloud Security
• Foundations of Google Cloud Security
• Foundations of Google Cloud Security
• Cloud Identity
• Cloud Identity
• Cloud Identity
• Cloud Identity
• Application Security: Techniques and Best Practices
• Application Security: Techniques and Best Practices
• Application Security: Techniques and Best Practices
• Application Security: Techniques and Best Practices
• Securing Google Kubernetes Engine: Techniques and Best Practices
• Securing Google Kubernetes Engine: Techniques and Best Practices
• Securing Google Kubernetes Engine: Techniques and Best Practices
• Securing Google Kubernetes Engine: Techniques and Best Practices
• Protecting against Distributed Denial of Service Attacks (DDoS)
• Protecting against Distributed Denial of Service Attacks (DDoS)
• Protecting against Distributed Denial of Service Attacks (DDoS)
• Protecting against Distributed Denial of Service Attacks (DDoS)
• Content-Related Vulnerabilities: Techniques and Best Practices
• Content-Related Vulnerabilities: Techniques and Best Practices
• Content-Related Vulnerabilities: Techniques and Best Practices
• Content-Related Vulnerabilities: Techniques and Best Practices
• Monitoring, Logging, Auditing, and Scanning
• Monitoring, Logging, Auditing, and Scanning
• Monitoring, Logging, Auditing, and Scanning
• Monitoring, Logging, Auditing, and Scanning
• Securing Cloud Data: Techniques and Best Practices
• Securing Cloud Data: Techniques and Best Practices
• Securing Cloud Data: Techniques and Best Practices
• Securing Cloud Data: Techniques and Best Practices

Class Dates & Times
Filters Sort results
Reset Apply
6/9/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$1,875.00
8/11/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$1,875.00
10/15/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$1,875.00
12/10/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$1,875.00
— Questions?

Information Request

— Empower Change

Invest in Skills & Equality

Support Diversity, Equity, and Inclusion with Every Purchase.

Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.