Price:
$1,875.00
Days:
1
Virtual
– • Understand Google’s approach to security
– • Manage administration identities using Cloud Identity
– • Implement least privilege administration using Resource Manager and IAM
– • Implement Identity-Aware Proxy
– • Implement IP traffic controls using VPC firewalls and Google Cloud Armor
– • Remediate security vulnerabilities, especially public access to data and virtual machines
– • Scan for and redact sensitive data using the Cloud Data Loss Prevention API
– • Analyze changes to resource metadata configuration using audit logs
– • Scan a Google Cloud deployment with Forseti to remediate important types of vulnerabilities, especially in public access to data and VMs
No specific prerequisites are required for this course. Basic computer literacy and familiarity with fundamental concepts in the subject area are recommended for the best learning experience.
• Securing Compute Engine: Techniques and Best Practices
• Securing Compute Engine: Techniques and Best Practices
• Securing Compute Engine: Techniques and Best Practices
• Securing Compute Engine: Techniques and Best Practices
• Configuring Virtual Private Cloud for Isolation and Security
• Configuring Virtual Private Cloud for Isolation and Security
• Configuring Virtual Private Cloud for Isolation and Security
• Configuring Virtual Private Cloud for Isolation and Security
• Identity and Access Management (IAM)
• Identity and Access Management (IAM)
• Identity and Access Management (IAM)
• Identity and Access Management (IAM)
• Foundations of Google Cloud Security
• Foundations of Google Cloud Security
• Foundations of Google Cloud Security
• Foundations of Google Cloud Security
• Cloud Identity
• Cloud Identity
• Cloud Identity
• Cloud Identity
• Application Security: Techniques and Best Practices
• Application Security: Techniques and Best Practices
• Application Security: Techniques and Best Practices
• Application Security: Techniques and Best Practices
• Securing Google Kubernetes Engine: Techniques and Best Practices
• Securing Google Kubernetes Engine: Techniques and Best Practices
• Securing Google Kubernetes Engine: Techniques and Best Practices
• Securing Google Kubernetes Engine: Techniques and Best Practices
• Protecting against Distributed Denial of Service Attacks (DDoS)
• Protecting against Distributed Denial of Service Attacks (DDoS)
• Protecting against Distributed Denial of Service Attacks (DDoS)
• Protecting against Distributed Denial of Service Attacks (DDoS)
• Content-Related Vulnerabilities: Techniques and Best Practices
• Content-Related Vulnerabilities: Techniques and Best Practices
• Content-Related Vulnerabilities: Techniques and Best Practices
• Content-Related Vulnerabilities: Techniques and Best Practices
• Monitoring, Logging, Auditing, and Scanning
• Monitoring, Logging, Auditing, and Scanning
• Monitoring, Logging, Auditing, and Scanning
• Monitoring, Logging, Auditing, and Scanning
• Securing Cloud Data: Techniques and Best Practices
• Securing Cloud Data: Techniques and Best Practices
• Securing Cloud Data: Techniques and Best Practices
• Securing Cloud Data: Techniques and Best Practices
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.