We may earn an affiliate commission when you visit our partners.
Course image
Google Cloud Training

この自習式トレーニング コースでは、Google Cloud でのセキュリティの管理と手法全般について学習します。録画された講義、デモ、ハンズオンラボを通して、Cloud Storage アクセス制御テクノロジー、セキュリティ キー、顧客指定の暗号鍵、API アクセス制御、スコーピング、Shielded VM、暗号化、署名付き URL など、安全な Google Cloud ソリューションを構築するためのコンポーネントについて学習し、演習を行います。また、Kubernetes 環境の保護についても説明します。

Enroll now

What's inside

Syllabus

Security Best Practices in Google Cloud へようこそ
Security Best Practices in Google Cloud へようこそこのコースは、本シリーズの以前のコース「Managing Security in Google Cloud」で取り上げられている基礎を土台としています。このセクションでは、セキュリティの「ベスト プラクティス」を実装して、システム、ソフトウェア、データに対する悪意のある攻撃のリスクを軽減する方法について詳しく学びます。
Read more
Compute Engine の保護: 手法とベスト プラクティス
このモジュールでは、まずサービス アカウントと、Compute Engine に適用した場合の IAM ロールと API スコープについて説明します。さらに、VM ログインの管理と、組織のポリシーを使用して組織の階層に存在するすべてのリソースに適用される制約を設定する方法についても説明します。次に、Compute Engine のベスト プラクティスと Compute Engine を保護するためのヒントを確認します。最後に、顧客指定の暗号鍵を使用した永続ディスクの暗号化について見ていきます。
クラウドデータの保護: 手法とベスト プラクティス
このモジュールでは、Cloud Storage バケットの IAM 権限とアクセス制御リストの管理、一般公開に設定されているデータの検索と修復などのクラウドデータの監査、署名付き Cloud Storage URL と署名付きポリシー ドキュメントの使用方法、保存データの暗号化について説明します。さらに、BigQuery の IAM ロールと承認済みビューについても取り上げ、データセットとテーブルへのアクセスの管理を紹介します。このモジュールの最後に、ストレージのベスト プラクティスについて概要を説明します。
アプリケーション セキュリティ: 手法とベスト プラクティス
このモジュールでは、アプリケーション セキュリティの手法とベスト プラクティスについて説明します。Web Security Scanner を使用してアプリケーションの脆弱性を特定する方法を確認し、ID と OAuth のフィッシングについて詳しく見ていきます。最後に、Identity-Aware Proxy(IAP)を使用してクラウド アプリケーションへのアクセスを制御する方法を説明します。
Google Kubernetes Engine の保護: 手法とベスト プラクティス
Google Kubernetes Engine でワークロードを保護するには、コンテナ イメージのコンテンツ、コンテナのランタイム、クラスタ ネットワーク、クラスタ API サーバーへのアクセスなど、何層ものスタックが必要です。このモジュールでは、認証と認可の安全な設定、クラスタの強化、ワークロードの保護、すべてが良好な状態であることを確認するためのモニタリングの方法について学びます。

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
対象のオーディエンスはセキュリティの実務経験があり、クラウドの環境に精通している方向けです。
Google Cloudのセキュリティを深く理解するための基礎知識の習得が目標です。
Google Cloudでのセキュリティ対策の根本的な理解を向上させられます。
セキュリティのベースとなる概念を強化し、実践的なスキルを磨けます。
ベストプラクティスの適用手順を段階的に習得できます。

Save this course

Save Security Best Practices in Google Cloud 日本語版 to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Security Best Practices in Google Cloud 日本語版 with these activities:
Review on Security Concepts
Review the foundational concepts of security to better understand the course materials.
Browse courses on Security Concepts
Show steps
  • Review textbook chapters on security concepts
  • Complete practice problems on basic security principles
Form a Study Group for Security Best Practices
Establish a study group with peers to reinforce concepts, exchange perspectives, and quiz each other on security best practices.
Browse courses on Security Best Practices
Show steps
  • Identify interested peers
  • Establish regular meeting times
  • Prepare discussion topics and exercises
  • Facilitate discussions and provide feedback
オンラインフォーラムでの支援
他の学習者とつながり、クラウドセキュリティの理解を深めることができます。
Show steps
  • オンラインフォーラムまたはコミュニティに参加する。
  • アクティブな質問や議論を見つける。
  • あなたの知識と経験に基づいて、建設的な回答を提供する。
Five other activities
Expand to see all activities and additional details
Show all eight activities
Practice Cloud Storage Access Control
Complete exercises to strengthen your understanding of Cloud Storage access control mechanisms.
Show steps
  • Create buckets with varying access control settings
  • Configure IAM permissions for users and groups
  • Simulate attacks and test access control configurations
ハンズオンラボ: Cloud Storage アクセス制御
IAM 権限とアクセス制御リストを使用して、Cloud Storage リソースへのアクセスを管理する方法を実際に体験できます。
Browse courses on Cloud Storage
Show steps
  • ハンズオンラボを開く。
  • 指示に従って、バケットを作成する。
  • さまざまなアクセス制御設定を試す。
Design a Deployment Plan for Secure Kubernetes Environment
Craft a detailed plan outlining the steps to deploy a secure Kubernetes environment, considering authentication, authorization, and network security.
Show steps
  • Identify security requirements and best practices for Kubernetes
  • Design the Kubernetes cluster architecture with security in mind
  • Configure authentication and authorization mechanisms
  • Establish network security controls and segmentation
チュートリアル: Kubernetes 環境の保護
コンテキストを利用した認証、クラスタの強化、ワークロードの保護など、Kubernetes 環境の保護に関する高度な技術について学びます。
Browse courses on Kubernetes
Show steps
  • Google Kubernetes Engine のドキュメントを参照する。
  • 関連するチュートリアルやサンプルコードを探す。
  • 実践的な例に基づいて、保護のベストプラクティスを実施する。
Build a Secure Web Application with Shielded VM and OAuth 2.0
Develop a fully-featured web application that showcases the implementation of Shielded VM for protection and OAuth 2.0 for authentication.
Show steps
  • Design the application architecture and security requirements
  • Configure Shielded VM for the application
  • Implement OAuth 2.0 for user authentication
  • Test and evaluate the security of the application

Career center

Learners who complete Security Best Practices in Google Cloud 日本語版 will develop knowledge and skills that may be useful to these careers:
Cloud Security Engineer
Cloud Security Engineers are responsible for securing cloud environments. The course covers many topics that are directly relevant to this role, such as cloud security architecture, cloud security tools, and cloud security best practices.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain security systems for organizations. The course covers many of the concepts that are essential for this role, such as network security, cryptography, and vulnerability management. This course may be especially useful for Cybersecurity Engineers who want to build a strong foundation in cloud security.
Security Architect
Security Architects design and implement security solutions for organizations. The course covers many of the concepts that are essential for this role, such as network security, cryptography, and vulnerability management. This course may be especially useful for Security Architects who want to build a strong foundation in cloud security.
Security Engineer
Security Engineers design, implement, and maintain security systems for organizations. The course covers many of the concepts that are essential for this role, such as network security, cryptography, and vulnerability management. This course may be especially useful for Security Engineers who want to build a strong foundation in cloud security.
Security Analyst
This course covers the skills you need to be a Security Analyst, including how to use security tools, detect and respond to security incidents, and develop and implement security policies. Security Analysts monitor systems, analyze data, write reports, and review logs to identify vulnerabilities and develop strategies to protect data. Courses in this series may be especially helpful to Security Analysts with a background in development, engineering, or IT.
Information Security Officer (ISO)
The Security Best Practices in Google Cloud course may be useful for aspiring ISOs who are responsible for developing and implementing an organization's information security policies and procedures. The course covers many topics that are directly relevant to this role, such as security management, risk assessment, and incident response.
Information Security Analyst
Information Security Analysts protect computer networks and systems from unauthorized access, damage, disruption, misuse, or other threats. The course covers many topics that are directly relevant to this field, such as security assessment, risk management, and incident response.
Chief Information Security Officer (CISO)
The Security Best Practices in Google Cloud course may be useful for aspiring CISOs who are responsible for overseeing the security of an organization's information systems. The course covers many topics that are directly relevant to this role, such as security management, risk assessment, and incident response.
Security Manager
Security Managers are responsible for overseeing the security of an organization's information systems. The course covers many topics that are directly relevant to this role, such as security management, risk assessment, and incident response.
Security Consultant
The Security Best Practices in Google Cloud course may be useful for Security Consultants who provide security advice to organizations. The course covers many topics that are directly relevant to this role, such as security risk assessment, security policy development, and incident response planning.
Penetration Tester
The Security Best Practices in Google Cloud course may be useful for Penetration Testers who are responsible for testing the security of cloud applications and services. The course covers many topics that are directly relevant to this role, such as vulnerability assessment, penetration testing, and exploit development.
Cloud Architect
The Security Best Practices in Google Cloud course may be useful for Cloud Architects. This is because the course covers many of the concepts that are essential for designing and implementing secure cloud solutions, such as access control, encryption, and security monitoring.
Forensic Analyst
The Security Best Practices in Google Cloud course may be useful for Forensic Analysts who are responsible for investigating cybercrimes. The course covers many topics that are directly relevant to this role, such as digital forensics, incident response, and malware analysis.
Network Administrator
The Security Best Practices in Google Cloud course may be useful for Network Administrators who are responsible for securing cloud networks. The course covers many topics that are directly relevant to this role, such as network security architecture, firewall configuration, and intrusion detection.
Systems Administrator
Systems Administrators manage computer systems, including servers, workstations, and networks. The course covers many topics that are directly relevant to this role, such as system security, performance tuning, and backup and recovery.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Best Practices in Google Cloud 日本語版.
この本は、セキュアなクラウドソリューションを構築するための基礎的な知識を提供します。このコースで取り上げられるトピックの背景情報を提供します。
この本は、分散システムのセキュリティに関する幅広いトピックをカバーしています。このコースで取り上げられるトピックの背景情報を提供します。
この本は、Kubernetesの包括的な概要を提供します。このコースで取り上げられるKubernetesのセキュリティのトピックを補完します。
この本は、情報セキュリティポリシーと手続きに関する包括的なリファレンスを提供します。このコースで取り上げられるトピックの背景情報を提供します。
Delivers a high-level overview of cloud security, explaining fundamental concepts, threats, and best practices. It covers various cloud service models and provides a good starting point for understanding cloud security.
Suitable as a reference book, this guide provides comprehensive coverage of Google Cloud Platform security architecture. It covers topics such as IAM, network security, data security, and compliance, offering deep insights into designing secure cloud solutions.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security Best Practices in Google Cloud 日本語版.
Essential Cloud Infrastructure: Core Services 日本語版
Most relevant
Networking in Google Cloud: Defining and Implementing...
Most relevant
Google Workspace Security 日本語版
Most relevant
セキュア ソフトウェア開発:検証、専門的トピック
Most relevant
Introduction to Google Workspace 日本語版
Most relevant
【英語スピーキング講座】第二言語習得論に基づく英語を話す力の伸ばし方
Most relevant
TOEIC L&Rテスト・単語力強化で絶対攻略!1ヶ月で1000単語を楽しく暗記するタニケイ式ボキャビル
Most relevant
Architecting with Google Kubernetes Engine: Production...
Most relevant
Gmail 日本語版
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser