We may earn an affiliate commission when you visit our partners.
Course image
Google Cloud Training

Este curso de treinamento autoguiado oferece aos participantes um amplo estudo sobre controles e técnicas de segurança no Google Cloud. Com palestras gravadas, demonstrações e laboratórios práticos, participantes podem conhecer e implantar os componentes de uma solução segura do Google Cloud, incluindo tecnologias de controle de acesso do Cloud Storage, chaves de segurança, Chaves de criptografia fornecidas pelo cliente, controles de acesso a APIs, definição de escopo, VM protegidas, criptografia e URLs assinados. O curso também aborda como proteger os ambientes do Kubernetes.

Enroll now

What's inside

Syllabus

Bem-vindo ao curso Security Best Practices in Google Cloud
Bem-vindo ao curso Security Best Practices in Google Cloud! Neste curso, vamos dar continuidade aos conceitos fundamentais que abordamos no curso anterior nessa série, Managing Security in Google Cloud. Nesta seção, você vai saber como implementar "práticas recomendadas" de segurança para diminuir o risco de ataques maliciosos contra seus sistemas, softwares e dados.
Read more
Como proteger o Compute Engine: técnicas e práticas recomendadas
Neste módulo, vamos começar com uma discussão sobre contas de serviço, papéis do IAM e escopos de API aplicados ao Compute Engine. Depois vamos conferir como gerenciar logins em VMs, como adotar políticas da organização para definir restrições que se aplicam a todos os recursos na hierarquia organizacional. Em seguida, também vamos abordar as práticas recomendadas do Compute Engine para mostrar dicas de como proteger o Compute Engine. Por fim, abordaremos a criptografia de discos permanentes com Chaves de criptografia fornecidas pelo cliente.
Como proteger os dados na nuvem: técnicas e práticas recomendadas
Neste módulo, vamos abordar como controlar as permissões do IAM e acessar listas de controle em buckets do Cloud Storage, auditar dados da nuvem, inclusive encontrar e corrigir dados definidos como acessíveis publicamente, como usar URLs assinados do Cloud Storage e documentos de políticas assinados e como criptografar dados em repouso. Também abordaremos os papéis do IAM do BigQuery e as visualizações autorizadas para demonstrar como gerenciar o acesso a tabelas e conjuntos de dados. O módulo termina com uma revisão geral das práticas recomendadas de armazenamento
Segurança para aplicativos: técnicas e práticas recomendadas
Neste módulo, vamos abordar as práticas recomendadas e técnicas de segurança de aplicativos. Vamos analisar como o Web Security Scanner pode ser usado para identificar vulnerabilidades nos aplicativos e vamos nos aprofundar no assunto phishing de identidade e Oauth. Por fim, vamos abordar como o Identity-Aware Proxy, ou IAP, pode ser usado para controlar o acesso aos aplicativos na nuvem.
Como proteger o Google Kubernetes Engine: técnicas e práticas recomendadas
A proteção de cargas de trabalho no Google Kubernetes Engine envolve muitas camadas da pilha, incluindo o conteúdo da imagem de contêiner, o ambiente de execução de contêiner, a rede de cluster e o acesso ao servidor da API de cluster. Neste módulo, você vai aprender a configurar com segurança sua autenticação e autorização, como aumentar a proteção dos seus clusters, proteger suas cargas de trabalho e monitorar a integridade de tudo isso.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Este curso ajuda os participantes a desenvolver um domínio profundo de técnicas e controles de segurança relacionados ao Google Cloud
O curso apresenta técnicas avançadas de segurança que podem ajudar a proteger os dados e os recursos na nuvem
Ele oferece palestras gravadas, demonstrações e laboratórios práticos para reforçar o aprendizado
O curso é oferecido pelo Google Cloud Training e seus instrutores são especialistas reconhecidos em segurança na nuvem
O curso é autoguiado, o que permite aos participantes aprenderem no seu próprio ritmo e horário
Abrange tópicos essenciais de segurança, desde técnicas de controle de acesso a criptografia e proteção de contêineres

Save this course

Save Security Best Practices in Google Cloud - Português to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Security Best Practices in Google Cloud - Português with these activities:
Configure uma conta e um projeto do Google Cloud
Isso permitirá que você pratique as técnicas de segurança abordadas no curso e veja como elas funcionam na prática.
Browse courses on Google Cloud
Show steps
  • Acesse o console do Google Cloud
  • Crie uma nova conta e projeto do Google Cloud
Leia os documentos do Google Cloud
A leitura desta documentação fornecerá informações valiosas sobre as práticas recomendadas de segurança do Google Cloud, ajudando você a proteger seus dados de forma mais eficaz.
Browse courses on Google Cloud
Show steps
  • Acesse a documentação do Google Cloud
  • Leia os artigos sobre práticas recomendadas de segurança
  • Anote os pontos-chave
Siga os tutoriais do Google Cloud sobre segurança
Esses tutoriais fornecem orientação passo a passo sobre como implementar práticas de segurança no Google Cloud, ajudando você a melhorar a segurança do seu projeto.
Browse courses on Google Cloud
Show steps
  • Acesse os tutoriais de segurança do Google Cloud
  • Siga os tutoriais e pratique as técnicas fornecidas
Two other activities
Expand to see all activities and additional details
Show all five activities
Participe de um workshop sobre segurança do Google Cloud
Os workshops são uma ótima maneira de se envolver com outros alunos e profissionais e aprender com especialistas do setor sobre as práticas recomendadas de segurança do Google Cloud.
Browse courses on Google Cloud
Show steps
  • Encontre um workshop sobre segurança do Google Cloud
  • Inscreva-se e participe do workshop
Contribute to projetos de código aberto sobre segurança do Google Cloud
Isso permitirá que você aprenda com outros e contribua para a comunidade de segurança do Google Cloud, aprofundando seu conhecimento e habilidades práticas.
Browse courses on Google Cloud
Show steps
  • Encontre projetos de código aberto relacionados à segurança do Google Cloud
  • Contribua com seu conhecimento e habilidades para os projetos

Career center

Learners who complete Security Best Practices in Google Cloud - Português will develop knowledge and skills that may be useful to these careers:
IT Security Manager
IT Security Managers are responsible for the overall security of an organization's IT infrastructure and data. As an IT Security Manager, you will be responsible for developing and implementing security policies and procedures, as well as managing the organization's security team. This course can help you build a foundation in the controls and techniques used to secure Google Cloud, including access control, encryption, and incident response. It will also help you develop the skills needed to develop and implement security policies and procedures, as well as manage a security team.
Information Security Analyst
Information Security Analysts identify and assess security risks and vulnerabilities. As an Information Security Analyst, you will be responsible for developing and implementing security measures to protect an organization's IT infrastructure and data. This course can help you build a foundation in the controls and techniques used to secure Google Cloud, including access control, encryption, and incident response. It will also help you develop the skills needed to identify and assess security risks and vulnerabilities.
Data Protection Specialist
Data Protection Specialists develop and implement data protection strategies to protect sensitive data from unauthorized access or disclosure. As a Data Protection Specialist, you will be responsible for ensuring that your organization's data is protected in accordance with applicable laws and regulations. This course can help you build a foundation in the controls and techniques used to secure Google Cloud, including access control, encryption, and data loss prevention. It will also help you develop the skills needed to develop and implement data protection strategies.
Risk Manager
Risk Managers are responsible for identifying and assessing risks to an organization's operations. As a Risk Manager, you will be responsible for developing and implementing risk management strategies. This course can help you build a foundation in the controls and techniques used to secure Google Cloud, including access control, encryption, and data protection. It will also help you develop the skills needed to identify and assess risks, as well as develop and implement risk management strategies.
Compliance Analyst
Compliance Analysts ensure that their organizations comply with applicable laws and regulations. As a Compliance Analyst, you will be responsible for identifying and assessing compliance risks, as well as developing and implementing compliance measures. This course can help you build a foundation in the controls and techniques used to secure Google Cloud, including access control, encryption, and data protection. It will also help you develop the skills needed to identify and assess compliance risks, as well as develop and implement compliance measures.
Security Researcher
Security Researchers identify and exploit vulnerabilities in computer systems. As a Security Researcher, you will be responsible for discovering and reporting vulnerabilities in Google Cloud. This course can help you build a foundation in the controls and techniques used to secure Google Cloud, including access control, encryption, and data protection. It will also help you develop the skills needed to discover and report vulnerabilities in computer systems.
Cloud Security Analyst
Cloud Security Analysts monitor and analyze security events in cloud computing environments. As a Cloud Security Analyst, you will be responsible for investigating security incidents and recommending corrective actions. This course can help you build a foundation in the controls and techniques used to secure Google Cloud, including access control, encryption, and incident response. It will also help you develop the skills needed to investigate security incidents and recommend corrective actions.
Auditing Manager
Auditing Managers are responsible for planning and conducting audits to ensure that an organization's financial and operational activities are being conducted in accordance with applicable laws and regulations. As an Auditing Manager, you will be responsible for developing and implementing audit plans, as well as managing the audit team. This course can help you build a foundation in the controls and techniques used to secure Google Cloud, including access control, encryption, and data protection. It will also help you develop the skills needed to develop and implement audit plans, as well as manage an audit team.
Cloud Security Architect
Cloud Security Architects design and implement security solutions for cloud computing environments. As a Cloud Security Architect, you will be responsible for developing and maintaining a security strategy for your organization's Google Cloud environment. This course can help you build a foundation in the controls and techniques used to secure Google Cloud, including access control, encryption, and incident response. Because this course will give you a strong foundation in Google Cloud security, it may be especially helpful for you if you are working in an organization that heavily relies on Google Cloud.
Data Engineer
Data Engineers are responsible for designing and implementing data pipelines. As a Data Engineer, you will be responsible for ensuring that data is processed and stored securely. This course can help you build a foundation in the controls and techniques used to secure Google Cloud, including access control, encryption, and data protection. It will also help you develop the skills needed to design and implement secure data pipelines.
Cloud Architect
Cloud Architects are responsible for designing and implementing cloud computing solutions. As a Cloud Architect, you will be responsible for ensuring that cloud solutions are secure. This course can help you build a foundation in the controls and techniques used to secure Google Cloud, including access control, encryption, and data protection. It will also help you develop the skills needed to design and implement secure cloud solutions.
DevOps Engineer
DevOps Engineers are responsible for bridging the gap between development and operations teams. As a DevOps Engineer, you will be responsible for ensuring that software is developed and deployed securely. This course can help you build a foundation in the controls and techniques used to secure Google Cloud, including access control, encryption, and data protection. It will also help you develop the skills needed to ensure that software is developed and deployed securely.
Security Engineer
Security Engineers design, implement, and manage security measures to protect an organization's IT infrastructure and data. As a Security Engineer, you will be responsible for protecting the Google Cloud environment for your organization. This course can help you build a foundation in the controls and techniques used to secure Google Cloud, including access control, encryption, and incident response. Because this course will give you a strong foundation in Google Cloud security, it may be especially helpful for you if you are working in an organization that heavily relies on Google Cloud.
Network Engineer
Network Engineers are responsible for designing and implementing network infrastructure. As a Network Engineer, you will be responsible for ensuring that the network is secure. This course can help you build a foundation in the controls and techniques used to secure Google Cloud, including access control, encryption, and network security. It will also help you develop the skills needed to design and implement secure network infrastructure.
Security Consultant
Security Consultants help organizations assess and improve their security posture. As a Security Consultant, you will be responsible for advising clients on how to improve their security measures. This course can help you build a foundation in the controls and techniques used to secure Google Cloud, including access control, encryption, and incident response. This course may be especially helpful for you if you are interested in working with clients who use Google Cloud.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Best Practices in Google Cloud - Português.
Provides a detailed overview of security for cloud computing. It covers topics such as cloud security architecture, cloud security controls, and cloud security operations. This book valuable resource for anyone looking to learn more about cloud security.
Provides a detailed overview of security engineering for distributed systems. It covers topics such as risk assessment, threat modeling, and security controls. This book valuable resource for anyone looking to learn more about security engineering.
Provides a comprehensive overview of cloud computing. It covers topics such as cloud computing models, cloud computing services, and cloud computing security. This book valuable resource for anyone looking to learn more about cloud computing.
Practical guide to implementing best practices for Google Cloud Platform. It covers topics such as security, performance, and cost optimization. This book valuable resource for anyone looking to get the most out of Google Cloud Platform.
Provides a comprehensive overview of Kubernetes. It covers topics such as cluster management, application deployment, and monitoring. This book valuable resource for anyone looking to learn more about Kubernetes.
Provides a comprehensive overview of DevOps. It covers topics such as continuous integration, continuous delivery, and continuous deployment. This book valuable resource for anyone looking to learn more about DevOps.
While this book does not directly cover cloud security, it offers valuable insights into social engineering and human factors in security, an aspect that is often overlooked but crucial in protecting cloud environments.
Provides a overview of top-level cloud security concepts. In this way it is an excellent background book for newcomers to the field of cloud security.
Widely-recommended resource for those seeking to expand their knowledge of cloud security, and is cited by many industry professionals as an exhaustive reference.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security Best Practices in Google Cloud - Português.
Managing Security in Google Cloud - Português Brasileiro
Most relevant
Essential Cloud Infrastructure: Core Services em...
Most relevant
Architecting with Google Kubernetes Engine: Workloads em...
Most relevant
Defining and Implementing Networks - Português
Most relevant
Migrating to Google Cloud em Português Brasileiro
Most relevant
Understanding Your Google Cloud Costs em Português
Most relevant
Google Cloud Product Fundamentals em Português Brasileiro
Most relevant
Mitigating Security Vulnerabilities on GC - Português
Most relevant
Serverless Machine Learning with Tensorflow on Google...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser