We may earn an affiliate commission when you visit our partners.
Course image
Google Cloud Training

Este curso de capacitación de autoaprendizaje brinda a los participantes conocimientos generales de los controles y las técnicas de seguridad en Google Cloud. Mediante conferencias, demostraciones y labs prácticos grabados, los participantes exploran y, luego, implementan los componentes de una solución segura de Google Cloud, incluidas tecnologías de control de acceso de Cloud Storage, llaves de seguridad, Claves de encriptación proporcionadas por el cliente, controles de acceso a la API, alcance, VMs protegidas, encriptación y URLs firmadas. También se aborda la protección de entornos de Kubernetes.

Enroll now

What's inside

Syllabus

Te damos la bienvenida a Security Best Practices in Google Cloud
Te damos la bienvenida a Security Best Practices in Google Cloud. En este curso, ampliaremos las bases establecidas en el curso anterior de esta serie, Managing Security in Google Cloud. En esta sección, podrás obtener más información para implementar prácticas recomendadas de seguridad con el objetivo de reducir el riesgo de ataques maliciosos en contra de tus sistemas, tu software y tus datos.
Read more
Protección de Compute Engine: Técnicas y prácticas recomendadas
En este módulo, analizaremos las cuentas de servicio, los roles de IAM y los permisos de las APIs según se aplican a Compute Engine. También hablaremos sobre la administración del acceso a las VMs y cómo usar las políticas de la organización para establecer restricciones que se apliquen a todos los recursos de tu jerarquía organizacional. A continuación, revisaremos las prácticas recomendadas de Compute Engine para entregarte algunas sugerencias con el objetivo de proteger Compute Engine. Por último, abordaremos la encriptación de discos persistentes con Claves de encriptación proporcionadas por el cliente.
Protección de datos de Cloud: Técnicas y prácticas recomendadas
En este módulo, veremos cómo controlar los permisos de IAM y las listas de control de acceso en buckets de Cloud Storage, realizar auditorías de datos en la nube, incluidos encontrar y corregir datos cuyo acceso se configuró como público, cómo usar URLs de Cloud Storage firmadas y documentos de políticas firmados y cómo encriptar datos en reposo. Además, se analizarán los roles de BigQuery IAM y las vistas autorizadas para demostrar la administración del acceso a conjuntos de datos y tablas. El módulo concluirá con una descripción general de las prácticas recomendadas de almacenamiento.
Seguridad para aplicaciones: Técnicas y prácticas recomendadas
En este módulo, analizaremos diversas técnicas y prácticas recomendadas de seguridad para aplicaciones. Veremos cómo se puede usar Web Security Scanner para identificar las vulnerabilidades en tus aplicaciones y profundizaremos el tema de la suplantación de identidad (phishing) y de OAuth. Por último, aprenderás cómo puede usarse Identity-Aware Proxy (IAP) para controlar el acceso a tus aplicaciones en la nube.
Protección de Google Kubernetes Engine: Técnicas y prácticas recomendadas
La protección de las cargas de trabajo en Google Kubernetes Engine implica varias capas de la pila, incluidos el contenido de la imagen y el entorno de ejecución del contenedor, la red del clúster y el acceso al servidor de API del clúster. En este módulo, aprenderás a configurar de forma segura tu autenticación y autorización, cómo endurecer tus clústeres, proteger tus cargas de trabajo y supervisar todo para asegurarte de que se mantenga en buen estado.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Helps protect Compute Engine through identity management and encryption
Develops skills to secure Google Kubernetes Engine (GKE) at various levels
Covers Cloud Storage security measures like bucket permissions and encryption
Teaches secure application development with Web Security Scanner and IAP
Provides hands-on labs for practical experience
Involves working with external resources like Cloud Storage, IAM, and Kubernetes

Save this course

Save Security Best Practices in Google Cloud - Español to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Security Best Practices in Google Cloud - Español with these activities:
Refresh your knowledge of Cloud Security
Reviewing basic Cloud Security concepts will refresh your knowledge and prepare you for this course.
Browse courses on Cloud Security
Show steps
  • Review your notes on access control models
  • Review the principles of least privilege and defense in depth
  • Review best practices for protecting data in the cloud
Compile a list of resources on Google Cloud security
Compiling a list of resources will help you to stay up-to-date on the latest Google Cloud security best practices.
Browse courses on Cloud Computing
Show steps
  • Search for resources on Google Cloud security
  • Add the resources to a spreadsheet or document
Complete the Google Cloud Security Best Practices Tutorial
This tutorial will provide you with hands-on experience in securing your Google Cloud environment.
Browse courses on Cloud Security Tools
Show steps
  • Set up your Google Cloud account
  • Complete the Identity and Access Management (IAM) tutorial
  • Complete the Cloud Storage security tutorial
Seven other activities
Expand to see all activities and additional details
Show all ten activities
Tutorial: Securing Compute Engine
Familiarize yourself with security best practices for Compute Engine to protect your virtual machines.
Browse courses on Compute Engine
Show steps
  • Follow the Compute Engine security tutorial
  • Implement the recommended security measures
Practice implementing security controls in Google Cloud
Practicing implementing security controls will help you to become more proficient in securing your Google Cloud environment.
Show steps
  • Create a new Google Cloud project
  • Enable IAM for your project
  • Create a Cloud Storage bucket
  • Set permissions on the bucket
Practice web security principles
Practice using web security principles to protect your website from attacks.
Browse courses on Website Security
Show steps
  • Review web security best practices.
  • Identify common web vulnerabilities.
  • Use tools to test your website for vulnerabilities.
  • Implement security measures to protect your website.
Start a pet project to practice your Google Cloud security skills
Starting a pet project will help you to apply your knowledge of Google Cloud security in a practical setting.
Browse courses on Google Cloud Platform
Show steps
  • Brainstorm a few project ideas
  • Choose a project idea and create a plan
  • Start working on your project
Create a security plan
Create a plan that outlines your security measures and procedures.
Browse courses on Security Strategy
Show steps
  • Identify your security goals.
  • Gather information about your organization's security needs.
  • Develop a plan that outlines your security measures and procedures.
  • Implement your security plan.
  • Monitor your security plan and make adjustments as needed.
Protect a Kubernetes cluster
Protect a Kubernetes cluster from attacks and vulnerabilities.
Browse courses on Kubernetes Security
Show steps
  • Identify the security risks associated with your Kubernetes cluster.
  • Implement security measures to protect your cluster.
  • Monitor your cluster for security threats.
  • Respond to security incidents.
  • Continuously improve your cluster's security posture.
Develop a security plan for your Google Cloud project
Creating a security plan will help you to identify and mitigate risks to your Google Cloud project.
Show steps
  • Identify the assets in your project that need to be protected
  • Identify the threats to your assets
  • Develop countermeasures to mitigate the threats
  • Create a plan for implementing the countermeasures

Career center

Learners who complete Security Best Practices in Google Cloud - Español will develop knowledge and skills that may be useful to these careers:
Cloud Security Architect
The Security Best Practices in Google Cloud course covers several topics relevant to Cloud Security Architects, including access management, encryption, security for applications, and protecting Google Kubernetes Engine loads.
Security Engineer
Security Engineers will find a lot to benefit from in the Security Best Practices in Google Cloud course. It delves into protecting data in the cloud, security for applications, and Google Kubernetes Engine, all of which are key aspects of a Security Engineer's work.
Cloud Security Engineer
Cloud Security Engineers work on securing cloud environments. This course can help people in this role learn about Google Cloud security controls and techniques, which can help them do their job more effectively.
Security Analyst
Security Analysts are responsible for the identification and mitigation of cyber threats. The Security Best Practices in Google Cloud course could prove useful to those pursuing this role, as it offers guidance on how to manage access to virtual machines, use encryption, and protect cloud data.
Cloud Architect
Cloud Architects should consider the Security Best Practices in Google Cloud course as it can help them learn about the controls and techniques for security in Google Cloud. It can help build a foundation about how to implement components of a secure Google Cloud solution and how to protect environments and data.
Data Protection Officer
The Security Best Practices in Google Cloud course can be of help to Data Protection Officers by providing an overview of data protection practices for Google Cloud, including access and encryption controls, as well as data auditing and protection in BigQuery.
Data Engineer
Security Best Practices in Google Cloud can help those pursuing a Data Engineer role by offering guidance on permissions, auditing, encryption, and roles related to data in the cloud.
Cloud Engineer
Cloud Engineers are tasked with securing and managing cloud infrastructures. Taking the Security Best Practices in Google Cloud course could prove helpful because it'll help you learn about IAM roles, access to virtual machines, and encryption, which are all very relevant to cloud engineering.
Cybersecurity Analyst
Cybersecurity Analysts are tasked with security across the enterprise IT infrastructure, including the cloud. The Security Best Practices in Google Cloud course could be helpful in this career as it provides guidance on using the Google Cloud platform and related security controls.
Chief Information Security Officer
The Security Best Practices in Google Cloud course may be useful for those aspiring to become Chief Information Security Officers. It provides a comprehensive overview of Google Cloud security best practices, covering topics such as access management, data protection, and threat detection.
Information Security Analyst
Information Security Analysts are concerned with protecting computer networks and systems. The material covered in Security Best Practices in Google Cloud could be helpful in this role, as it dives into protecting data and applications from threats.
IT Security Manager
IT Security Managers are responsible for implementing and managing IT security within an organization. The Security Best Practices in Google Cloud course may be helpful for those pursuing this role, as it provides guidance on how to implement security measures in the cloud.
DevOps Engineer
DevOps Engineers often interact with security technologies in some capacity. This course will help you deepen your knowledge in the implementation of IAM roles and permissions, encryption, storage permissions, and other key security concepts that DevOps Engineers should understand.
Network Security Engineer
Network Security Engineers could find the guidance on controlling access to virtual machines and the network of Google Kubernetes Engine clusters useful for their work.
Software Engineer
Topics like Identity-Aware Proxy for controlling access to cloud-based applications, using Web Security Scanner for identifying app vulnerabilities, and phishing are all relevant to Software Engineers.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Best Practices in Google Cloud - Español.
Covers fundamental concepts for building security engineering. It will help readers understand concepts in this course at a deeper level.
For readers interested in the security of Google Kubernetes Engine, this book covers platform threats, mitigation actions, and hardening techniques.
Good resource for readers who need to learn more about the challenges of cloud security and how to address them.
Good textbook or supplementary reading, especially for students, for a comprehensive and high-level overview of cloud security best practices.
Provides foundational knowledge for secure coding. It will be useful for those who want to gain a deeper understanding of the basics.
A complete and modern introduction to the principles and paradigms of cloud computing. Suitable for beginners as a prerequisite reading.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security Best Practices in Google Cloud - Español.
Escudo Digital: Ciberseguridad para Protección de Datos y...
Most relevant
Architecting with Google Kubernetes Engine: Production en...
Most relevant
Escudo Digital: Ciberseguridad para datos y sistemas
Most relevant
Architecting with Google Kubernetes Engine: Workloads en...
Most relevant
Escudo Digital: Ciberseguridad para Protección de Datos y...
Most relevant
Google Workspace Security - Español
Most relevant
Defining and Implementing Networks - Español
Most relevant
Essential Cloud Infrastructure: Core Services en Español
Most relevant
Activos, amenazas y vulnerabilidades
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser