We may earn an affiliate commission when you visit our partners.
Google Cloud

Google Workspace Security is the third course in the Google Workspace Administration series.

Read more

Google Workspace Security is the third course in the Google Workspace Administration series.

Google Workspace Security is the third course in the Google Workspace Administration series. In this course you will focus on the various aspects of Google Workspace Security including user password policies and how to enable and enforce two step verification (2SV) for your users. You will learn about application security and understand how to whitelist and block API access to your account. You will see how Google Workspace can easily be integrated with a number of predefined 3rd party applications. You will also become familiar with the SSO options in Google Workspace. Finally you will understand how to spot potential security risks within your organization and learn how to address them using the tools available in the admin console.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Google Workspace Security

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches admin functions, which are used by professionals who manage Google Workspace applications
Taught by Google Cloud, who are leaders in the industry
Develops security skills, which are useful for workplace success
Offers hands-on labs, activities and exercises
Exploers Google Workspace applications, which are widely used across the industry
Course is part of a series, which indicates comprehensiveness

Save this course

Save Google Workspace Security to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Google Workspace Security with these activities:
Compile a list of resources for Google Workspace security
To create a reference list for future use, compile a list of resources related to Google Workspace security.
Browse courses on Security Tools
Show steps
  • Search for resources on Google Workspace security
  • Organize the resources in a logical way
Review basic security concepts
To understand the more advanced security concepts, you should review some basic security concepts.
Browse courses on Security Principles
Show steps
Follow a tutorial for setting up basic user security
To better understand the user security module, go through a tutorial and try to set up some basic security settings for your users.
Show steps
  • Find a relevant tutorial
  • Follow the steps in the tutorial
Five other activities
Expand to see all activities and additional details
Show all eight activities
Mentor someone who needs help with Google Workspace security
By mentoring someone who needs help with Google Workspace security, you can both review the materials and strengthen your knowledge.
Browse courses on Mentoring
Show steps
  • Find someone who needs help with Google Workspace security
  • Create a plan for how you will mentor them
Create a list of tips for improving Google Workspace security
Creating a list of tips on how to improve Google Workspace security can help you solidify your understanding of the concepts covered in this course.
Show steps
  • Brainstorm a list of tips
  • Write out the tips in a clear and concise way
Read a security case study
To gain a deeper understanding of how security risks can impact an organization, you should read a security case study.
View Cyberwarfare on Amazon
Show steps
Conduct a security audit
To improve your security auditing skills, conduct a security audit for your workspace.
Browse courses on Security Assessment
Show steps
  • Set the scope of your audit
  • Gather the necessary data
  • Analyze the data and identify any vulnerabilities
Create a security checklist
By creating a security checklist, you can build a resource that you can continually refer to so that you can easily audit your security settings and reduce the risk of security breaches.
Browse courses on Security Audit
Show steps
  • Make a list of all the security settings you want to check
  • Create a schedule to review the checklist

Career center

Learners who complete Google Workspace Security will develop knowledge and skills that may be useful to these careers:
IT Risk Analyst
IT Risk Analysts are responsible for evaluating and mitigating risks to an organization's IT systems. This course can help IT Risk Analysts by providing them with a better understanding of the security features available in Google Workspace, such as password policies, two-step verification, and application security. This knowledge can help IT Risk Analysts to make better decisions about how to protect their organization's IT systems from security threats.
Security Engineer
Security Engineers are responsible for designing, implementing, and maintaining security systems for an organization. This course can help Security Engineers by providing them with a better understanding of the security features available in Google Workspace, such as password policies, two-step verification, and application security. This knowledge can help Security Engineers to make better decisions about how to design, implement, and maintain security systems for their organization.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for protecting an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help Cybersecurity Analysts by providing them with a better understanding of the security features available in Google Workspace, such as password policies, two-step verification, and application security. This knowledge can help Cybersecurity Analysts to make better decisions about how to protect their organization's computer networks and systems.
Security Consultant
Security Consultants help organizations to improve their security posture by identifying and mitigating risks. This course can help Security Consultants by providing them with a better understanding of the security features available in Google Workspace, such as password policies, two-step verification, and application security. This knowledge can help Security Consultants to make better recommendations to their clients about how to improve their security posture.
System Administrator
System Administrators are responsible for managing an organization's computer systems. This course can help System Administrators by providing them with a better understanding of the security features available in Google Workspace, such as password policies, two-step verification, and application security. This knowledge can help System Administrators to make better decisions about how to manage their organization's computer systems.
Cloud Security Architect
Cloud Security Architects are responsible for designing and implementing cloud security solutions for an organization. This course can help Cloud Security Architects by providing them with a better understanding of the security features available in Google Workspace, such as password policies, two-step verification, and application security. This knowledge can help Cloud Security Architects to make better decisions about how to design and implement cloud security solutions for their organization.
IT Auditor
IT Auditors are responsible for evaluating the effectiveness of an organization's IT controls. This course can help IT Auditors by providing them with a better understanding of the security features available in Google Workspace, such as password policies, two-step verification, and application security. This knowledge can help IT Auditors to better evaluate the effectiveness of an organization's IT controls.
Network Administrator
Network Administrators are responsible for managing an organization's computer networks. This course can help Network Administrators by providing them with a better understanding of the security features available in Google Workspace, such as password policies, two-step verification, and application security. This knowledge can help Network Administrators to make better decisions about how to manage their organization's computer networks.
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's information assets from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help Information Security Analysts by providing them with a better understanding of the security features available in Google Workspace, such as password policies, two-step verification, and application security. This knowledge can help Information Security Analysts to make better decisions about how to protect their organization's information assets.
IT Manager
IT Managers are responsible for planning, implementing, and managing an organization's IT systems. This course can help IT Managers by providing them with a better understanding of the security features available in Google Workspace, such as password policies, two-step verification, and application security. This knowledge can help IT Managers to make better decisions about how to plan, implement, and manage their organization's IT systems.
Data Analyst
Data Analysts are responsible for collecting, analyzing, and interpreting data to help organizations make better decisions. This course may be useful for Data Analysts by providing them with a better understanding of the security features available in Google Workspace, such as password policies, two-step verification, and application security. This knowledge may help Data Analysts to make better decisions about how to collect, analyze, and interpret data.
Database Administrator
Database Administrators are responsible for managing an organization's databases. This course may be useful for Database Administrators by providing them with a better understanding of the security features available in Google Workspace, such as password policies, two-step verification, and application security. This knowledge may help Database Administrators to make better decisions about how to manage their organization's databases.
Web Developer
Web Developers are responsible for designing, developing, and maintaining websites. This course may be useful for Web Developers by providing them with a better understanding of the security features available in Google Workspace, such as password policies, two-step verification, and application security. This knowledge may help Web Developers to make better decisions about how to design, develop, and maintain websites.
Business Analyst
Business Analysts are responsible for analyzing business processes and developing solutions to improve efficiency and effectiveness. This course may be useful for Business Analysts by providing them with a better understanding of the security features available in Google Workspace, such as password policies, two-step verification, and application security. This knowledge may help Business Analysts to make better decisions about how to analyze business processes and develop solutions to improve efficiency and effectiveness.
Software Developer
Software Developers are responsible for designing, developing, and maintaining software applications. This course may be useful for Software Developers by providing them with a better understanding of the security features available in Google Workspace, such as password policies, two-step verification, and application security. This knowledge may help Software Developers to make better decisions about how to design, develop, and maintain software applications.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Google Workspace Security.
Provides an overview of zero trust networks, which is applicable to Google Workspace security.
Provides a comprehensive overview of security engineering, which is applicable to Google Workspace security.
Provides an overview of network security assessment, which is applicable to Google Workspace security.
Provides a simplified and easy-to-understand overview of security risk management, which is applicable to Google Workspace security.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser