We may earn an affiliate commission when you visit our partners.
Course image
Google Cloud Training

Ce cours en auto-formation présente une étude approfondie des contrôles et techniques de sécurité sur Google Cloud. À travers des présentations, des démonstrations et des ateliers pratiques, les participants découvrent et déploient les composants d'une solution Google Cloud sécurisée, y compris les technologies de contrôle des accès à Cloud Storage, les clés de sécurité, les clés de chiffrement fournies par le client, les contrôles d'accès aux API, les champs d'application, les VM protégées, le chiffrement, et les URL signées. Le cours aborde également la sécurisation des environnements Kubernetes.

Enroll now

Two deals to help you save

We found two deals and offers that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Bienvenue dans le cours "Security Best Practices in Google Cloud"
Bienvenue dans le cours "Security Best Practices in Google Cloud". Dans ce cours, nous allons nous appuyer sur les bases établies dans le cours précédent de cette série, "Managing Security in Google Cloud". Dans cette section, vous allez approfondir la mise en œuvre de "bonnes pratiques" de sécurité visant à réduire le risque d'attaque malveillante sur vos systèmes, vos logiciels et vos données.
Read more
Sécuriser Compute Engine : techniques et bonnes pratiques
Dans ce module, nous commencerons par aborder les comptes de service, les rôles IAM et les niveaux d'accès aux API qui concernent Compute Engine. Nous nous intéresserons également à la gestion des connexions aux VM, ainsi qu'à l'utilisation de règles d'administration pour définir des contraintes qui s'appliquent à toutes les ressources de la hiérarchie de votre organisation. Ensuite, nous passerons en revue les bonnes pratiques et des conseils pour sécuriser Compute Engine. Enfin, nous aborderons le chiffrement des disques persistants à l'aide de clés de chiffrement fournies par le client.
Sécuriser les données cloud : techniques et bonnes pratiques
Dans ce module, nous aborderons le contrôle des autorisations IAM et des listes de contrôle d'accès appliquées sur les buckets Cloud Storage, l'audit des données cloud, y compris la recherche des données définies comme publiquement accessibles et les corrections afférentes, l'utilisation d'URL Cloud Storage signées et de documents de stratégie signés, ainsi que le chiffrement des données au repos. Par ailleurs, nous aborderons les rôles IAM et les vues autorisées BigQuery pour vous familiariser avec la gestion des accès aux ensembles de données et aux tables. Ce module se terminera par une présentation des bonnes pratiques en termes de stockage.
Sécurité des applications : techniques et bonnes pratiques
Ce module traite des techniques et des bonnes pratiques liées à la sécurité des applications. Nous verrons comment utiliser Web Security Scanner pour identifier les failles de vos applications, puis nous nous pencherons sur le sujet de l'hameçonnage visant Oauth et les identités. Enfin, vous apprendrez à utiliser Identity-Aware Proxy (ou IAP) pour contrôler l'accès à vos applications cloud.
Sécuriser Google Kubernetes Engine : techniques et bonnes pratiques
La protection des charges de travail dans Google Kubernetes Engine implique de nombreuses couches de la pile, y compris le contenu de votre image de conteneur, son environnement d'exécution, le réseau du cluster et l'accès au serveur d'API du cluster. Dans ce module, vous apprendrez à configurer l'authentification et les autorisations de manière sécurisée, ainsi qu'à renforcer vos clusters, sécuriser vos charges de travail et surveiller tous les éléments pour vous assurer qu'ils restent opérationnels.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Ce cours s'appuie sur les connaissances acquises dans le cours précédent, "Gestion de la sécurité dans Google Cloud"
Il aborde en profondeur les contrôles et techniques de sécurité sur Google Cloud
Il est dispensé par Google Cloud Training, ce qui garantit la qualité et la pertinence des enseignements
Il aborde des sujets essentiels pour renforcer la sécurité des infrastructures cloud, tels que le contrôle des accès, le chiffrement et la sécurisation des environnements Kubernetes
Il propose des présentations, des démonstrations et des ateliers pratiques, ce qui permet aux participants d'acquérir des connaissances théoriques et pratiques
Il est particulièrement adapté aux professionnels de l'informatique, aux administrateurs système et aux développeurs souhaitant renforcer la sécurité de leurs applications et infrastructures cloud

Save this course

Save Security Best Practices in Google Cloud en Français to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Security Best Practices in Google Cloud en Français with these activities:
Review the basics of Linux
Improve retention by reviewing Linux basics and refreshing your familiarity with the CLI.
Browse courses on Linux Basics
Show steps
  • Review Linux commands
  • Practice using the Linux command line
Organize course materials
Improve retention and understanding by consolidating course materials into a single, structured format.
Show steps
  • Review course notes and assignments
  • Organize materials by topic
  • Create a digital or physical study guide
Practice cloud security configuration in a lab environment
Deepen understanding and practical skills by applying security configurations in a simulated environment.
Show steps
  • Set up a lab environment
  • Configure security settings for Compute Engine
  • Configure IAM roles and permissions
  • Configure security for Cloud Storage
  • Implement security measures for Kubernetes
Four other activities
Expand to see all activities and additional details
Show all seven activities
Review and analyze security audit logs
Enhance understanding of security events and improve detection skills by analyzing audit logs.
Show steps
  • Locate and access audit logs
  • Review logs for security-related events
  • Analyze logs to identify potential vulnerabilities
Create a blog post or article on a specific aspect of cloud security
Solidify understanding by teaching others through writing and sharing knowledge on a specific topic.
Show steps
  • Identify a specific cloud security topic
  • Research and gather information on the topic
  • Write a blog post or article
  • Share the blog post or article with peers or industry professionals
Participate in a Capture The Flag (CTF) competition focused on cloud security
Develop practical skills and teamwork by solving complex security challenges in a gamified environment.
Show steps
  • Find a relevant CTF competition
  • Form or join a team
  • Analyze and solve security challenges
  • Collaborate with team members and strategize
Join a study group or discussion forum for cloud security
Enhance understanding and stay updated by engaging with peers and discussing security topics.
Show steps
  • Identify a suitable study group or discussion forum
  • Participate in discussions and Q&A sessions
  • Share knowledge and experiences with peers

Career center

Learners who complete Security Best Practices in Google Cloud en Français will develop knowledge and skills that may be useful to these careers:
Cloud Architect
A Cloud Architect designs, builds, and maintains cloud computing solutions. They work with clients to determine their business needs and then design and implement a cloud solution that meets those needs. This course may be useful for a burgeoning Cloud Architect, as they would gain hands-on experience with access management, encryption, and Kubernetes security. These are all important concepts for a Cloud Architect to have a solid understanding of.
Chief Information Security Officer (CISO)
A CISO is responsible for developing and implementing an organization's information security strategy. They work with other IT staff to ensure that the organization's computer systems and networks are secure from outside threats. This course may be useful for a CISO who wants to specialize in cloud security. The course covers topics such as access management, encryption, and Kubernetes security. These are all important concepts for a CISO to have a solid understanding of.
Security Engineer
A Security Engineer designs, implements, and maintains security measures to protect an organization's computer systems and networks from outside threats. They also work to identify and mitigate security risks. This course may be useful for a Security Engineer who wants to specialize in cloud security. The course covers topics such as access management, encryption, and Kubernetes security. These are all important concepts for a Security Engineer to have a solid understanding of.
Information Security Manager
An Information Security Manager is responsible for developing and implementing an organization's information security program. They work with other IT staff to ensure that the organization's computer systems and networks are secure from outside threats. This course may be useful for an Information Security Manager who wants to specialize in cloud security. The course covers topics such as access management, encryption, and Kubernetes security. These are all important concepts for an Information Security Manager to have a solid understanding of.
Compliance Officer
A Compliance Officer ensures that an organization complies with all applicable laws and regulations. They work with other staff to develop and implement policies and procedures to ensure compliance. This course may be useful for a Compliance Officer who wants to specialize in cloud security. The course covers topics such as access management, encryption, and Kubernetes security. These are all important concepts for a Compliance Officer to have a solid understanding of.
Security Consultant
Security Consultants protect their client's data and computer systems from unauthorized access. They identify vulnerabilities in a system's software, hardware, or network. Security Consultants also develop security policies and procedures and provide training to employees on security awareness. This course may be useful for a budding Security Consultant, as it delves into the specifics of Cloud Storage controls, API access controls, and encryption. These are all important aspects of security that a Security Consultant should be familiar with.
IT Manager
An IT Manager plans, implements, and manages an organization's IT infrastructure. They work with other IT staff to ensure that the organization's computer systems and networks are running smoothly. This course may be useful for an IT Manager who wants to specialize in cloud security. The course covers topics such as access management, encryption, and Kubernetes security. These are all important concepts for an IT Manager to have a solid understanding of.
Risk Manager
A Risk Manager identifies and assesses risks to an organization's computer systems and networks. They work with other IT staff to develop and implement measures to mitigate these risks. This course may be useful for a Risk Manager who wants to specialize in cloud security. The course covers topics such as access management, encryption, and Kubernetes security. These are all important concepts for a Risk Manager to have a solid understanding of.
Information Security Analyst
An Information Security Analyst safeguards an organization's computer systems and networks from outside threats. They monitor networks for suspicious activity, investigate security breaches, and develop and implement security measures. This course may be useful for an aspiring Information Security Analyst, as they would gain insights into encryption, access management, and assessing a system's security posture in a Google Cloud environment.
Software Developer
Software Developers design, develop, and test software applications. They work with clients to determine their needs and then design and implement a software solution that meets those needs. This course may be useful for a Software Developer who wants to specialize in cloud security. The course covers topics such as access management, encryption, and Kubernetes security. These are all important concepts for a Software Developer to have a solid understanding of.
Forensic Accountant
A Forensic Accountant investigates financial crimes, such as fraud and embezzlement. They use their accounting skills to analyze financial records and identify evidence of wrongdoing. This course may be useful for a Forensic Accountant who wants to specialize in cloud security. The course covers topics such as access management, encryption, and Kubernetes security. These are all important concepts for a Forensic Accountant to have a solid understanding of.
Auditor
An Auditor reviews an organization's financial records and other documents to ensure that they are accurate and comply with all applicable laws and regulations. This course may be useful for an Auditor who wants to specialize in cloud security. The course covers topics such as access management, encryption, and Kubernetes security. These are all important concepts for an Auditor to have a solid understanding of.
DevOps Engineer
A DevOps Engineer works with software developers and IT staff to ensure that software is developed and deployed efficiently. They also work to automate and streamline the software development process. This course may be useful for a DevOps Engineer, as it covers topics such as access management, encryption, and Kubernetes security. These are all important aspects of DevOps that can help an engineer improve their skills and knowledge.
Data Scientist
A Data Scientist collects, analyzes, and interprets data to help organizations make better decisions. They use statistical and machine learning techniques to identify trends and patterns in data. This course may be useful for a Data Scientist who wants to specialize in cloud security. The course covers topics such as access management, encryption, and Kubernetes security. These are all important concepts for a Data Scientist to have a solid understanding of.
Quality Assurance Analyst
A Quality Assurance Analyst tests software applications to ensure that they meet the requirements of the client. They also work to identify and fix bugs in software. This course may be useful for a Quality Assurance Analyst who wants to specialize in cloud security. The course covers topics such as access management, encryption, and Kubernetes security. These are all important concepts for a Quality Assurance Analyst to have a solid understanding of.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Best Practices in Google Cloud en Français.
Provides a comprehensive overview of cloud security, covering topics such as cloud security architecture, cloud security controls, and cloud security best practices. It valuable resource for anyone looking to improve their understanding of cloud security.
Provides a unique perspective on security by examining the human element of security. It covers topics such as social engineering, phishing, and identity theft. It valuable resource for anyone looking to improve their understanding of security from a human perspective.
Classic in the field of application security and offers timeless advice on securing web applications.
Provides a rigorous and comprehensive treatment of security engineering principles and best practices.
Provides a comprehensive overview of the Innovator's Dilemma, which theory that explains why large companies often fail to innovate. It valuable resource for anyone looking to learn about the challenges of innovation.
Provides a comprehensive overview of DevOps, covering topics such as DevOps culture, DevOps practices, and DevOps tools. It valuable resource for anyone looking to improve their understanding of DevOps.
Provides a fictionalized account of a DevOps transformation. It valuable resource for anyone looking to learn about DevOps in a practical and engaging way.
Provides a comprehensive overview of the Lean Startup methodology, which customer-centric approach to building successful businesses. It valuable resource for anyone looking to learn about Lean Startup principles.
Hacking Exposed provides a broad overview of network security vulnerabilities and a variety of applicable solutions. valued classic in the field.
Offers an accessible overview of network security assessment methodologies, tools, and best practices.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security Best Practices in Google Cloud en Français.
Managing Security in Google Cloud en Français
Most relevant
Essential Cloud Infrastructure: Core Services en Français
Most relevant
Trust and Security with Google Cloud - Français
Most relevant
Faire preuve de prudence : gestion des risques de sécurité
Most relevant
Ressources numériques, menaces et vulnérabilités
Most relevant
Tirer la sonnette d'alarme : détection et réponse
Most relevant
Google Cloud Product Fundamentals en Français
Most relevant
Architecting with Google Kubernetes Engine: Workloads en...
Most relevant
Reliable Cloud Infrastructure: Design and Process en...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser