We may earn an affiliate commission when you visit our partners.
Course image
Google Cloud Training

Neste curso de treinamento autoguiado, os participantes aprendem como mitigar ataques em diversos pontos em uma infraestrutura baseada no Google Cloud, incluindo ataques distribuídos de negação de serviço, ataques de phishing e ameaças que envolvem uso e classificador de conteúdo. Também ensinamos sobre o Security Command Center, o Cloud Logging e a geração de registros de auditoria, além de como usar o Forseti para acessar a conformidade geral das políticas de segurança da sua organização.

Enroll now

What's inside

Syllabus

Bem-vindo ao curso Mitigating Security Vulnerabilities on Google Cloud
Este é o curso Mitigating Security Vulnerabilities on Google Cloud. Nele, vamos dar continuidade aos conceitos fundamentais que abordamos no curso anterior nessa série. Nesta seção, você vai aprender sobre as ferramentas de segurança disponíveis no Google Cloud e como usá-las para diminuir o risco de sofrer ataques maliciosos nos sistemas, software e dados.
Read more
Como se proteger contra ataques distribuídos de negação de serviço (DDoS)
Um ataque distribuído de negação de serviço é uma das principais preocupações atualmente e pode afetar uma empresa de forma significativa se ela não estiver preparada. Neste módulo, vamos começar com uma conversa rápida sobre como funciona um ataque DDOS. Depois, vamos analisar algumas técnicas de mitigação de DDOS oferecidas pelo Google Cloud. Para encerrar, faremos revisão dos produtos complementares de parceiros e um laboratório para você conferir a mitigação de ataques DDOS na prática.
Vulnerabilidades relacionadas a conteúdo: técnicas e práticas recomendadas
Neste módulo, vamos abordar as ameaças contra seu conteúdo. Primeiro, vamos revisar a ameaça ransomware e algumas mitigações para usar no Google Cloud para proteger seus sistemas contra ela. Em seguida, vamos abordar as ameaças relacionadas ao uso indevido de dados e às violações de privacidade e, depois, discutir algumas estratégias de mitigação que podem proteger aplicativos e sistemas.
Monitoramento, geração de registros, auditoria e verificação
Coletar, processar, agregar e exibir em tempo real dados quantitativos ajuda a fornecer entradas brutas sobre as análises dos negócios e facilita a análise de violações de segurança. O Google Cloud oferece vários serviços e recursos para ajudar com isso, é o que veremos neste módulo. Vamos analisar o Cloud Monitoring, o Cloud Logging e os Registros de auditoria do Cloud e, depois, como aproveitar o Forseti Security para monitorar automaticamente os recursos do Google Cloud.
Recursos do curso
Links dos PDFs de todos os módulos

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops key skills needed to protect systems and data from malicious attacks in Google Cloud infrastructure
Taught by Google Cloud Training, recognized experts in cloud security
Covers various types of security threats including distributed denial-of-service (DDoS), phishing, and content misuse
Provides hands-on labs for practical experience in mitigating DDoS attacks
Examines tools like Security Command Center, Cloud Logging, and Forseti for enhanced security management

Save this course

Save Mitigating Security Vulnerabilities on GC - Português to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Mitigating Security Vulnerabilities on GC - Português with these activities:
Practice using Cloud IAM for access control
Gaining proficiency in using Cloud IAM will strengthen your ability to manage user access and permissions effectively, reducing the risk of unauthorized access.
Browse courses on Cloud IAM
Show steps
  • Create roles and permissions to define access levels for different users.
  • Assign roles to users and groups to grant them access to specific resources.
  • Monitor user activity and audit logs to detect any suspicious or unauthorized access attempts.
Analyze Cloud Logging data for security events
Gaining proficiency in analyzing Cloud Logging data will equip you to detect and investigate security incidents more efficiently.
Browse courses on Cloud Logging
Show steps
  • Create custom log filters to identify security-related events.
  • Use the Log Explorer to search and analyze log data for potential threats.
  • Set up alerts based on log filters to receive notifications of security events.
Distinguish between DDoS attack signatures
Practicing to identify different types of DDoS attacks will prepare you to respond appropriately during an actual event.
Browse courses on DDoS
Show steps
  • Review the common signatures of DDoS attacks.
  • Use a network simulator to generate different types of DDoS attacks.
  • Analyze the network traffic to identify the attack signatures.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Configure Cloud Security Command Center for security monitoring
Hands-on experience with Cloud Security Command Center will enhance your ability to monitor and respond to security threats promptly.
Browse courses on Security Monitoring
Show steps
  • Set up Cloud Security Command Center and configure it to monitor your cloud resources.
  • Create custom dashboards and alerts to track key security metrics and receive notifications of security events.
  • Use the threat intelligence feed to stay informed about the latest security risks and vulnerabilities.
Configure and test Cloud Armor
Hands-on experience with Cloud Armor will provide you with the confidence to implement this mitigation technique effectively.
Browse courses on Cloud Armor
Show steps
  • Set up a Cloud Armor instance and configure it according to the recommended settings.
  • Simulate a DDoS attack against your protected resources.
  • Monitor the attack logs and verify that Cloud Armor is effectively mitigating the attack.
Review Cloud Audit Logs for compliance and security
Developing a strong understanding of Cloud Audit Logs will enable you to maintain compliance and enhance the security of your cloud infrastructure.
Browse courses on Cloud Audit Logs
Show steps
  • Enable and configure Cloud Audit Logs for the resources you need to monitor.
  • Analyze Cloud Audit Logs to identify suspicious activities or policy violations.
  • Create custom filters and reports to facilitate compliance audits and security investigations.
Implement Forseti Security for policy management
Hands-on experience with Forseti Security will provide you with the skills to maintain consistent and centralized security policies across your cloud environment.
Browse courses on Forseti Security
Show steps
  • Install and configure Forseti Security according to the best practices.
  • Define custom security policies and assign them to your resources.
  • Use Forseti Security to monitor policy compliance and identify potential security risks.

Career center

Learners who complete Mitigating Security Vulnerabilities on GC - Português will develop knowledge and skills that may be useful to these careers:
Security Analyst
A Security Analyst is responsible for identifying and mitigating security risks. They work to develop and implement security policies and procedures, and they monitor systems for security threats. This course can help you build a foundation in cloud security by teaching you how to mitigate security vulnerabilities on Google Cloud. This knowledge is essential for Security Analysts, as they need to be able to protect their clients' data and systems from security threats.
Cloud Security Engineer
A Cloud Security Engineer is responsible for the security of cloud computing systems. They work to identify and mitigate security risks, and they develop and implement security policies and procedures. This course can help you build a foundation in cloud security by teaching you how to mitigate security vulnerabilities on Google Cloud. This knowledge is essential for Cloud Security Engineers, as they need to be able to protect their clients' data and systems from security threats.
Software Engineer
A Software Engineer is responsible for the design, development, and maintenance of software applications. They work to ensure that software is reliable, scalable, and secure. This course can help you build a foundation in cloud security by teaching you how to mitigate security vulnerabilities on Google Cloud. This knowledge is essential for Software Engineers, as they need to be able to protect their clients' data and systems from security threats.
DevOps Engineer
A DevOps Engineer is responsible for the development and operation of cloud computing systems. They work to ensure that systems are reliable, scalable, and secure. This course can help you build a foundation in cloud security by teaching you how to mitigate security vulnerabilities on Google Cloud. This knowledge is essential for DevOps Engineers, as they need to be able to protect their clients' data and systems from security threats.
Systems Administrator
A Systems Administrator is responsible for the maintenance and operation of computer systems. They work to ensure that systems are reliable, scalable, and secure. This course can help you build a foundation in cloud security by teaching you how to mitigate security vulnerabilities on Google Cloud. This knowledge is essential for Systems Administrators, as they need to be able to protect their clients' data and systems from security threats.
Network Engineer
A Network Engineer is responsible for the design, implementation, and maintenance of computer networks. They work to ensure that networks are reliable, scalable, and secure. This course can help you build a foundation in cloud security by teaching you how to mitigate security vulnerabilities on Google Cloud. This knowledge is essential for Network Engineers, as they need to be able to protect their clients' data and systems from security threats.
Security Operations Center (SOC) Analyst
A Security Operations Center (SOC) Analyst is responsible for monitoring and responding to security events. They work to identify and mitigate security risks, and they develop and implement security policies and procedures. This course may be useful for SOC Analysts who want to learn more about cloud security. The course can help them to understand the different types of security vulnerabilities that can affect cloud computing systems and how to mitigate them.
Technical Support Engineer
A Technical Support Engineer is responsible for providing technical support to customers. They work to resolve customer issues and provide guidance on how to use products and services. This course may be useful for Technical Support Engineers who want to learn more about cloud security. The course can help them to understand the different types of security vulnerabilities that can affect cloud computing systems and how to mitigate them.
Security Consultant
A Security Consultant is responsible for providing security advice to organizations. They work to identify and mitigate security risks, and they develop and implement security policies and procedures. This course may be useful for Security Consultants who want to learn more about cloud security. The course can help them to understand the different types of security vulnerabilities that can affect cloud computing systems and how to mitigate them.
IT Auditor
An IT Auditor is responsible for auditing an organization's information systems. They work to identify and mitigate security risks, and they develop and implement security policies and procedures. This course may be useful for IT Auditors who want to learn more about cloud security. The course can help them to understand the different types of security vulnerabilities that can affect cloud computing systems and how to mitigate them.
Information Security Manager
An Information Security Manager is responsible for the development and implementation of an organization's information security program. They work to identify and mitigate security risks, and they develop and implement security policies and procedures. This course may be useful for Information Security Managers who want to learn more about cloud security. The course can help them to understand the different types of security vulnerabilities that can affect cloud computing systems and how to mitigate them.
Chief Technology Officer (CTO)
A Chief Technology Officer (CTO) is responsible for the overall technology strategy of an organization. They work to identify and implement new technologies that can improve the organization's operations. This course may be useful for CTOs who want to learn more about cloud security. The course can help them to understand the different types of security vulnerabilities that can affect cloud computing systems and how to mitigate them.
Cloud Architect
A Cloud Architect designs, builds, and maintains cloud computing systems. They work with clients to understand their business needs and then design and implement cloud solutions that meet those needs. This course can help you build a foundation in cloud security by teaching you how to mitigate security vulnerabilities on Google Cloud. This knowledge is essential for Cloud Architects, as they need to be able to protect their clients' data and systems from security threats.
Security Engineer
A Security Engineer is responsible for the design, implementation, and maintenance of security systems. They work to identify and mitigate security risks, and they develop and implement security policies and procedures. This course may be useful for Security Engineers who want to learn more about cloud security. The course can help them to understand the different types of security vulnerabilities that can affect cloud computing systems and how to mitigate them.
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is responsible for the overall security of an organization's information systems. They work to develop and implement security policies and procedures, and they oversee the organization's security team. This course may be useful for CISOs who want to learn more about cloud security. The course can help them to understand the different types of security vulnerabilities that can affect cloud computing systems and how to mitigate them.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Mitigating Security Vulnerabilities on GC - Português.
Provides a comprehensive overview of cloud security, covering topics such as cloud security architecture, threat modeling, and incident response. It valuable resource for anyone who wants to learn more about how to protect data in the cloud.
Guide to cloud security engineering, covering the key concepts and techniques for designing and implementing secure cloud solutions.
Provides a comprehensive overview of cloud security, covering topics such as cloud security architecture, threat modeling, and incident response. It valuable resource for anyone who wants to learn more about how to protect data in the cloud.
Provides a comprehensive overview of data privacy and security laws and regulations. It covers topics such as data protection principles, data breach notification laws, and privacy compliance.
Provides a basic overview of cloud security, covering topics such as cloud security architecture, threat modeling, and incident response. It valuable resource for anyone who wants to learn more about the basics of cloud security.
Beginner's guide to network security. It covers a wide range of topics, including network security concepts, security protocols, and security tools.
Practical guide to threat modeling. It covers a wide range of topics, including threat modeling techniques, threat analysis, and risk assessment.
Practical guide to building secure software. It covers a wide range of topics, including security principles, threat modeling, and code security best practices.
Study guide for the CompTIA Security+ SY0-501 exam. It covers a wide range of topics, including security concepts, security tools, and security best practices.
Comprehensive guide to information security management. It covers a wide range of topics, including security management concepts, security policies, and security controls.
Comprehensive guide to cryptography and network security. It covers a wide range of topics, including cryptography concepts, network security protocols, and security tools.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Mitigating Security Vulnerabilities on GC - Português.
Aruba Network Security Basics for Portuguese Speakers
Most relevant
Segurança de TI: Defesa Contra as Artes Obscuras do Mundo...
Most relevant
Google Workspace Mail Management - Português Brasileiro
Most relevant
Segurança de TI: defesa contra as artes negras digitais
Most relevant
Getting Started with Google Kubernetes Engine - Português...
Most relevant
Elastic Cloud Infrastructure: Containers and Services em...
Most relevant
ML Pipelines on Google Cloud - Português
Most relevant
Implementar uma Aplicação Web no Azure Kubernetes Service
Most relevant
Google Cloud Customer Care Fundamentals-Português...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser