Save for later

Leveraging Google Cloud Armor, Security Scanner and the Data Loss Prevention API

Google: Professional Cloud Architect,

Recent years have witnessed a steady increase in the number of reported instances of data being compromised, stolen and even sold for ransom. In this course, Leveraging Google Cloud Armor, Security Scanner and the Data Loss Prevention API, you will gain the ability to mitigate threats of DDoS attacks using Cloud Armor, scan your App Engine and Compute Engine web apps using Security Scanner, enforce audit rules using Forseti and use the Data Loss Prevention API to control access to sensitive data. First, you will learn how to use Cloud Armor to mitigate the threat of DDoS attacks directed at your HTTP(S) load balanced applications. Cloud Armor will enforce these rules at the edge of the Google network and prevent unwanted requests from permeating into the interior of your VPC network. Next, you will discover how to use the Security Scanner to identify potential vulnerabilities in your App Engine and Compute Engine web apps. These currently include checks for cross-site scripting, flash injection, mixed content, clear-text passwords, invalid headers and the use of outdated libraries. This list of vulnerabilities is constantly being added to, which means that your Security Scanner reports will change and get richer and better over time. You will also use Forseti, a third-party tool that is used to conduct security audits of IAM policies and compare the actual and desired state of system resources. Finally, you will explore how to use the Data Loss Prevention API to control access to sensitive data. The DLP API has a long list of country-specific types of sensitive data type - US Social Security Numbers and the tax identifiers of several countries. The API has built-in detectors to return probabilities that a given data item matches a certain type of sensitive data. It is also possible to add custom detectors, and to use powerful techniques for redaction and de-identification of such data. When you’re finished with this course, you will have the skills and knowledge of various security auditing and protection services to protect against DDoS attacks, as well as identify vulnerabilities in your apps and project settings to help identify and protect sensitive data.

Get Details and Enroll Now

OpenCourser is an affiliate partner of Pluralsight and may earn a commission when you buy through our links.

Get a Reminder

Send to:
Rating Not enough ratings
Length 2.2 hours
Starts On Demand (Start anytime)
Cost $35/month (Access to entire library- free trial available)
From Pluralsight
Instructor Janani Ravi
Download Videos On Windows, MacOS, iOS, and Android Pluralsight app
Language English
Tags Software Development Cloud Platforms

Get a Reminder

Send to:

Similar Courses

Careers

An overview of related careers and their average salaries in the US. Bars indicate income percentile.

Traffic Studies Specialist - Nonsafety Sensitive $53k

Pharmacy Data Steward $64k

Data/Operations Analyst $66k

Publisher Data Specialist $77k

Data analyst/ Data modeling/Technical Designer $84k

Senior Analyst - Loss Sensitive Analyst $87k

Spend Data Analyst $94k

Data Migration and Deployment $94k

Consulting Data Scientist $96k

Data Analyst, Analytics and Data Mining Manager $107k

Data Base Designer and Data Administrator $124k

Staff Data Developer $168k

Write a review

Your opinion matters. Tell us what you think.

Rating Not enough ratings
Length 2.2 hours
Starts On Demand (Start anytime)
Cost $35/month (Access to entire library- free trial available)
From Pluralsight
Instructor Janani Ravi
Download Videos On Windows, MacOS, iOS, and Android Pluralsight app
Language English
Tags Software Development Cloud Platforms

Similar Courses

Sorted by relevance

Like this course?

Here's what to do next:

  • Save this course for later
  • Get more details from the course provider
  • Enroll in this course
Enroll Now