We may earn an affiliate commission when you visit our partners.
Janani Ravi

This course focuses on the design and implementation of security scanning, protection against Distributed Denial of Service (DDoS) attacks and security auditing. The course also covers the use of the Data Loss Prevention API in protecting sensitive data.

Read more

This course focuses on the design and implementation of security scanning, protection against Distributed Denial of Service (DDoS) attacks and security auditing. The course also covers the use of the Data Loss Prevention API in protecting sensitive data.

Recent years have witnessed a steady increase in the number of reported instances of data being compromised, stolen and even sold for ransom.

In this course, Leveraging Google Cloud Armor, Security Scanner and the Data Loss Prevention API, you will gain the ability to mitigate threats of DDoS attacks using Cloud Armor, scan your App Engine and Compute Engine web apps using Security Scanner, enforce audit rules using Forseti and use the Data Loss Prevention API to control access to sensitive data.

First, you will learn how to use Cloud Armor to mitigate the threat of DDoS attacks directed at your HTTP(S) load balanced applications. Cloud Armor will enforce these rules at the edge of the Google network and prevent unwanted requests from permeating into the interior of your VPC network.

Next, you will discover how to use the Security Scanner to identify potential vulnerabilities in your App Engine and Compute Engine web apps. These currently include checks for cross-site scripting, flash injection, mixed content, clear-text passwords, invalid headers and the use of outdated libraries. This list of vulnerabilities is constantly being added to, which means that your Security Scanner reports will change and get richer and better over time. You will also use Forseti, a third-party tool that is used to conduct security audits of IAM policies and compare the actual and desired state of system resources.

Finally, you will explore how to use the Data Loss Prevention API to control access to sensitive data. The DLP API has a long list of country-specific types of sensitive data type - US Social Security Numbers and the tax identifiers of several countries. The API has built-in detectors to return probabilities that a given data item matches a certain type of sensitive data. It is also possible to add custom detectors, and to use powerful techniques for redaction and de-identification of such data.

When you’re finished with this course, you will have the skills and knowledge of various security auditing and protection services to protect against DDoS attacks, as well as identify vulnerabilities in your apps and project settings to help identify and protect sensitive data.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Using Cloud Armor to Protect Against DDoS Attacks
Using Cloud Security Scanner to Identify App Vulnerabilities
Using the Cloud Data Loss Prevention (DLP) API for Data Protection
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Appropriate for learners with experience in IT security
Covers DDoS protection, web app vulnerability identification, and data loss prevention, which are relevant topics in IT security
Offers hands-on labs for practical implementation of security measures
Led by industry experts specializing in security measures and technologies
Teaches advanced techniques for identifying and mitigating security vulnerabilities in web applications
Suitable for individuals interested in enhancing their skills in web security and data protection

Save this course

Save Leveraging Google Cloud Armor, Security Scanner and the Data Loss Prevention API to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Leveraging Google Cloud Armor, Security Scanner and the Data Loss Prevention API with these activities:
Organize your learning resources
Maximize your learning by keeping track of all relevant course materials and organizing them effectively.
Show steps
  • Create a dedicated folder or notebook
  • Categorize materials
  • Store all materials in one central location
Locate a mentor
Make connections with experts in the field to guide you through your learning journey.
Show steps
  • Attend meetups and industry events
  • Reach out to potential mentors via email or LinkedIn
  • Develop a mentoring relationship
Review Networking
Refresh your knowledge of networking fundamentals and terminology using online tutorials or articles.
Browse courses on Cloud Networking
Show steps
  • Revise OSI model
  • Go through IP addressing and subnetting
  • Look up networking protocols
Six other activities
Expand to see all activities and additional details
Show all nine activities
Participate in Q&A forum
Access and scan through previous questions & answers to get an understanding of common errors and solutions.
Show steps
  • Register in Q&A forum
  • Review previous discussion threads
  • Ask questions in the forum
Scan your web apps for vulnerabilities
Get hands-on experience with the Security Scanner by scanning your own web apps.
Show steps
  • Create a Compute Engine instance
  • Deploy a test web app on the instance
  • Scan the app with Security Scanner
  • Review results to identify vulnerabilities
Build a simple dashboard
Practice your skills by building a dashboard to visualize DDoS attack data and security scan results.
Show steps
  • Design the dashboard
  • Choose a data visualization tool
  • Connect to the necessary data sources
  • Create visualizations
  • Deploy and share dashboard
Contribute to open-source security projects
Engage in real-world projects and expand your skills by contributing to open-source security repositories.
Show steps
  • Identify open-source security projects
  • Review project documentation
  • Make contributions to the project
Become a mentor
Help solidify your understanding by mentoring other students and answering their questions.
Show steps
  • Join a mentoring group
  • Review mentoring materials
  • Become a mentor and help other students
Present your findings
Consolidate your knowledge by creating a presentation that showcases your understanding of DDoS attacks and security scanning.
Show steps
  • Gather your data
  • Analyze your findings
  • Create your presentation
  • Practice your presentation
  • Deliver your presentation

Career center

Learners who complete Leveraging Google Cloud Armor, Security Scanner and the Data Loss Prevention API will develop knowledge and skills that may be useful to these careers:
Cloud Security Engineer
Cloud Security Engineers are responsible for securing cloud-based infrastructure and applications. They use their knowledge of cloud computing platforms and security best practices to protect data, systems, and applications in the cloud. This course could be a valuable resource for Cloud Security Engineers as it provides an overview of security auditing, protection against DDoS attacks, and data protection, which are essential skills for this role.
Network Security Engineer
Network Security Engineers are responsible for designing, implementing, and maintaining the security of computer networks and systems. They use various tools and techniques to identify, assess, and mitigate potential threats and vulnerabilities. This course may be particularly useful for Network Security Engineers as it covers topics such as using Cloud Armor to protect against DDoS attacks, using Cloud Security Scanner to identify app vulnerabilities, and using the Cloud Data Loss Prevention (DLP) API for data protection.
Security Architect
Security Architects design and implement security solutions to protect an organization's information assets from unauthorized access, use, disclosure, disruption, modification, or destruction. They use their knowledge of security best practices and technologies to develop and implement security policies and procedures. This course may be beneficial for Security Architects as it provides an overview of security scanning, protection against DDoS attacks, and security auditing.
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's information assets from unauthorized access, use, disclosure, disruption, modification, or destruction. They use various tools and techniques to identify, assess, and mitigate potential threats and vulnerabilities. This course may be beneficial for Information Security Analysts as it provides an overview of security scanning, protection against DDoS attacks, and security auditing.
Security Manager
Security Managers are responsible for managing an organization's security program. They develop and implement security policies and procedures, and they oversee the organization's security operations. This course may be beneficial for Security Managers as it provides an overview of security scanning, protection against DDoS attacks, and security auditing.
Information Technology Auditor
Information Technology Auditors evaluate an organization's information systems and practices to ensure that they are in compliance with laws and regulations, and that they are protecting the organization's information assets from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be useful for Information Technology Auditors as it provides an overview of security scanning, protection against DDoS attacks, and security auditing.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to protect their information assets from unauthorized access, use, disclosure, disruption, modification, or destruction. They use their knowledge of security best practices and technologies to help organizations develop and implement security policies and procedures. This course may be useful for Security Consultants as it provides an overview of security scanning, protection against DDoS attacks, and security auditing.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain security measures to protect computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. They use various tools and techniques to identify, assess, and mitigate potential threats and vulnerabilities. This course may be helpful for Cybersecurity Engineers as it provides an overview of security scanning, protection against DDoS attacks, and security auditing.
Penetration Tester
Penetration Testers are responsible for testing the security of computer networks and systems to identify vulnerabilities that could be exploited by attackers. They use various tools and techniques to simulate attacks and identify potential weaknesses. This course may be useful for Penetration Testers as it provides an overview of security scanning and protection against DDoS attacks.
Vulnerability Analyst
Vulnerability Analysts are responsible for identifying and assessing vulnerabilities in computer networks and systems. They use various tools and techniques to scan for vulnerabilities and to assess the risk they pose to the organization. This course may be useful for Vulnerability Analysts as it provides an overview of security scanning and protection against DDoS attacks.
Threat Intelligence Analyst
Threat Intelligence Analysts collect and analyze information about threats to an organization's information assets. They use this information to develop and implement strategies to protect the organization from these threats. This course may be useful for Threat Intelligence Analysts as it provides an overview of security scanning and protection against DDoS attacks.
Security Operations Center Analyst
Security Operations Center Analysts are responsible for monitoring and responding to security incidents. They use various tools and techniques to detect and investigate security incidents, and to take action to mitigate the impact of these incidents. This course may be useful for Security Operations Center Analysts as it provides an overview of security scanning and protection against DDoS attacks.
Data Protection Officer
Data Protection Officers are responsible for ensuring that an organization complies with data protection laws and regulations. They develop and implement data protection policies and procedures, and they oversee the organization's data protection practices. This course may be useful for Data Protection Officers as it provides an overview of the Cloud Data Loss Prevention (DLP) API for data protection.
Forensic Analyst
Forensic Analysts investigate computer crimes and security incidents. They use various tools and techniques to collect and analyze evidence, and to develop reports on their findings. This course may be useful for Forensic Analysts as it provides an overview of security scanning and protection against DDoS attacks.
Security Analyst
Security Analysts use their knowledge and expertise in information technology to protect computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. They use various tools and techniques to detect, identify, analyze, and mitigate potential threats and vulnerabilities to the organization's systems and data. This course may be useful for Security Analysts as it provides an overview of security scanning, protection against DDoS attacks, and security auditing, which can help enhance their skills in identifying and mitigating potential threats.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Leveraging Google Cloud Armor, Security Scanner and the Data Loss Prevention API.
Provides a deep dive into the theory and practice of security engineering, covering topics such as security architecture, risk management, and intrusion detection. It valuable resource for anyone looking to gain a deep understanding of security engineering principles.
Provides a comprehensive overview of cloud security, covering topics such as cloud security architecture, security controls, and compliance best practices. It valuable resource for anyone looking to understand and implement cloud security measures.
Provides a comprehensive guide to privacy engineering, covering topics such as privacy principles, privacy-enhancing technologies, and privacy-by-design techniques. It valuable resource for anyone looking to develop data-centric applications with strong privacy protections.
Provides a hands-on approach to software security, covering topics such as software vulnerabilities, software security testing, and software security management. It valuable resource for anyone looking to develop secure software applications.
Provides a comprehensive guide to data governance, covering topics such as data governance frameworks, data governance policies, and data governance tools. It valuable resource for anyone looking to implement effective data governance practices.
Provides a fascinating look into the human element of security, covering topics such as social engineering, phishing, and identity theft. It valuable resource for anyone looking to understand and defend against human-based attacks.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Leveraging Google Cloud Armor, Security Scanner and the Data Loss Prevention API.
Data Loss Prevention: Qwik Start - JSON
Most relevant
Data Loss Prevention: Qwik Start - Command Line
Most relevant
Data Security Champion: Data Loss Prevention
Most relevant
Data Security Champion: SQL Injection and Prevention
Most relevant
Microsoft Purview: Manage and Protect Microsoft 365...
Most relevant
Microsoft Purview: Manage and Protect On-premises Content
Most relevant
File Analysis with LOKI
Most relevant
Real-Time Cyber Threat Detection and Mitigation
Most relevant
Basic Network and Database Security
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser