We may earn an affiliate commission when you visit our partners.
Course image
Google Cloud Training

この自習式トレーニング コースでは、参加者は、分散型サービス拒否攻撃、フィッシング攻撃、コンテンツの分類と使用に関わる脅威など、Google Cloud ベース インフラストラクチャのさまざまな箇所での攻撃を緩和する方法について学習します。さらに、Security Command Center、Cloud Logging と監査ロギングについて、および Forseti を使って組織のセキュリティ ポリシーへの全体的なコンプライアンスを確認する方法についても学習します。

Enroll now

What's inside

Syllabus

「Mitigating Security Vulnerabilities on Google Cloud」にようこそ
「Mitigating Security Vulnerabilities on Google Cloud」にようこそ。 このコースは、本シリーズの前のコースで取り上げた基礎を土台としています。このセクションでは、Google Cloud の使用時に利用できるセキュリティ ツールについてと、システム、ソフトウェア、データに対する悪意のある攻撃のリスクを軽減する方法について詳しく学びます。
Read more
分散型サービス拒否攻撃(DDoS)からの保護
分散型サービス拒否攻撃は現在、大きな懸念事項となっており、十分な備えをしていないビジネスには甚大な影響を与える可能性があります。このモジュールでは、まず DDoS 攻撃の仕組みについて簡単に説明した後、Google Cloud が提供する DDoS の軽減方法を確認します。 最後に、関連するパートナー プロダクトを確認した後、ラボで、DDoS の軽減手法を実際に適用する例を紹介します。
コンテンツ関連の脆弱性: 手法とベスト プラクティス
このモジュールでは、コンテンツに対する脅威について説明します。まず、ランサムウェアの脅威についてと、システムをランサムウェアから保護するために Google Cloud で利用できるいくつかの軽減手法について確認します。続いて、データの不正使用に関連する脅威とプライバシーの侵害について検討し、アプリケーションとシステムを保護するために利用できるいくつかの軽減戦略について説明します。
モニタリング、ロギング、監査、スキャン
リアルタイムの定量データの収集、処理、集約、表示を行うと、ビジネス分析に未加工の入力を供給でき、セキュリティ侵害の分析を行いやすくなります。Google Cloud には、この点で役立つ多くのサービスと機能が用意されており、このモジュールではその点を扱います。このモジュールでは、Cloud Monitoring と Cloud Logging、Cloud Audit Logs について説明した後、Forseti Security を利用して Google Cloud のリソースを体系的にモニタリングする方法について説明します。

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches how to counteract threats in Google Cloud, including DDoS attacks and content misuse
Develops relevant knowledge and skills for Google Cloud users
Provides practical examples through hands-on labs
Requires some prior knowledge of Google Cloud

Save this course

Save Mitigating Security Vulnerabilities on Google Cloud 日本語版 to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Mitigating Security Vulnerabilities on Google Cloud 日本語版 with these activities:
Review fundamentals of DDoS protection
Review the concepts of DDoS attacks and the techniques used to mitigate them to prepare for the course.
Browse courses on DDoS Protection
Show steps
  • Read articles and documentation on DDoS attacks
  • Experiment with DDoS protection tools in a sandbox environment
Seek guidance from experts in DDoS protection
Connect with professionals in the field to gain additional insights and perspectives on DDoS protection.
Show steps
  • Identify potential mentors through industry events or online platforms
  • Reach out to mentors and request their guidance
  • Schedule regular meetings or video calls to discuss course topics and career advice
Use Forseti Security for policy compliance
Learn how to use Forseti Security to monitor and enforce security policies to complement the course.
Browse courses on Forseti Security
Show steps
  • Read documentation and watch videos on Forseti Security
  • Deploy and configure Forseti Security in a sandbox environment
Two other activities
Expand to see all activities and additional details
Show all five activities
Analyze log data for security events
Practice analyzing log data to identify and respond to security events to enhance the course material.
Browse courses on Log Analysis
Show steps
  • Set up a logging and monitoring system for security events
  • Collect and analyze log data to detect suspicious activity
  • Create alerts and notifications for potential security breaches
Answer questions and provide guidance on course topics
Engage with other students, answer their questions, and provide guidance to reinforce your own understanding and help others.
Show steps
  • Participate in discussion forums and Q&A sessions
  • Provide constructive feedback to peers on assignments and projects
  • Lead study groups or workshops on specific course topics

Career center

Learners who complete Mitigating Security Vulnerabilities on Google Cloud 日本語版 will develop knowledge and skills that may be useful to these careers:
Security Engineer
Security Engineers design and implement security measures to protect computer systems and networks. They need to have a deep understanding of security vulnerabilities and how to mitigate them. This course can help Security Engineers learn about the latest security threats and how to use Google Cloud tools to protect their systems.
Vulnerability Manager
Vulnerability Managers identify and manage security vulnerabilities in computer systems and networks. They need to have a deep understanding of security vulnerabilities and how to mitigate them. This course can help Vulnerability Managers learn about the latest security threats and how to use Google Cloud tools to protect their systems.
Security Operations Analyst
Security Operations Analysts monitor and respond to security incidents. They need to have a deep understanding of security vulnerabilities and how to mitigate them. This course can help Security Operations Analysts learn about the latest security threats and how to use Google Cloud tools to protect their systems.
IT Auditor
IT Auditors assess the security of computer systems and networks. They need to have a deep understanding of security vulnerabilities and how to mitigate them. This course can help IT Auditors learn about the latest security threats and how to use Google Cloud tools to assess the security of their systems.
Information Security Analyst
Information Security Analysts protect computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They need to have a deep understanding of security vulnerabilities and how to mitigate them. This course can help Information Security Analysts learn about the latest security threats and how to use Google Cloud tools to protect their systems.
DevOps Engineer
DevOps Engineers build and maintain software systems. They need to have a strong understanding of security vulnerabilities and how to mitigate them. This course can help DevOps Engineers learn about the latest security threats and how to use Google Cloud tools to protect their systems.
Cybersecurity Analyst
Cybersecurity Analysts protect computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They need to have a deep understanding of security vulnerabilities and how to mitigate them. This course can help Cybersecurity Analysts learn about the latest security threats and how to use Google Cloud tools to protect their systems.
Cloud Architect
Cloud Architects plan, design, and manage cloud computing systems. They need to have a strong understanding of security vulnerabilities and how to mitigate them. This course can help Cloud Architects build a foundation in security best practices and learn how to use Google Cloud tools to protect their systems.
Software Engineer
Software Engineers design and develop software systems. They need to have a strong understanding of security vulnerabilities and how to mitigate them. This course can help Software Engineers learn about the latest security threats and how to use Google Cloud tools to protect their systems.
System Administrator
System Administrators manage computer systems and networks. They need to have a strong understanding of security vulnerabilities and how to mitigate them. This course can help System Administrators learn about the latest security threats and how to use Google Cloud tools to protect their systems.
Network Administrator
Network Administrators manage computer networks. They need to have a strong understanding of security vulnerabilities and how to mitigate them. This course can help Network Administrators learn about the latest security threats and how to use Google Cloud tools to protect their networks.
Security Architect
Security Architects design and implement security measures to protect computer systems and networks. They need to have a deep understanding of security vulnerabilities and how to mitigate them. This course may be useful for Security Architects who want to learn how to use Google Cloud tools to protect their systems.
Data Analyst
Data Analysts collect, clean, and analyze data to help businesses make informed decisions. They need to be able to protect sensitive data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help Data Analysts learn about data security best practices and how to use Google Cloud tools to protect their data.
IT Manager
IT Managers oversee the IT operations of an organization. They need to have a strong understanding of security vulnerabilities and how to mitigate them. This course may be useful for IT Managers who want to learn how to use Google Cloud tools to protect their organization's IT infrastructure.
Database Administrator
Database Administrators manage databases. They need to have a strong understanding of security vulnerabilities and how to mitigate them. This course may be useful for Database Administrators who want to learn how to use Google Cloud tools to protect their databases.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Mitigating Security Vulnerabilities on Google Cloud 日本語版.
Provides a solid foundation in information security for professional system administrators and developers.
Provides detailed guidance on cloud security best practices and includes case studies on how cloud security has been implemented by several large enterprises.
Thoroughly explains what a DDoS attack is, what it can do, and what you can do to protect your systems from being compromised by one. While this book is somewhat focused on network-layer DDoS attacks, it does touch on application-layer DDoS attacks as well.
A widely-used textbook on the subject of network security, this book covers fundamental network security theories and principles and discusses network security standards and protocols.
Covers practical techniques for security analysis of real-world systems. This book provides a solid foundation in network and software security.
Provides a good overview of cloud computing concepts, technologies, and architectures. A useful resource for understanding the essentials of cloud computing.
Takes a very practical approach to software security. Useful for those interested in the fundamentals of application security or for those interested in learning professional penetration testing techniques.
Classic text for those interested in web application security, having introduced several popular penetration testing techniques.
Collection of security research papers on cloud computing. A very technically-oriented book on security in the cloud, this book may be of interest to those involved in research or securing cloud-based systems in complex, demanding environments.
Introduces the reader to the history of cryptography and the mathematics behind some of the more common encryption algorithms. This book may be useful as a reference for those interested in a deeper dive into cryptography.
Cloud Computing Security: Foundations, Implementation, and Challenges details the technologies and best practices for securing cloud services. This very technical book for a specialist audience.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Mitigating Security Vulnerabilities on Google Cloud 日本語版.
セキュア ソフトウェア開発:要件、設計、再利用
Most relevant
セキュア ソフトウェア開発:検証、専門的トピック
Most relevant
セキュア ソフトウェア開発:実装
Most relevant
Google Workspace Mail Management 日本語版
Most relevant
5. アセット、脅威、そして脆弱性
Most relevant
高卒ニートの僕が6ヶ月でTOEIC960点取った具体的な勉強法【実践編】
Most relevant
英語のひとことフレーズ555選
Most relevant
Google Slides 日本語版
Most relevant
AIってなんだ。 イメージで理解しておきたい人のための超入門講座
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser