We may earn an affiliate commission when you visit our partners.
Course image
Google Cloud Training

Dans ce cours en auto-formation, les participants étudient des solutions d'atténuation des attaques pouvant survenir en de nombreux points d'une infrastructure basée sur Google Cloud, telles que des attaques par déni de service distribué (DDoS) ou par hameçonnage, ou des menaces liées à la classification et à l'utilisation de contenu. Ils découvriront également Security Command Center, Cloud Logging et les journaux d'audit, ainsi que l'utilisation de Forseti pour connaître l'état de conformité global avec les stratégies de sécurité de l'organisation.

Enroll now

Two deals to help you save

We found two deals and offers that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Bienvenue dans le cours "Mitigating Security Vulnerabilities on Google Cloud"
Bienvenue dans le cours "Mitigating Security Vulnerabilities on Google Cloud". Dans ce cours, nous allons nous appuyer sur les bases établies dans les cours précédents de cette série. Dans cette section, vous allez en apprendre davantage sur les outils de sécurité disponibles avec Google Cloud. Vous découvrirez également comment les exploiter pour réduire le risque d'attaque malveillante contre vos systèmes, vos logiciels et vos données.
Read more
Se protéger contre les attaques par déni de service distribué (DDoS)
Les attaques par déni de service distribué constituent une préoccupation majeure à l'heure actuelle. Elles peuvent avoir de très lourdes conséquences sur les entreprises qui n'y sont pas bien préparées. Dans ce module, nous commencerons par une brève discussion sur le fonctionnement des attaques DDoS, puis nous examinerons quelques techniques d'atténuation de ces attaques fournies par Google Cloud. Pour finir, nous passerons en revue les produits partenaires supplémentaires avant d'effectuer un atelier dans lequel vous pourrez voir à l'œuvre quelques mesures de protection contre les attaques DDoS.
Failles liées au contenu : techniques et bonnes pratiques
Ce module aborde les menaces ciblant votre contenu. Tout d'abord, nous examinons la menace que représentent les rançongiciels, et certaines des techniques de protection de vos systèmes que vous pouvez utiliser dans Google Cloud. Nous examinerons ensuite les menaces liées à l'usage abusif des données et au non-respect de la confidentialité, et nous aborderons quelques stratégies d'atténuation pouvant être exploitées pour protéger vos applications et vos systèmes.
Surveillance, journalisation, audits et analyses
La collecte, le traitement, l'agrégation et l'affichage de données quantitatives en temps réel sont utiles pour alimenter les analyses commerciales en données brutes et faciliter l'analyse des brèches de sécurité. Google Cloud fournit de nombreux services et fonctionnalités pour vous aider dans cette tâche, et c'est précisément ce que nous aborderons dans ce module. Nous explorerons Cloud Monitoring, Cloud Logging et Cloud Audit Logs, puis nous verrons comment exploiter Forseti Security pour surveiller vos ressources Google Cloud de manière systématique.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores security methods used by Google Cloud, making the course relevant to Google Cloud users
Suitable for intermediate learners who have a base-level understanding of Google Cloud
Provides practical tips and techniques for mitigating DDoS attacks, assisting in risk management
Examines methods to protect against content-based threats, enhancing data security awareness
Emphasizes monitoring, logging, auditing, and analysis for robust security measures, fostering best practices
Involves hands-on labs and interactive materials, promoting active learning

Save this course

Save Mitigating Security Vulnerabilities on Google Cloud en Français to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Mitigating Security Vulnerabilities on Google Cloud en Français with these activities:
Refresher: Google Cloud Core Concepts
Review the fundamental concepts of Google Cloud to refresh your knowledge and enhance your understanding of the course content.
Browse courses on Google Cloud
Show steps
  • Visit Google Cloud documentation
  • Review the Google Cloud Architecture Center
Review Logging and Auditing Concepts
Reacquaint yourself with logging and auditing practices to enhance your learning.
Browse courses on Logging
Show steps
  • Revisit tutorials or documentation on logging and auditing.
  • Practice writing sample log entries and audit trails.
Recall Key Concepts of Content Protection
Refresh your memory on content protection to enhance your understanding of threats and countermeasures.
Show steps
  • Review course materials or external resources on content protection.
  • Identify the different types of content threats and their potential impact.
  • Recall the best practices for preventing and mitigating these threats.
13 other activities
Expand to see all activities and additional details
Show all 16 activities
Connect with Google Cloud Experts
Enhance your learning journey by connecting with experienced Google Cloud professionals who can provide guidance and support.
Show steps
  • Join Google Cloud communities and forums
  • Attend Google Cloud events and meetups
Review basic security concepts
Refresh your understanding of basic security concepts to prepare for the course.
Browse courses on Security Fundamentals
Show steps
  • Review notes or textbooks on security concepts.
  • Take practice quizzes or tests on security fundamentals.
Create a Consolidated Resource Hub
Organize your course materials for easy access and reinforcement.
Show steps
  • Gather all relevant course notes, assignments, and resources.
  • Organize the materials logically into appropriate categories or sections.
  • Consider using digital tools or cloud storage for accessibility and collaboration.
DDoS Protection Tutorial
Enhance your comprehension of DDoS attacks and mitigation techniques by following interactive tutorials provided by Google Cloud.
Browse courses on DDoS Protection
Show steps
  • Complete the DDoS Protection Lab
  • Explore the Google Cloud DDoS Protection documentation
Collaborate with Peers on Security Monitoring and Analysis
Foster your monitoring and analysis skills by engaging in group discussions.
Show steps
  • Join or form a study group with fellow students.
  • Discuss Security Command Center, Cloud Logging, and audit logs.
  • Analyze real-world security scenarios and develop mitigation strategies together.
Configure Cloud Logging and Security Command Center
Practice configuring essential security tools to gain hands-on experience.
Browse courses on Cloud Logging
Show steps
  • Access the Cloud Logging dashboard and explore its features.
  • Configure log filters and sinks to collect relevant security logs.
  • Enable Security Command Center and review its dashboard.
Implement DDoS Protection Measures
Reinforce your understanding of DDoS protection techniques by applying them in practice.
Show steps
  • Review the provided DDoS attack scenarios.
  • Implement the appropriate protection measures based on the scenarios.
  • Test your implemented measures against the scenarios.
Explore Forseti Security for compliance management
Understand how Forseti Security can assist with compliance management.
Browse courses on Forseti Security
Show steps
  • Follow the Google Cloud tutorial on using Forseti Security.
  • Explore Forseti Security's features and documentation.
Explore Detection and Remediation Techniques for Content-Based Threats
Enhance your knowledge of content-based threat mitigation by following online tutorials.
Show steps
  • Identify reputable tutorials on content-based threat detection and remediation.
  • Follow the tutorials thoroughly, taking notes and experimenting with the concepts.
  • Apply the techniques learned to practical scenarios to test your understanding.
Hands-on Lab: Configuring Security Logging and Monitoring
Reinforce your understanding of security logging and monitoring by completing hands-on exercises provided by Google Cloud.
Browse courses on Security Logging
Show steps
  • Configure Cloud Logging and Security Command Center
  • Create alerts and notifications for security events
Explore Advanced Monitoring and Threat Detection Techniques
Expand your knowledge of security monitoring and threat detection by delving into advanced techniques.
Show steps
  • Identify online tutorials or resources on advanced monitoring techniques.
  • Follow the tutorials to learn about specific tools, configurations, and strategies.
  • Implement the techniques in your own environment or simulate scenarios to test your understanding.
Case Study: Protecting Your Application from Content-Based Attacks
Apply your understanding of content-based threats by creating a case study that demonstrates how to safeguard your applications.
Browse courses on Content Security
Show steps
  • Identify potential content-based threats
  • Research Google Cloud solutions for protection
  • Design a security architecture for content protection
Develop a Comprehensive Security Audit Report
Demonstrate your auditing abilities by creating a thorough security audit report.
Show steps
  • Familiarize yourself with Forseti Security.
  • Conduct a comprehensive security audit using Forseti Security.
  • Generate a detailed report outlining your findings and recommendations.

Career center

Learners who complete Mitigating Security Vulnerabilities on Google Cloud en Français will develop knowledge and skills that may be useful to these careers:
Security Analyst
Security Analysts identify and protect computer systems and networks from security breaches and cyber threats. Vulnerabilities on Google Cloud may be shielded from in part through the security tools learned in the Cloud solutions taught in this course (fit score: 30).
Cloud Security Engineer
Cloud Security Engineers ensure the security of cloud-based systems and applications. This course may provide some of the knowledge needed to keep Google Cloud systems and applications more secure (fit score: 25).
Security Architect
Security Architects design and implement security solutions that protect computer systems and networks from cyber threats. They also develop and enforce security policies and procedures. This course may offer helpful knowledge in terms of mitigation risks from Google Cloud (fit score: 25).
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain security systems and protocols to protect computer systems and networks from cyberattacks. They also mitigate the effects of security breaches and cyber threats. This course teaches tools and techniques to use Google Cloud (fit score: 20).

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Mitigating Security Vulnerabilities on Google Cloud en Français.
Provides additional coverage of some of the topics of this course, especially as they relate to the Google Cloud Certified Associate Cloud Engineer certification exam.
Is used as a textbook at academic institutions or by industry professionals and will provide a deeper understanding of the human aspects of security.
Provides a comprehensive overview of cloud security, including the risks and challenges of cloud computing, as well as best practices for securing cloud environments. It covers a wide range of topics, including identity and access management, data protection, network security, and incident response.
Provides a comprehensive overview of security engineering. It covers a wide range of topics, including system security, network security, application security, and incident response.
Provides a comprehensive overview of cloud computing. It covers a wide range of topics, including cloud computing architectures, cloud security, and cloud applications.
Will help you to understand the security challenges of cloud computing and how to protect your data and applications.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Mitigating Security Vulnerabilities on Google Cloud en Français.
Traitement d'images : segmentation et caractérisation
Most relevant
La cybersécurité en milieu universitaire
Most relevant
Introduction à l'analyse de données à l'aide d'Excel
Most relevant
Serverless Data Analysis with Google BigQuery and Cloud...
Most relevant
Elastic Cloud Infrastructure: Containers and Services en...
Most relevant
Architecting with Google Kubernetes Engine: Production en...
Most relevant
Cities are back in town : sociologie urbaine pour un...
Most relevant
Responsible AI for Developers: Fairness & Bias - Français
Most relevant
Sécurité des TI : Défense contre les pratiques sombres du...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser