We may earn an affiliate commission when you visit our partners.
Course image
Google Cloud Training

Google Workspace Security is the third course in the Google Workspace Administration series.

Read more

Google Workspace Security is the third course in the Google Workspace Administration series.

In this course you will focus on the various aspects of Google Workspace Security including user password policies and how to enable and enforce two step verification (2SV) for your users. You will learn about application security and understand how to whitelist and block API access to your account. You will see how Google Workspace can easily be integrated with a number of predefined 3rd party applications. You will also become familiar with the SSO options in Google Workspace. Finally you will understand how to spot potential security risks within your organization and learn how to address them using the tools available in the admin console.

Enroll now

Two deals to help you save

We found two deals and offers that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Google Workspace Security
In this course you will focus on the various aspects of Google Workspace security including user password policies and how to enable and enforce two step verification (2SV) for your users. You will learn about application security and understand how to whitelist and block API access to your account. You will see how Google Workspace can easily be integrated with a number of predefined 3rd party applications. You will also become familiar with the SSO options in Google Workspace. Finally you will understand how to spot potential security risks within your organization and learn how to address them using the tools available in the admin console.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Taught by Google Cloud Training, a provider recognized for their expertise in cloud computing
Provides a comprehensive overview of Google Workspace security features, including user password policies and two-step verification
Covers how to integrate Google Workspace with third-party applications, making it a valuable resource for organizations that rely on multiple tools
Designed for administrators responsible for managing Google Workspace security, ensuring that organizations can effectively protect their data and systems
Part of the Google Workspace Administration series, providing a deeper understanding of Google Workspace's administrative features
Requires familiarity with Google Workspace administration, so it may not be suitable for beginners

Save this course

Save Google Workspace Security to your list so you can find it easily later:
Save

Reviews summary

Informative google workspace security course

Learners say this course on Google Workspace Security is largely positive. Excellent, informative, and helpful are common reactions to this course. Reviews mention a great course structure, engaging assignments, and knowledgeable instructors. Students say that this course is easy to follow and well received. They appreciate the practical exercises and real-world application of skills.
Easy to Understand
"This course is very simple and easy course for beginners."
"Very easy setup & configuration."
"Very easy to follow."
Informative and Engaging
"Great way to understand G Suite Security"
"Adorei, curso oficial, muito bom."
"D​etailed Google Workspace Security Contents."
Limited Functionality in Trial Version
"No longer matches the admin center. Needs a lot of correction!"
"Course is great but many functions is limited in my version of Gsuite"
"Security Dashboard, Health Center and Security Tools are not visible any more"
Some Outdated Information
"The course is not up to date with Google changes"
"Some dated material, but good over-view."
"Security Dashboard, health page and investigation tools are not available using the trial."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Google Workspace Security with these activities:
Practice whitelisting and blocking API access
Review your current API security measures and adjust as necessary to improve your security posture.
Browse courses on API Access
Show steps
  • Review your current API security settings.
  • Identify any potential vulnerabilities or weaknesses.
  • Implement additional security measures to address any vulnerabilities.
  • Test your new security measures to ensure they are working correctly.
Practice enabling Two-Step Verification (2SV)
Ensure that you clearly understand how to enable 2SV for users by actually practicing it once.
Browse courses on Two-Factor Authentication
Show steps
  • Identify a user account that you can use for testing.
  • Enable 2SV for the test account.
  • Verify that 2SV is working correctly for the test account.
  • Disable 2SV for the test account.
Enable and enforce two step verification (2SV) for users
Ensure that your users have strong passwords and are using two-factor authentication to protect their accounts.
Show steps
Five other activities
Expand to see all activities and additional details
Show all eight activities
Read Google's documentation on API access control
Supplement your knowledge on API access control in Google Workspace.
Browse courses on API Access Control
Show steps
  • Visit the Google Developers website.
  • Read the documentation on API access control.
  • Complete the API access control tutorial.
Create a security plan for your organization
Develop a comprehensive plan to protect your organization from security threats.
Show steps
  • Identify your organization's security risks.
  • Develop a plan to mitigate those risks.
  • Implement your plan and monitor its effectiveness.
Create a list of security best practices
Synthesize the key security practices you learn in this course into an accessible format for future reference.
Browse courses on Security Best Practices
Show steps
  • Identify commonly used security best practices.
  • Research security best practices specific to Google Workspace.
  • Compile a list of security best practices.
Create a security plan for your organization
Apply what you learn in this course by creating a security plan that is tailored to your own organization's needs.
Browse courses on Security Policy
Show steps
  • Identify the security risks that your organization faces.
  • Develop a plan to mitigate these risks.
  • Implement the security plan.
  • Monitor the effectiveness of the security plan.
Deliver a presentation on Google Workspace security
Develop your presentation and communication skills by delivering a presentation on Google Workspace security to your team or colleagues.
Browse courses on Google Workspace Security
Show steps
  • Develop a presentation outline.
  • Create presentation slides.
  • Practice delivering the presentation.
  • Deliver the presentation.

Career center

Learners who complete Google Workspace Security will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts plan and carry out security measures to protect an organization's computer networks and systems. This course will allow you to understand the principles of information security and risk management and enable you to identify, analyze, and respond to security threats and risks. It will also help you gain the skills necessary to effectively manage and secure an organization's information systems and assets.
Security Architect
Security Architects design, implement, and maintain security systems to protect an organization's computer networks and systems. This course will provide you with the knowledge and skills needed to assess security risks, design and implement security solutions, and manage security operations. It will also give you an understanding of the latest security trends and technologies.
Security Engineer
Security Engineers design, implement, and maintain security systems to protect an organization's computer networks and systems. This course will provide you with the knowledge and skills needed to assess security risks, design and implement security solutions, and manage security operations. It will also give you an understanding of the latest security trends and technologies.
Network Security Engineer
Network Security Engineers design, implement, and maintain security systems to protect an organization's computer networks. This course will provide you with the knowledge and skills needed to assess security risks, design and implement security solutions, and manage security operations. It will also give you an understanding of the latest security trends and technologies.
Security Program Manager
Security Program Managers manage and oversee an organization's security program. This course will provide you with the knowledge and skills needed to develop and implement a security program, manage security risks, and ensure compliance with security regulations.
Risk Manager
Risk Managers identify, assess, and manage risks to an organization. This course will provide you with a foundational knowledge of information security and risk management. It will teach you how to identify and assess security risks, and how to develop and implement risk management strategies.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to protect their computer networks and systems from security threats and risks. This course will allow you to gain a deep understanding of information security and risk management. It will also give you the skills needed to assess security risks, design and implement security solutions, and manage security operations.
Information Security Manager
Information Security Managers manage and oversee an organization's information security program. This course will provide you with the knowledge and skills needed to develop and implement an information security program, manage security risks, and ensure compliance with security regulations.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for overseeing an organization's information security program. This course will provide you with the knowledge and skills needed to develop and implement an information security program, manage security risks, and ensure compliance with security regulations.
Information Technology Auditor
Information Technology Auditors assess and evaluate an organization's information systems and controls to ensure that they are secure and compliant with regulations. This course may be useful for gaining a foundational knowledge of information security. It will provide you with an understanding of the principles of information security and risk management, as well as the skills needed to identify, analyze, and respond to security threats and risks.
Cloud Security Architect
Cloud Security Architects design, implement, and maintain security for cloud computing environments. This course will allow you to gain a foundational knowledge of cloud security. It will also teach you about the latest cloud security technologies and trends.
Network Administrator
Network Administrators manage and maintain computer networks. This course may be useful for gaining a foundational knowledge of information security. It will provide you with an understanding of the principles of information security and risk management, as well as the skills needed to identify, analyze, and respond to security threats and risks.
Systems Analyst
Systems Analysts design, implement, and maintain computer systems and networks. This course may be useful for gaining a foundational knowledge of information security. It will provide you with an understanding of the principles of information security and risk management, as well as the skills needed to identify, analyze, and respond to security threats and risks.
Systems Administrator
Systems Administrators manage and maintain computer systems and networks. This course may be useful for gaining a foundational knowledge of information security. It will provide you with an understanding of the principles of information security and risk management, as well as the skills needed to identify, analyze, and respond to security threats and risks.
Database Administrator
Database Administrators manage and maintain databases. This course may be useful for gaining a foundational knowledge of information security. It will provide you with an understanding of the principles of information security and risk management, as well as the skills needed to identify, analyze, and respond to security threats and risks.

Reading list

We've selected 15 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Google Workspace Security.
This handbook provides a practical guide to securing Google Workspace. It covers a range of topics, including user management, data protection, and threat detection.
Provides a comprehensive overview of OAuth 2.0 and OpenID Connect, which are essential protocols for securing web applications. It valuable resource for anyone who wants to learn more about these technologies.
Provides a comprehensive overview of network security threats and vulnerabilities. It valuable resource for anyone who wants to learn more about how to protect their networks.
Provides a comprehensive overview of cybersecurity concepts and practices. It valuable resource for anyone who wants to learn more about how to protect their data and systems.
Provides a comprehensive overview of cloud security concepts and practices. It valuable resource for anyone who wants to learn more about how to protect data in the cloud.
Provides insights into the human element of security. It valuable resource for anyone who wants to learn more about how to protect themselves from social engineering attacks.
Provides a comprehensive overview of security concepts and practices. It valuable resource for anyone who wants to learn more about how to protect their data and systems.
Provides a comprehensive overview of secure coding principles and practices. It valuable resource for anyone who wants to learn more about how to write secure code.
Provides a comprehensive overview of threat modeling principles and practices. It valuable resource for anyone who wants to learn more about how to design secure systems.
Provides a practical guide to ethical hacking techniques. It valuable resource for anyone who wants to learn more about how to identify and exploit security vulnerabilities.
Provides a comprehensive overview of network security concepts and practices. It valuable resource for anyone who wants to learn more about how to protect their networks.
Provides a comprehensive overview of security engineering principles and practices. It valuable resource for anyone who wants to learn more about how to build secure systems.
This cookbook provides a set of recipes for implementing security controls in Google Workspace.
This incident response guide provides a set of incident response procedures for responding to security incidents in Google Workspace.
This community provides a way for users to connect with each other and discuss Google Workspace security. It covers all aspects of security, from basic concepts to advanced topics like threat detection and response. It valuable resource for anyone who wants to learn more about Google Workspace security.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser