We may earn an affiliate commission when you visit our partners.
Course image
Google Cloud Training

"「Google Workspace Security」は、Google Workspace Administration シリーズの 3 つ目のコースです。

このコースでは、ユーザーのパスワード ポリシーや、ユーザーに対して 2 段階認証プロセス(2SV)を有効にして適用する方法など、Google Workspace のセキュリティのさまざまな側面に焦点を当てます。アプリケーションのセキュリティについて学習し、アカウントへの API アクセスを許可リストに登録したりブロックしたりする方法を理解します。さらに、複数の事前定義済みサードパーティ製アプリケーションを Google Workspace に簡単に統合する方法も学習します。Google Workspace の SSO のオプションについても学習します。最後に、組織の潜在的なセキュリティ リスクを特定し、管理コンソールのツールを使用して対処する方法を学習します。

前提条件

「Introduction to Google Workspace Administration」と「Managing Google Workspace」のコースを完了している必要があります。"

Enroll now

What's inside

Syllabus

Google Workspace Security
このコースでは、ユーザーのパスワード ポリシーや、ユーザーに対して 2 段階認証プロセス(2SV)を有効にして適用する方法など、Google Workspace のセキュリティのさまざまな側面に焦点を当てます。アプリケーションのセキュリティについて学習し、アカウントへの API アクセスを許可リストに登録したりブロックしたりする方法を理解します。さらに、複数の事前定義済みサードパーティ製アプリケーションを Google Workspace に簡単に統合する方法も学習します。Google Workspace の SSO のオプションについても学習します。最後に、組織の潜在的なセキュリティ リスクを特定し、管理コンソールのツールを使用して対処する方法を学習します。

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores Google Workspace security tools, enabling learners to secure user and account data, which is in demand for professionals and businesses
Taught by Google Cloud Training, learners benefit from Google's expertise in digital security protocols

Save this course

Save Google Workspace Security 日本語版 to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Google Workspace Security 日本語版 with these activities:
Securing User Accounts
Provide a deep dive into creating secure account controls using Google Workspace tools.
Browse courses on Account Security
Show steps
  • Follow Google's tutorial on securing user accounts.
Enable Two-Factor Authentication (2FA) for Google Apps
Strengthen account security by reducing risk of malicious access to Google Workspace.
Browse courses on Two-Factor Authentication
Show steps
  • Follow Google's tutorial on enabling 2FA for Google Apps.
Create and Test Custom Security Policies
Apply recently learned security knowledge by testing policies in a live Google Workspace environment.
Browse courses on Security Policies
Show steps
  • Create custom security policies for your Google Workspace domain.
  • Test the effectiveness of your custom security policies.
Three other activities
Expand to see all activities and additional details
Show all six activities
Develop a Google Workspace Security Implementation Plan
Solidify understanding and identify key areas for Google Workspace security improvements.
Browse courses on Google Workspace Security
Show steps
  • Identify the security risks and vulnerabilities in your current Google Workspace environment.
  • Develop a plan to address the identified security risks and vulnerabilities.
  • Implement the security plan and monitor its effectiveness.
Conduct a Google Workspace Security Audit
Identify areas for improvement and ensure ongoing compliance with best practices.
Browse courses on Security Audit
Show steps
  • Plan and prepare for the security audit.
  • Conduct the security audit.
  • Document the findings of the security audit.
  • Remediate any security risks or vulnerabilities identified during the audit.
Contribute to Open Source Google Workspace Security Tools
Enhance technical expertise and contribute to the broader Google Workspace security community.
Browse courses on Open Source Tools
Show steps
  • Identify open source Google Workspace security tools that you can contribute to.
  • Make a meaningful contribution to the open source Google Workspace security tool.
  • Document your contribution.

Career center

Learners who complete Google Workspace Security 日本語版 will develop knowledge and skills that may be useful to these careers:
Information Security Manager
In this role, you would be responsible for developing and implementing security policies and procedures for an organization's information systems. "Google Workspace Security 日本語版" may be useful by teaching you how to apply 2-step verification to user accounts. Beyond that, this course may help you build a foundation in identifying and mitigating potential security risks within your company.
Security Architect
A security architect designs, implements, and maintains an organization's security infrastructure. One important aspect of an organization's security is its information systems. "Google Workspace Security 日本語版" may be useful by teaching you how to apply 2-step verification to user accounts. Beyond that, this course may help you build a foundation for protecting an organization's information systems from external and internal security risks.
Security Engineer
Security engineers implement and maintain an organization's security systems and infrastructure. One important aspect of an organization's security is its information systems. "Google Workspace Security 日本語版" may be useful by teaching you how to apply 2-step verification to user accounts. Beyond that, this course may help you build a foundation for protecting an organization's information systems from external and internal security risks.
Security Analyst
A security analyst, on a day-to-day basis, may draft policies and procedures to protect computer networks from unauthorized access or attacks. To be successful in this role, you must complete courses that teach you to understand how to keep your network safe from external and internal security risks; "Google Workspace Security 日本語版" may be useful by teaching you how to apply 2-step verification to user accounts. Beyond that, this course may help you build a foundation in identifying and mitigating potential security risks within your company.
Security Consultant
Security consultants help organizations identify, assess, and mitigate security risks. One important aspect of an organization's security is its information systems. "Google Workspace Security 日本語版" may be useful by teaching you how to apply 2-step verification to user accounts. Beyond that, this course may help you build a foundation for protecting an organization's information systems from external and internal security risks.
Cloud Security Engineer
Cloud security engineers design, implement, and maintain security for cloud-based systems. One important aspect of cloud security is to ensure that users' accounts are secure. "Google Workspace Security 日本語版" may be useful by teaching you how to apply 2-step verification to user accounts.
Technical Support Specialist
A technical support specialist provides technical support to users of computer systems and software. This may include providing support for Google Workspace. One important aspect of supporting users of Google Workspace is to ensure that their accounts are secure. "Google Workspace Security 日本語版" may be useful by teaching you how to apply 2-step verification to user accounts.
Chief Information Security Officer (CISO)
The CISO is responsible for developing and implementing an organization's information security strategy. One important aspect of an organization's information security strategy is to ensure that users' accounts are secure. "Google Workspace Security 日本語版" may be useful by teaching you how to apply 2-step verification to user accounts.
Security Auditor
A security auditor assesses the security of an organization's computer systems and networks. One important aspect of security auditing is to ensure that users' accounts are secure. "Google Workspace Security 日本語版" may be useful by teaching you how to apply 2-step verification to user accounts.
Database Administrator
Database administrators configure, manage, and maintain an organization's databases. One important aspect of managing databases is to ensure that they are secure. "Google Workspace Security 日本語版" may be useful by teaching you how to apply 2-step verification to user accounts. Beyond that, this course may help you build a foundation in identifying and mitigating potential security risks within your company.
Security Operations Analyst
A security operations analyst monitors and analyzes an organization's security systems and networks for suspicious activity. One important aspect of security operations is to ensure that users' accounts are secure. "Google Workspace Security 日本語版" may be useful by teaching you how to apply 2-step verification to user accounts.
Network Administrator
A network administrator configures, manages, and maintains an organization's computer networks. One important aspect of managing computer networks is to ensure that they are secure. "Google Workspace Security 日本語版" may be useful by teaching you how to apply 2-step verification to user accounts. Beyond that, this course may help you build a foundation in identifying and mitigating potential security risks within your company.
IT Manager
IT managers plan, implement, and manage an organization's information technology systems. One important aspect of managing IT systems is to ensure that they are secure. "Google Workspace Security 日本語版" may be useful by teaching you how to apply 2-step verification to user accounts. Beyond that, this course may help you build a foundation in identifying and mitigating potential security risks within your company.
Systems Administrator
A systems administrator configures, manages, and maintains an organization's computer systems. One important aspect of managing computer systems is to ensure that they are secure. "Google Workspace Security 日本語版" may be useful by teaching you how to apply 2-step verification to user accounts. Beyond that, this course may help you build a foundation in identifying and mitigating potential security risks within your company.
Incident Responder
An incident responder investigates and responds to security incidents. One important aspect of incident response is to ensure that users' accounts are secure. "Google Workspace Security 日本語版" may be useful by teaching you how to apply 2-step verification to user accounts.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Google Workspace Security 日本語版.
Provides a comprehensive overview of Google Workspace security, covering topics such as user security, data protection, and compliance. It valuable resource for administrators who want to improve the security of their Google Workspace environment.
Provides a practical guide to securing Google Workspace, covering topics such as identity management, access control, and data protection. It valuable resource for administrators who want to implement best practices for Google Workspace security.
クラウドセキュリティの実際的なガイドです。Google Workspace Security の範囲を超えて、より広範なクラウドセキュリティの課題や解決策を学ぶことができます。
ネットワークセキュリティの基礎を学ぶための教科書です。Google Workspace Security の範囲を超えて、ネットワークセキュリティの全体的な理解を深めるのに役立ちます。
サイバーセキュリティの入門書です。Google Workspace Security の内容を補完し、より広いサイバーセキュリティの課題や対策を学ぶのに役立ちます。
ソーシャルエンジニアリングやハッキングのテクニックに焦点を当てた本です。Google Workspace Security で扱うセキュリティ対策の限界や、人的要因がセキュリティに与える影響を理解するのに役立ちます。
IT プロフェッショナル向けのセキュリティ意識向上ガイドです。Google Workspace Security の範囲を超えて、セキュリティの人的側面を理解するのに役立ちます。
Provides a practical guide to securing Google Workspace environments, covering topics such as user authentication, data protection, and threat detection.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Google Workspace Security 日本語版.
Managing Google Workspace 日本語版
Most relevant
Introduction to Google Workspace 日本語版
Most relevant
Architecting with Google Kubernetes Engine: Production...
Most relevant
Google Sheets 日本語版
Most relevant
Architecting with Google Kubernetes Engine: Workloads 日本語版
Most relevant
Google Drive 日本語版
Most relevant
Google Chat - 日本語版
Most relevant
Google Slides 日本語版
Most relevant
ML Pipelines on Google Cloud - 日本語版
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser