We may earn an affiliate commission when you visit our partners.
Course image
Google Cloud Training

This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.

Enroll now

What's inside

Syllabus

Welcome to Security Best Practices in Google Cloud
Welcome to Security Best Practices in Google Cloud! In this course we will build upon the foundations laid during the earlier course in this series, Managing Security in Google Cloud. In this section, expect to learn more about how to implement security "best practices" to lower the risk of malicious attacks against your systems, software and data.
Read more
Securing Compute Engine: Techniques and Best Practices
In this module we will start with a discussion of service accounts, IAM roles and API scopes as they apply to compute engine. We will also discuss managing VM logins, and how to use organization policies to set constraints that apply to all resources in your organization's hierarchy. Next, we will review compute engine best practices to give you some tips for securing compute engine.Lastly, we will cover encrypting persistent disks with Customer-Supplied Encryption keys.
Securing Cloud Data: Techniques and Best Practices
In this module we discuss controlling IAM permissions and access control lists on Cloud Storage buckets, auditing cloud data, including finding and remediating data that has been set to publicly accessible, how to use signed Cloud Storage URLs and signed policy documents, and encrypting data at rest. In addition, BigQuery IAM roles and authorized views will be covered to demonstrate managing access to datasets and tables. The module will conclude with an overview of storage best practices
Application Security: Techniques and Best Practices
In this module we will discuss application security techniques and best practices. We will see how Web Security Scanner can be used to identify vulnerabilities in your applications, and dive into the subject of Identity and Oauth phishing. Lastly, you will learn how Identity-Aware Proxy, or IAP, can be used to control access to your cloud applications.
Securing Google Kubernetes Engine: Techniques and Best Practices
Protecting workloads in Google Kubernetes Engine involves many layers of the stack, including the contents of your container image, the container runtime, the cluster network, and access to the cluster API server. In this module, you will learn how to securely set up your Authentication and Authorization, how to harden your clusters, secure your workloads, and monitor everything to make sure it stays in good health.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
This course belongs to a series of courses and indicates comprehensiveness and detail
Teaches protecting workloads in Google Kubernetes Engine, which includes Authentication and Authorization, hardening clusters, and securing workloads
Taught by Google Cloud Training, who are recognized for their work in security best practices
Develops IAM permissions, access control lists, BigQuery IAM roles, and authorized views, which are core skills for data security
Examines using Web Security Scanner to identify vulnerabilities in applications, which is highly relevant to application security
Teaches encrypting persistent disks with Customer-Supplied Encryption keys, which helps learners enhance data security

Save this course

Save Security Best Practices in Google Cloud to your list so you can find it easily later:
Save

Reviews summary

Google cloud's best security practices

Learners say Google Cloud's Best Security Practices is largely positive and well-received. Excellent content, engaging assignments, and knowledgeable instructors are highlighted by learners. However, some learners mention poor transcripts and outdated course content. Overall, learners recommend this course as it delivers on its stated objectives and provides valuable information on Google Cloud's security best practices.
Course is praised for its well-structured content and informative labs.
"Very tutorial and mind opening."
"Excellent. Great labs."
"Well designed with rich content. Labs are great!"
Some learners express dissatisfaction with outdated course content and low-quality transcripts.
"This course is overall good. Some topics were only a list of titles with poor explanations"
"Too many pauses during the course which leads to loss of attention span"
"V​ery poor presenter- speaking in a monotone, muffled at times, obviously just reading from a teleprompter. Many transcription errors"
Learners share mixed opinions on labs, some find them valuable while others report bugs and unclear instructions.
"so many bugs in labs"
"The labs gave unclear instructions and having lots of bugs."
"Labs need work. Especially week 4's took up 6hrs of my day today because it could not scan within the allotted time."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Security Best Practices in Google Cloud with these activities:
Review foundational security concepts
Revisit and solidify foundational security concepts to enhance comprehension.
Browse courses on Security
Show steps
  • Review previous courses or materials.
  • Go through online resources or textbooks.
  • Attend refresher workshops or webinars.
Organize and review course materials
Strengthen understanding by organizing and reviewing lecture notes, slides, and assignments.
Browse courses on Security
Show steps
  • Collect and organize course materials.
  • Review and summarize key concepts.
  • Identify areas for further study and clarification.
Form study groups
Collaborate with peers to reinforce concepts, discuss challenges, and share knowledge.
Browse courses on Security
Show steps
  • Identify potential study partners.
  • Set up regular meetings.
  • Discuss course materials.
  • Work on assignments together.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Perform sample exercises
Reinforce concepts and techniques covered in class through sample exercises.
Browse courses on Security
Show steps
  • Review lecture concepts.
  • Attempt sample exercises.
  • Check answers and identify areas for improvement.
Follow online tutorials
Supplement class material with guided tutorials to deepen understanding.
Browse courses on Security
Show steps
  • Identify relevant tutorials.
  • Follow tutorial instructions.
  • Apply concepts to hands-on exercises.
Attend industry conferences and webinars
Engage with industry experts and learn about the latest security trends.
Browse courses on Security
Show steps
  • Research conferences and webinars.
  • Register for relevant events.
  • Attend events and actively participate in discussions.
Create a security policy document
Develop a comprehensive security policy document to apply course concepts to a practical scenario.
Browse courses on Security
Show steps
  • Gather relevant information.
  • Outline the policy.
  • Write the policy document.
  • Review and revise the document.
Participate in security competitions and case studies
Challenge yourself by applying course concepts in real-world scenarios.
Browse courses on Security
Show steps
  • Identify relevant competitions and case studies.
  • Form a team (if applicable).
  • Develop a solution and submit an entry.
  • Reflect on the experience and takeaways.

Career center

Learners who complete Security Best Practices in Google Cloud will develop knowledge and skills that may be useful to these careers:
Cloud Security Engineer
A Cloud Security Engineer is responsible for ensuring the security of an organization's cloud-based infrastructure and applications. This course can help you build a foundation in Google Cloud security best practices, which is essential for this role. You will learn how to secure compute instances, data, applications, and Kubernetes workloads in Google Cloud, which are all important skills for a Cloud Security Engineer.
Cloud Security Architect
A Cloud Security Architect designs and implements security solutions for cloud-based applications and infrastructure. This course can help you build a foundation in Google Cloud security best practices, which is essential for this role. You will learn how to secure compute instances, data, applications, and Kubernetes workloads in Google Cloud, which are all important skills for a Cloud Security Architect.
Site Reliability Engineer
A Site Reliability Engineer is responsible for ensuring the reliability and performance of an organization's websites and applications. This course can help you build a foundation in Google Cloud security best practices, which is important for this role. You will learn how to secure compute instances, data, applications, and Kubernetes workloads in Google Cloud, which are all important skills for a Site Reliability Engineer.
DevOps Engineer
A DevOps Engineer is responsible for automating and streamlining the software development and deployment process. This course can help you build a foundation in Google Cloud security best practices, which is important for this role. You will learn how to secure compute instances, data, applications, and Kubernetes workloads in Google Cloud, which are all skills that DevOps Engineers need to have.
Cloud Consultant
A Cloud Consultant helps organizations adopt and implement cloud-based solutions. This course can help you build a foundation in Google Cloud security best practices, which is important for this role. You will learn how to secure compute instances, data, applications, and Kubernetes workloads in Google Cloud, which are all skills that Cloud Consultants need to have.
Security Analyst
A Security Analyst is responsible for identifying and mitigating security threats. This course can help you build a foundation in Google Cloud security best practices, which is important for this role. You will learn how to secure compute instances, data, applications, and Kubernetes workloads in Google Cloud, which are all skills that Security Analysts need to have.
Incident Responder
An Incident Responder is responsible for responding to security incidents. This course may be helpful in providing you with a foundation in Google Cloud security best practices, which can be useful for this role. You will learn how to secure compute instances, data, applications, and Kubernetes workloads in Google Cloud, which are all areas that Incident Responders need to be familiar with.
IT Auditor
An IT Auditor is responsible for assessing the security of an organization's IT systems and processes. This course may be helpful in providing you with a foundation in Google Cloud security best practices, which can be useful for this role. You will learn how to secure compute instances, data, applications, and Kubernetes workloads in Google Cloud, which are all areas that IT Auditors need to be familiar with.
Security Consultant
A Security Consultant helps organizations assess and improve their security posture. This course may be helpful in providing you with a foundation in Google Cloud security best practices, which can be useful for this role. You will learn how to secure compute instances, data, applications, and Kubernetes workloads in Google Cloud, which are all areas that Security Consultants need to be familiar with.
Penetration Tester
A Penetration Tester is responsible for testing the security of an organization's networks and applications. This course may be helpful in providing you with a foundation in Google Cloud security best practices, which can be useful for this role. You will learn how to secure compute instances, data, applications, and Kubernetes workloads in Google Cloud, which are all areas that Penetration Testers need to be familiar with.
Security Researcher
A Security Researcher is responsible for identifying and exploiting vulnerabilities in software and systems. This course may be helpful in providing you with a foundation in Google Cloud security best practices, which can be useful for this role. You will learn how to secure compute instances, data, applications, and Kubernetes workloads in Google Cloud, which are all areas that Security Researchers need to be familiar with.
Security Manager
A Security Manager is responsible for overseeing an organization's security program. This course may be helpful in providing you with a foundation in Google Cloud security best practices, which can be useful for this role. You will learn how to secure compute instances, data, applications, and Kubernetes workloads in Google Cloud, which are all areas that Security Managers need to be familiar with.
Software Engineer
A Software Engineer is responsible for designing, developing, and maintaining software applications. This course may be helpful in providing you with a foundation in Google Cloud security best practices, which can be useful for this role. You will learn how to secure compute instances, data, applications, and Kubernetes workloads in Google Cloud, which are all areas that Software Engineers need to be familiar with.
Cloud Architect
A Cloud Architect is responsible for designing and implementing cloud-based solutions. This course may be helpful in providing you with a foundation in Google Cloud security best practices, which can be useful for this role. You will learn how to secure compute instances, data, applications, and Kubernetes workloads in Google Cloud, which are all areas that Cloud Architects need to be familiar with.
Data Engineer
A Data Engineer is responsible for designing, building, and maintaining data pipelines. This course may be helpful in providing you with a foundation in Google Cloud security best practices, which can be useful for this role. You will learn how to secure compute instances, data, applications, and Kubernetes workloads in Google Cloud, which are all areas that Data Engineers need to be familiar with.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Best Practices in Google Cloud.
This comprehensive guide covers the security products and services offered by Google Cloud. It provides valuable insights for professionals responsible for securing cloud infrastructure with Google Cloud.
Provides a comprehensive overview of secure coding. It valuable resource for anyone looking to write secure code.
Provides a comprehensive overview of security in the DevOps pipeline. It valuable resource for anyone looking to integrate security into their DevOps processes.
This practical guide provides real-world strategies and techniques for securing cloud environments. It offers actionable insights for professionals responsible for cloud security.
This document provides a detailed reference architecture for securing cloud computing environments. It valuable resource for anyone looking to design and implement a secure cloud computing solution.
Provides a practical approach to cloud security, focusing on real-world scenarios and implementation. It's suitable for professionals looking to gain hands-on experience in cloud security.
Provides a comprehensive overview of information security. It valuable resource for anyone looking to understand the fundamentals of information security.
Provides an accessible overview of the foundational principles and practices of cloud security. It's an excellent resource for beginners who want a comprehensive understanding of the field.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security Best Practices in Google Cloud.
Security Best Practices in Google Cloud
Most relevant
Essential Google Cloud Infrastructure: Core Services
Most relevant
Essential Google Cloud Infrastructure: Core Services
Most relevant
Managing Security in Google Cloud
Most relevant
Implementing Customer Managed Encryption Keys (CMEK) with...
Most relevant
Managing Security in Google Cloud
Most relevant
Secure Your Data at Rest
Most relevant
Google Cloud Certified Professional Cloud Security...
Most relevant
Cloud Security on AWS
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser