We may earn an affiliate commission when you visit our partners.
Course image
Google Cloud Training

「G Suite のメール管理」は G Suite 管理スペシャライゼーションの最後のコースです。

 

このコースでは、迷惑メール、なりすまし、フィッシング、マルウェアによる攻撃から組織を保護する方法について学びます。具体的には、メールのコンプライアンスの設定、組織のデータ損失防止(DLP)の仕組みを実現する方法、メールで使用可能なルーティング オプション、送信者をホワイトリストに登録する方法、送信者をブロックする方法についても学習します。さらに、受信および送信のゲートウェイ、サードパーティ サービスによるメールのアーカイブ、Vault への保存などのメール オプションについても理解を深めます。

学習目標

このコースを修了すると、次のことができるようになります。

- インターネットで使われているドメイン ネーム システム(DNS)の概要を理解し、G Suite で使用されているレコードの種類を理解する。

- DNS レコードに一般的なメール セキュリティ対策(SPF、DKIM、DMARC など)を実装し、それぞれの目的を理解する。

- インバウンド フィッシングと有害なソフトウェア(マルウェア)からユーザーを保護する方法を理解する。

- ユーザーが使用可能なエンドユーザー アクセス機能を制御する。

Read more

「G Suite のメール管理」は G Suite 管理スペシャライゼーションの最後のコースです。

 

このコースでは、迷惑メール、なりすまし、フィッシング、マルウェアによる攻撃から組織を保護する方法について学びます。具体的には、メールのコンプライアンスの設定、組織のデータ損失防止(DLP)の仕組みを実現する方法、メールで使用可能なルーティング オプション、送信者をホワイトリストに登録する方法、送信者をブロックする方法についても学習します。さらに、受信および送信のゲートウェイ、サードパーティ サービスによるメールのアーカイブ、Vault への保存などのメール オプションについても理解を深めます。

学習目標

このコースを修了すると、次のことができるようになります。

- インターネットで使われているドメイン ネーム システム(DNS)の概要を理解し、G Suite で使用されているレコードの種類を理解する。

- DNS レコードに一般的なメール セキュリティ対策(SPF、DKIM、DMARC など)を実装し、それぞれの目的を理解する。

- インバウンド フィッシングと有害なソフトウェア(マルウェア)からユーザーを保護する方法を理解する。

- ユーザーが使用可能なエンドユーザー アクセス機能を制御する。

- メールのホワイトリストとブラックリスト、承認済み送信者リストを設定して、メール配信の管理と、迷惑メール、フィッシング、マルウェアからの保護を効果的に行う。

- G Suite で提供されているさまざまなコンプライアンス機能を理解する。

- G Suite 管理者が使用できるメールのルーティング オプションの概要を理解する。

前提条件

このシリーズの他のコース(「G Suite の概要」、「G Suite の管理」、「G Suite のセキュリティ」)を完了している必要があります。

Enroll now

What's inside

Syllabus

「Google Workspace のメール管理」にようこそ。
このコースでは、迷惑メール、なりすまし、フィッシング、不正なソフトウェアによる攻撃から組織を保護する方法を学びます。メールのコンプライアンスを設定するほか、組織のデータ損失防止(DLP)の仕組みを実現する方法、使用可能なメールのルーティング方法、送信者をホワイトリストに登録したりブロックしたりする方法についても学びます。さらに、受信および送信ゲートウェイ、サードパーティ サービスによるメールのアーカイブ、Vault へのジャーナリングなどのメール オプションについての理解も深めます。

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
このコースは、G Suite 管理スペシャライゼーションの最後を飾ります。
ユーザーをフィッシングやマルウェアから保護する方法を学ぶことができます。
メール配信の管理と、迷惑メール、フィッシング、マルウェアからの保護方法を学習します。
G Suite のさまざまなコンプライアンス機能の理解を深めます。
G Suite 管理者が利用できるメールのルーティング オプションの概要を理解できます。
このコースを受講するには、他のコースを完了している必要があります。

Save this course

Save Google Workspace Mail Management 日本語版 to your list so you can find it easily later:
Save

Reviews summary

日本語版 yet helpful

This course is helpful, but it could use more examples. It is easier for Japanese people to follow than English speakers.
Useful for Japanese learners.
"Easier to learn for Japanese people."
The course could be better with more examples.
"I wish more examples."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Google Workspace Mail Management 日本語版 with these activities:
Organize course materials and notes
Organize and review the course materials and notes to enhance comprehension and retention.
Show steps
  • Gather all relevant course materials.
  • Create a system for organizing the materials.
  • Review the materials regularly and make notes.
Review concepts of internet security and networking
Refresh your understanding of internet security and networking concepts to strengthen your foundation for email security.
Browse courses on Internet Security
Show steps
  • Review the basics of IP addresses, DNS, and network protocols.
  • Understand the different types of cyber threats and attacks.
  • Familiarize yourself with common security measures and best practices.
Create and implement email filters
Follow guided tutorials to learn how to create and implement email filters to block spam and phishing emails.
Show steps
  • Identify the types of emails you want to filter.
  • Determine the criteria for filtering.
  • Create the email filters using the G Suite Admin console.
  • Test the email filters to ensure they are working properly.
Seven other activities
Expand to see all activities and additional details
Show all ten activities
DNS レコードの練習問題を解く
DNS レコードに関する知識を強化し、メール セキュリティ対策を理解する
Browse courses on SPF
Show steps
  • オンラインで DNS レコードの練習問題を見つける
  • 練習問題を解き、解答を確認する
  • 理解できない問題があれば、オンライン フォーラムやドキュメントで調べる
Configure DNS records for email security
Practice configuring DNS records to implement common email security measures like SPF, DKIM, and DMARC.
Browse courses on Email Security
Show steps
  • Review the documentation for SPF, DKIM, and DMARC.
  • Create the necessary DNS records.
  • Verify that the records are correctly configured.
Discuss email security best practices
Engage in discussions with peers to exchange knowledge and insights on best practices for email security.
Show steps
  • Identify a group of peers to discuss with.
  • Prepare talking points on email security best practices.
  • Participate in the discussion and actively listen to others' perspectives.
  • Document key takeaways from the discussion.
Develop an infographic on email security best practices
Create a visually engaging infographic summarizing the key best practices for email security to reinforce your understanding.
Show steps
  • Gather information on email security best practices.
  • Identify the key points to include in the infographic.
  • Design and create the infographic.
  • Share the infographic with others to raise awareness about email security.
メール セキュリティ ポリシーを作成する
メール環境のセキュリティとコンプライアンスを強化する実践的な経験を得る
Browse courses on DLP
Show steps
  • メール セキュリティのベスト プラクティスを調査する
  • 組織に適したメール セキュリティ ポリシーを作成する
  • ポリシーをテストし、必要に応じて調整する
  • ポリシーを文書化し、利害関係者に伝える
Develop an email security policy
Create a comprehensive email security policy to outline guidelines and procedures for email security.
Show steps
  • Research industry best practices for email security.
  • Identify the specific email security risks and threats faced by your organization.
  • Develop a set of policies and procedures to address the identified risks and threats.
  • Document the email security policy in a clear and concise manner.
  • Implement the email security policy across the organization.
Participate in an email security hackathon
Engage in a hackathon focused on email security to apply your knowledge and skills in a competitive environment.
Show steps
  • Identify an email security hackathon to participate in.
  • Form a team or work individually.
  • Develop a solution to the hackathon challenge.
  • Submit your solution and present it to the judges.

Career center

Learners who complete Google Workspace Mail Management 日本語版 will develop knowledge and skills that may be useful to these careers:
Security Engineer
Security Engineers design, implement, and manage security systems for organizations. They also monitor security systems for vulnerabilities and threats. This course may be useful in helping you become a Security Engineer because it teaches you about email security, data loss prevention, and compliance. These skills are essential for protecting an organization's computer systems and networks from cyberattacks.
Information Security Analyst
Information Security Analysts gather information and analyze vulnerabilities in an organization's computer systems and networks. Information Security Analysts also develop and implement information security policies and procedures. This course may be useful in helping you become an Information Security Analyst because it teaches you about email security, data loss prevention, and compliance. These skills are essential for protecting an organization's computer systems and networks from cyberattacks.
IT Security Architect
IT Security Architects design and implement security architecture for organizations. They also oversee the implementation and maintenance of security systems. This course may be useful in helping you become an IT Security Architect because it teaches you about email security, data loss prevention, and compliance. These skills are essential for designing and implementing security architecture for organizations.
IT Auditor
IT Auditors evaluate the security of an organization's computer systems and networks. They also make recommendations for improving security. This course may be useful in helping you become an IT Auditor because it teaches you about email security, data loss prevention, and compliance. These skills are essential for evaluating the security of an organization's computer systems and networks.
Network Engineer
Network Engineers design, implement, and maintain computer networks for organizations. They also monitor networks for performance and security issues. This course may be useful in helping you become a Network Engineer because it teaches you about email routing and security. These skills are essential for managing and securing an organization's computer networks.
Application Engineer
Application Engineers design, develop, and maintain software applications for organizations. They also manage and support software applications. This course may be useful in helping you become an Application Engineer because it teaches you about email integration with other applications and systems. This skill is essential for designing, developing, and maintaining software applications.
Systems Administrator
Systems Administrators manage and maintain computer systems for organizations. They also install and configure software and hardware. This course may be useful in helping you become a Systems Administrator because it teaches you about email routing and security. These skills are essential for managing and securing an organization's computer systems.
Software Developer
Software Developers design, develop, and maintain software applications for organizations. They also manage and support software applications. This course may be useful in helping you become a Software Developer because it teaches you about email integration with other applications and systems. This skill is essential for designing, developing, and maintaining software applications.
Database Administrator
Database Administrators manage and maintain databases for organizations. They also design and implement database security measures. This course may be useful in helping you become a Database Administrator because it teaches you about data loss prevention. This skill is essential for designing and implementing database security measures.
IT Consultant
IT Consultants provide consulting services to organizations on how to improve their IT systems and networks. They also help organizations develop and implement IT strategies. This course may be useful in helping you become an IT Consultant because it teaches you about email management and security. These skills are essential for providing consulting services to organizations on how to improve their IT systems and networks.
Security Analyst
Security Analysts collect and analyze information to identify and mitigate security risks. They also develop and implement security policies and procedures. This course may be useful in helping you become a Security Analyst because it teaches you about email security, data loss prevention, and compliance. These skills are essential for identifying and mitigating security risks.
Technical Support Specialist
Technical Support Specialists provide technical support to users of an organization's computer systems and networks. They also install and configure software and hardware. This course may be useful in helping you become a Technical Support Specialist because it teaches you about email routing and security. These skills are essential for providing technical support to users of an organization's computer systems and networks.
IT Manager
IT Managers plan, direct, and coordinate the activities of an organization's IT department. They also develop and implement IT policies and procedures. This course may be useful in helping you become an IT Manager because it teaches you about email management and security. These skills are essential for planning, directing, and coordinating the activities of an organization's IT department.
Network Administrator
Network Administrators manage and maintain computer networks for organizations. They also monitor networks for performance and security issues. This course may be useful in helping you become a Network Administrator because it teaches you about email routing and security. These skills are essential for managing and securing an organization's computer networks.
IT Specialist
IT Specialists provide technical support to users of an organization's computer systems and networks. They also install and configure software and hardware. This course may be useful in helping you become an IT Specialist because it teaches you about email routing and security. These skills are essential for providing technical support to users of an organization's computer systems and networks.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Google Workspace Mail Management 日本語版.
Serving as an official guide, this book provides a wealth of clear and thoroughly detailed instructions to help system administrators protect their organizations using Google Workspace products and tools, including Google Mail.
Save
Provides a comprehensive overview of DNS, covering topics such as DNS records, DNS servers, and DNS security. It valuable resource for G Suite administrators who want to understand how DNS works and how to configure it for their organizations.
Intended for both beginners and seasoned system administrators, this book provides a detailed foundation of the Domain Name System, a fundamental part of the internet infrastructure responsible for translating domain names to IP addresses.
Provides a detailed overview of phishing, covering topics such as how to identify phishing attacks, and how to protect against phishing attacks. It valuable resource for G Suite administrators who want to protect their users from phishing attacks.
Provides a detailed overview of malware, covering topics such as how to identify malware attacks, and how to protect against malware attacks. It valuable resource for G Suite administrators who want to protect their users from malware attacks.
Provides a thorough examination of software security testing methods and tools, offering practical guidance and best practices to help organizations protect their systems from vulnerabilities.
While not specifically tailored to email security, this text provides a comprehensive overview of essential principles and practical techniques applicable to building and implementing secure and trustworthy AI systems.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Google Workspace Mail Management 日本語版.
【フォーム開発実践】認証やお問い合わせフォームをNext.js/RHF/zod等のモダン技術を使って開発する実践講座
Most relevant
Gmail 日本語版
Most relevant
【英会話の苦手意識を克服】実践の場で使える「時制」の基礎知識ー中学英語おさらい講座2ー
Most relevant
【英文法で学ぶ】句節英会話 -文型の知識を土台に英会話/英作文力を磨く
Most relevant
AIってなんだ。 イメージで理解しておきたい人のための超入門講座
Most relevant
【英文法で学ぶ】SVOC英会話 -文型の知識を土台に英会話/英作文力を磨く
Most relevant
3. 探索用データを準備する
Most relevant
Scaling with Google Cloud Operations - 日本語版
Most relevant
7. データ分析とR 言語
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser