Security Best Practices in Google Cloud

This course is part of multiple programs. Learn more

Instructor: Google Cloud Training

What you'll learn

  •   Apply techniques and best practices to secure Compute Engine
  •   Apply techniques and best practices to secure cloud data
  •   Apply techniques and best practices to secure applications
  •   Apply techniques and best practices for securing Google Kubernetes Engine (GKE) resources.
  • Skills you'll gain

  •   Security Controls
  •   Application Security
  •   Role-Based Access Control (RBAC)
  •   Virtual Machines
  •   Data Storage Technologies
  •   Key Management
  •   Google Cloud Platform
  •   Hardening
  •   Identity and Access Management
  •   OAuth
  •   Cloud Storage
  •   Authorization (Computing)
  •   Data Security
  •   Kubernetes
  •   Cloud Security
  •   Encryption
  • There are 5 modules in this course

    This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.

    Securing Compute Engine: Techniques and Best Practices

    Securing Cloud Data: Techniques and Best Practices

    Application Security: Techniques and Best Practices

    Securing Google Kubernetes Engine: Techniques and Best Practices

    Explore more from Cloud Computing

    ©2025  ementorhub.com. All rights reserved