YoVDO

Cloud Security Risks: Identify and Protect Against Threats

Offered By: Google Cloud via Coursera

Tags

Cloud Security Courses Data Protection Courses Access Control Courses Authorization Courses Identity Management Courses Auditing Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Two courses down, three to go – you’re well on your way! This is the third course of the Google Cloud Cybersecurity Certificate. You’ll delve into the key aspects of identity management and access control in cloud computing, including security principles like least-privilege and separation-of-duties, and the crucial elements of AAA: authentication, authorization, and auditing. AAAnd…let’s go to it! ← See what we did there?!

Syllabus

  • Access control and identity management
    • In this module, you’ll deep dive into the crucial aspects of identity management and access control in cloud computing, covering security principles like least-privilege and separation-of-duties, and the crucial elements of AAA: authentication, authorization, and auditing. You'll explore various access control methods, credential management, and certificate handling, key to securing cloud applications.
  • Threat and vulnerability management
    • Get ready for another action-packed adventure! In this module, you'll transform into a threat-hunting detective. Uncover hidden vulnerabilities, pinpoint risks with precision, and deploy cunning mitigation strategies. You'll unlock the secrets of asset management, discovering tools and techniques for safeguarding your resources like a seasoned pro. And get ready to crack the code on secure configuration, building an impenetrable fortress within the cloud.
  • Cloud Native Principles of Ephemerality and Immutability
    • Ready to do some exploring? In this module, you'll discover cloud-native principles of ephemerality and immutability, focusing on proper credential handling that aligns with these concepts. You'll discover the automation of infrastructure provisioning and its impact on security, including key areas like containers, orchestration, and Infrastructure-as-Code (IaC).
  • Data Protection and Privacy
    • In this module, you'll gain a comprehensive understanding of data protection and privacy in the cloud. We’ll guide you through the essentials of data loss prevention, data discovery, data processing, data treatment, and data classification, empowering you to understand and implement effective data governance and access strategies. You'll also explore the nuances of data retention levels and how compliance controls are applied, so you can explain and navigate governance in cloud security.

Taught by

Google Cloud Training

Related Courses

Accounting, Business and Society: The Multi-faceted Role of Accounting
The Hong Kong University of Science and Technology via Coursera
AWS Security Essentials
A Cloud Guru
Google Cloud Security Essentials
A Cloud Guru
Auditing I: Conceptual Foundations of Auditing
University of Illinois at Urbana-Champaign via Coursera
Auditing II: The Practice of Auditing
University of Illinois at Urbana-Champaign via Coursera