Introduction to Security Principles in Cloud Computing
Offered By: Google via Google Cloud Skills Boost
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This is the first of five courses in the Google Cloud Cybersecurity Certificate. In this course, you’ll explore the essentials of cybersecurity, including the security lifecycle, digital transformation, and key cloud computing concepts. You’ll identify common tools used by entry-level cloud security analysts to automate tasks.
Syllabus
- Introduction to cloud computing
- Welcome to the Google Cloud Cybersecurity Certificate
- Google Cloud Cybersecurity Certificate overview
- Introduction to Course 1
- Course 1 overview
- Helpful resources and tips
- Lab technical tips
- Explore your course 1 scenario: Cymbal Bank
- Welcome to module 1
- Ben: The cloud's impact on education
- Composition of the cloud
- Cloud deployment models
- Google’s trusted infrastructure
- Cloud benefits and considerations
- Cloud benefits and limitations
- Test your knowledge: Introduction to the cloud
- Ephemerality and cloud resources
- Virtualization and virtual machines
- Serverless computing
- Containerization
- Test your knowledge: Compute in the cloud
- Cloud storage benefits
- Types of storage in the cloud
- Google’s storage options
- Test your knowledge: Secure cloud data storage
- Wrap-up
- Glossary terms from module 1
- Module 1 challenge
- Security in the cloud
- Welcome to module 2
- Adaire: Cloud enables business outcomes
- [Supplemental] Cybersecurity fundamentals
- Cloud defense in depth
- Controls that contribute to security depth
- Test your knowledge: The importance of layering security
- The shared responsibility model
- Shared responsibility challenges
- Shared responsibility and cloud migration
- The shared fate model
- Test your knowledge: The shared responsibility and shared fate models
- An overview of IaaS, PaaS, and SaaS
- Infrastructure as a service
- Platform as a service
- Software as a service
- Test your knowledge: Cloud computing service models
- IAM policies provide security depth
- IAM in the cloud
- Explore the Google Cloud console
- Test your knowledge: Identity and access management (IAM)
- Networking fundamentals
- [Supplemental] Network fundamentals
- Firewalls for network security
- Key concepts of virtual private clouds
- Test your knowledge: Networks in the cloud
- Wrap-up
- Glossary terms from module 2
- Module 2 challenge
- The security lifecycle
- Welcome to module 3
- Dayo: Life as a security engineer
- An overview of DevSecOps
- DevSecOps in action
- Test your knowledge: Introduction to DevSecOps
- Software pipelines
- The CI/CD pipeline
- Software pipelines and Google’s Cloud Build
- Test your knowledge: Software pipelines
- Introduction to the software supply chain
- Levels of the software supply chain
- Strengthen the supply chain with Software Delivery Shield
- Test your knowledge: Software supply chain security
- Infrastructure as code (IaC) in the cloud
- An overview of policy as code
- Terraform as an IaC tool
- Activity: Manage IaC with Terraform
- Activity Quiz: Manage IaC with Terraform
- IaC in the GitOps framework
- Test your knowledge: Infrastructure and policies as code
- Wrap-up
- Glossary terms from module 3
- Module 3 challenge
- Cloud security analyst roles and responsibilities
- Welcome to module 4
- Introduction to the cloud security analyst’s role
- Cloud security analyst job titles
- Test your knowledge: The cloud security analyst’s role in cloud computing
- Cloud security analyst job responsibilities
- Core cloud security analyst responsibilities
- Test your knowledge: Cloud security analyst responsibilities
- The security ecosystem
- [Supplemental] Workplace communication and collaboration
- Communicate with stakeholders
- Cloud security stakeholders
- Core skills for cloud cybersecurity analysts
- Test your knowledge: The cloud security ecosystem
- Common tools in the cloud analyst’s toolkit
- Useful Google Cloud tools
- Introduction to artificial intelligence
- Cloud Shell overview
- Guide to Virtual Private Cloud (VPC)
- Create a VPC using Cloud Shell
- Test your knowledge: Cloud security tools
- Wrap-up
- Chris: Key points for cloud security interviews
- Chris and Kevin: Interview role play
- Interview tip: Demonstrate your thought process
- Glossary terms from module 4
- Module 4 challenge
- Course wrap-up
- Course 1 Resources and Citations
- Glossary terms from course 1
- Your Next Steps
- Course Badge
Tags
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera