Security Best Practices in Google Cloud
Offered By: Pluralsight
Course Description
Overview
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud.
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments. This is the second course of the Security in Google Cloud series. After completing this course, enroll in the Mitigating Security Vulnerabilities on Google Cloud course.
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments. This is the second course of the Security in Google Cloud series. After completing this course, enroll in the Mitigating Security Vulnerabilities on Google Cloud course.
Taught by
Google Cloud
Related Courses
Architecting with Google Kubernetes Engine: Production en FrançaisGoogle Cloud via Coursera Architecting Google Kubernetes Engine Production in italiano
Google Cloud via Coursera Hardening Default GKE Cluster Configurations
Google Cloud via Coursera Palo Alto Networks VM-Series Firewall: Securing the GKE Perimeter
Google Cloud via Coursera Configuring and Managing Kubernetes Security
Pluralsight