YoVDO

Security & Identity Fundamentals

Offered By: Google via Qwiklabs

Tags

Google Cloud Platform (GCP) Courses Kubernetes Courses Identity and Access Management (IAM) Courses VPN Courses Cloud Security Courses Identity Management Courses Virtual Private Cloud (VPC) Courses Data Loss Prevention Courses

Course Description

Overview

Security is an uncompromising feature of Google Cloud services, and Google Cloud has developed specific tools for ensuring safety and identity across your projects. In this fundamental-level quest, you will get hands-on practice with Google Cloud's Identity and Access Management (IAM) service, which is the go-to for managing user and virtual machine accounts. You will get experience with network security by provisioning VPCs and VPNs, and learn what tools are available for security threat and data loss protections. Looking for a hands on challenge lab to demonstrate your skills and validate your knowledge? On completing this quest, enroll in and finish the additional challenge lab at the end of this quest to receive an exclusive Google Cloud digital badge.


Syllabus

  • Cloud IAM: Qwik Start
    • Google Cloud IAM unifies access control for Cloud Platform services into a single system to present a consistent set of operations. Watch the short video Manage Access Control with Google Cloud IAM.
  • IAM Custom Roles
    • Cloud IAM provides the right tools to manage resource permissions with minimum fuss and high automation. You don't directly grant users permissions. Instead, you grant them roles, which bundle one or more permissions. This allows you to map job functions within your company to groups and roles.
  • Service Accounts and Roles: Fundamentals
    • In this hands-on lab, you will learn how to create and manage Service Accounts
  • VPC Network Peering
    • Google Cloud Platform (GCP) Virtual Private Cloud (VPC) Network Peering allows private connectivity across two VPC networks regardless of whether or not they belong to the same project or the same organization.
  • User Authentication: Identity-Aware Proxy
    • Learn how to restrict access selected authenticated users with Identity-Aware Proxy without special programming. Discover how to retrieve user identity information from IAP.
  • Getting Started with Cloud KMS
    • In this lab you'll work with advanced features of Google Cloud Security and Privacy APIs, including setting up a secure Cloud Storage bucket, managing keys and encrypted data using Key Management Storage, and viewing Cloud Storage audit logs.
  • Google Cloud Packet Mirroring with OpenSource IDS
    • This lab demonstrates a common enterprise use case for Google Cloud's Packet Mirroring in conjunction with an Open Source Intrusion Detection System.
  • Setting up a Private Kubernetes Cluster
    • Hands-on lab for creating a private cluster in the cloud environment. In a private cluster, nodes do not have public IP addresses, so your workloads run in an environment that is isolated from the Internet. Prerequisites: Experience with Kubernetes Clusters, and CIDR-range IP address.

Tags

Related Courses

G Suite Mail Management
Google Cloud via Coursera
Google Workspace Mail Management
Google Cloud via Coursera
Data Loss Prevention: Qwik Start - Command Line
Google Cloud via Coursera
Data Loss Prevention: Qwik Start - JSON
Google Cloud via Coursera
Cyber Threat Intelligence
IBM via Coursera