Ensuring Cloud Resource Health: Addressing Software Vulnerabilities and Identity Risk
Offered By: Google Cloud Tech via YouTube
Course Description
Overview
Learn how to strengthen your cloud environment's risk posture by addressing software vulnerabilities and identity risks in this technical session from Google Cloud Next 2024. Discover new vulnerability response and cloud identity and entitlement management capabilities in Security Command Center Enterprise. Explore methods for identifying and quickly fixing high-risk software vulnerabilities, preventing over-permissioned identities from leading to unauthorized access, and implementing effective remediation strategies. Gain insights into managing the risk in code, vulnerability management processes, and mitigating identity-related risks to ensure the health and security of your cloud resources.
Syllabus
Introduction
Security Command Center Enterprise
The risk in code
Vulnerability management
Identity related risks
Remediation
Taught by
Google Cloud Tech
Related Courses
Information Security - 5 - Secure Systems EngineeringIndian Institute of Technology Madras via Swayam Reverse Engineering and Exploit Development
Udemy Master the OWASP Top 10
LinkedIn Learning CASP+ Cert Prep: 2 Enterprise Security Architecture
LinkedIn Learning Learning the OWASP Top 10 (2018)
LinkedIn Learning