GB
/
GBP
/
EN_GB

Shaping the future of IT skills

Maximising IT performance through learning

Security in Google Cloud Platform

WGAC-GGL-SGCP-3D

Google
Open

Security in Google Cloud Platform

05 Sep 2022 - 3 days

Italian

CET UTC+01:00

£1,666

Open

Security in Google Cloud Platform

03 Oct 2022 - 3 days

English

GMT UTC+00:00

£1,885

Open

Security in Google Cloud Platform

17 Oct 2022 - 3 days

Italian

CET UTC+01:00

£1,666

Open

Security in Google Cloud Platform

12 Dec 2022 - 3 days

Italian

CET UTC+01:00

£1,666

Description

Show Tabs
Introduction

PART I: MANAGING SECURITY IN GOOGLE CLOUD

Module 1 Foundations of GCP Security

  • Understand the GCP shared security responsibility model
  • Understand Google Cloud’s approach to security
  • Understand the kinds of threats mitigated by Google and by GCP
  • Define and Understand Access Transparency and Access Approval (beta)

Module 2 Cloud Identity

  • Cloud Identity
  • Syncing with Microsoft Active Directory using Google Cloud Directory Sync
  • Using Managed Service for Microsoft Active Directory (beta )
  • Choosing between Google authentication and SAML-based SSO
  • Best practices, including DNS configuration, super admin accounts
  • Lab: Defining Users with Cloud Identity Console

Module 3 Identity, Access, and Key Management

  • GCP Resource Manager: projects, folders, and organizations
  • GCP IAM roles, including custom roles
  • GCP IAM policies, including organization policies
  • GCP IAM Labels
  • GCP IAM Recommender
  • GCP IAM Troubleshooter
  • GCP IAM Audit Logs
  • Best practices, including separation of duties and least privilege, the use of Google groups in policies, and avoiding the use of primitive roles
  • Labs: Configuring Cloud IAM, including custom roles and organization policies

Module 4 Configuring Google Virtual Private Cloud for Isolation and Security

  • Configuring VPC firewalls (both ingress and egress rules)
  • Load balancing and SSL policies
  • Private Google API access
  • SSL proxy use
  • Best practices for VPC networks, including peering and shared VPC use, correct use of subnetworks
  • Best security practices for VPNs
  • Security considerations for interconnect and peering options
  • Available security products from partners
  • Defining a service perimeter, including perimeter bridges
  • Setting up private connectivity to Google APIs and services
  • Lab: Configuring VPC firewalls

PART II: SECURITY BEST PRACTICES ON GOOGLE CLOUD

Module 5 Securing Compute Engine: techniques and best practices

  • Compute Engine service accounts, default and customer-defined
  • IAM roles for VMs
  • API scopes for VMs
  • Managing SSH keys for Linux VMs
  • Managing RDP logins for Windows VMs
  • Organization policy controls: trusted images, public IP address, disabling serial port
  • Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys
  • Finding and remediating public access to VMs
  • Best practices, including using hardened custom images, custom service accounts (not the default service account), tailored API scopes, and the use of application default credentials instead of user-managed keys
  • Lab: Configuring, using, and auditing VM service accounts and scopes
  • Encrypting VM disks with customer-supplied encryption keys
  • Lab: Encrypting disks with customer-supplied encryption keys
  • Using Shielded VMs to maintain the integrity of virtual machines

Module 6 Securing cloud data: techniques and best practices

  • Cloud Storage and IAM permissions
  • Cloud Storage and ACLs
  • Auditing cloud data, including finding and remediating publicly accessible data
  • Signed Cloud Storage URLs
  • Signed policy documents
  • Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys
  • Best practices, including deleting archived versions of objects after key rotation
  • Lab: Using customer-supplied encryption keys with Cloud Storage
  • Lab: Using customer-managed encryption keys with Cloud Storage and Cloud KMS
  • BigQuery authorized views
  • BigQuery IAM roles
  • Best practices, including preferring IAM permissions over ACLs
  • Lab: Creating a BigQuery authorized view

Module 7 Securing Applications: techniques and best practices

  • Types of application security vulnerabilities
  • DoS protections in App Engine and Cloud Functions
  • Cloud Security Scanner
  • Lab: Using Cloud Security Scanner to find vulnerabilities in an App Engine application
  • Identity Aware Proxy
  • Lab: Configuring Identity Aware Proxy to protect a project

Module 8 Securing Kubernetes: techniques and best practices

  • Authorization
  • Securing Workloads
  • Securing Clusters
  • Logging and Monitoring

PART III: MITIGATING VULNERABILITIES IN GOOGLE CLOUD

Module 9 Protecting against Distributed Denial of Service Attacks

  • How DDoS attacks work
  • Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor (including its rules language)
  • Types of complementary partner products
  • Lab: Configuring GCLB, CDN, traffic blacklisting with Cloud Armor

Module 10 Protecting against content-related vulnerabilities

  • Threat: Ransomware
  • Mitigations: Backups, IAM, Data Loss Prevention API
  • Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content
  • Threat: Identity and Oauth phishing
  • Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API
  • Lab: Redacting Sensitive Data with Data Loss Prevention API

Module 11 Monitoring, Logging, Auditing, and Scanning

  • Security Command Center
  • Stackdriver monitoring and logging
  • Lab: Installing Stackdriver agents
  • Lab: Configuring and using Stackdriver monitoring and logging
  • VPC flow logs
  • Lab: Viewing and using VPC flow logs in Stackdriver
  • Cloud audit logging
  • Lab: Configuring and viewing audit logs in Stackdriver
  • Deploying and Using Forseti
  • Lab: Inventorying a Deployment with Forseti Inventory (demo)
  • Lab: Scanning a Deployment with Forseti Scanner (demo)
Prerequisites & Audience

To get the most out of this course, participants should have:

  • Prior completion of or equivalent experience
  • Prior completion of or equivalent experience
  • Knowledge of foundational concepts in information security:
    • Fundamental concepts:
      • vulnerability, threat, attack surface
      • confidentiality, integrity, availability
    • Common threat types and their mitigation strategies
    • Public-key cryptography
      • Public and private key pairs
      • Certificates
      • Cipher types
      • Key width
    • Certificate authorities
    • Transport Layer Security/Secure Sockets Layer encrypted communication
    • Public key infrastructures
    • Security policy
  • Basic proficiency with command-line tools and Linux operating system environments
  • Systems Operations experience, including deploying and managing applications, either on-premises or in a public cloud environment
  • Reading comprehension of code in Python or JavaScript
Course Benefits

This course teaches participants the following skills:

  • Understanding the Google approach to security
  • Managing administrative identities using Cloud Identity.
  • Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM.
  • Implementing IP traffic controls using VPC firewalls and Cloud Armor
  • Implementing Identity Aware Proxy
  • Analyzing changes to the configuration or metadata of resources with GCP audit logs
  • Scanning for and redact sensitive data with the Data Loss Prevention API
  • Scanning a GCP deployment with Forseti
  • Remediating important types of vulnerabilities, especially in public access to data and VMs
Course Topics

This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution. Participants also learn mitigation techniques for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use.

Google courses


Cloud Digital Leader
CODE: WGAC-GGL-CDL
Data Integration with Cloud Data Fusion
CODE: WGAC-GGL-DICDF
Preparing for Your Professional Cloud Network Engineer Journey
CODE: WGAC-GGL-PYPCNEJ
Deploying and Managing Windows Workloads on Google Cloud
CODE: WGAC-GGL-DMWWGC
Installing and Managing Google Cloud's Apigee API Platform for Private Cloud
CODE: WGAC-GGL-IMAPIPC
Customer Experiences with Contact Center AI - Dialogflow CX
CODE: WGAC-GGL-CCAIDCX
Customer Experiences with Contact Center AI - Dialogflow ES
CODE: WGAC-GGL-CCAIDES
Application Development with Cloud Run
CODE: WGAC-GGL-ADCR
Serverless Data Processing with Dataflow
CODE: WGAC-GGL-SDPF
Developing Data Models with LookML
CODE: WGAC-GGL-DDMLML
Analyzing and Visualizing Data with Looker
CODE: WGAC-GGL-AVDL
Machine Learning on Google Cloud
CODE: WGAC-GGL-MLGC
Developing APIs with Google Cloud's Apigee API platform
CODE: WGAC-GGL-T-APIENG-B
Managing Google Cloud's Apigee API Platform for Hybrid Cloud
CODE: WGAC-GGL-T-APIHYB-B
Logging, Monitoring, and Observability in Google Cloud
CODE: WGAC-GGL-LMOGC
Security in Google Cloud Platform
CODE: WGAC-GGL-SGCP-3D
Google Cloud Fundamentals for Azure Professionals
CODE: WGAC-GGL-GCPAZURE
Preparing for the Associate Cloud Engineer Examination
CODE: WGAC-GGL-PPACE
Architecting Hybrid Cloud Infrastructure with Anthos
CODE: WGAC-GGL-T-AHYBRID-I
Architecting with Google Kubernetes Engine
CODE: WGAC-GGL-AGKE
Architecting with Google Compute Engine
CODE: WGAC-GGL-AGCE
Preparing for the Professional Data Engineer Examination
CODE: WGAC-GGL-PPDEE
Networking in Google Cloud Platform
CODE: WGAC-GGL-NGCP
Preparing for the Professional Cloud Architect Examination
CODE: WGAC-GGL-PPCAE
Getting Started with Google Kubernetes Engine
CODE: WGAC-GGL-GCP-GSGKE
Google Cloud Platform Fundamentals for AWS Professionals
CODE: WGAC-GGL-GCP-FAP
Developing Applications with Google Cloud Platform
CODE: WGAC-GGL-DAGCP
From Data to Insights with Google Cloud Platform
CODE: WGAC-GGL-DIGCP
Data Engineering on Google Cloud Platform
CODE: WGAC-GGL-DEGCP
Google Cloud Fundamentals: Big Data and Machine Learning
CODE: WGAC-GGL-GCF-BDM
Architecting with Google Cloud Platform: Design and Process
CODE: WGAC-GGL-AGCP-DP
Google Cloud Fundamentals: Core Infrastructure
CODE: WGAC-GGL-GCF-CI
We use cookies to understand how you use our site and to improve your experience. To learn more, click here. Read our revised Privacy Policy and Terms and Conditions.