Target Audience

Designed for cloud professionals:
• Security analysts, architects, and engineers.
• Cybersecurity specialists ensuring robust protections.
• Cloud architects embedding security in infrastructure designs

COURSE AGENDA

Foundations of Google Cloud Security

  • Understand Google Cloud’s approach to security.
  • Learn about the shared security responsibility model.
  • Explore threats mitigated by Google and Google Cloud.
  • Discover the concept of Access Transparency.

Securing Access to Google Cloud

  • Explore identity solutions like Cloud Identity and Google Cloud Directory Sync.
  • Learn about Managed Microsoft AD and compare Google authentication with SAML-based SSO.
  • Understand the Identity Platform and authentication best practices.

Identity, Access & Key Management (IAM)

  • Use the Resource Manager to organize resources.
  • Understand IAM roles, service accounts, and organization policies.
  • Explore workload identity federation and policy intelligence tools.

Module 4: Configuring Virtual Private Cloud for Isolation & Security

  • Secure your VPC using firewalls, load balancing, and SSL policies.
  • Learn about interconnect and peering options for network security.
  • Use tools like VPC Service Controls, Access Context Manager, VPC flow logs, and Cloud IDS for enhanced isolation and monitoring.

Securing Compute Engine: Techniques & Best Practices

  • Manage access using service accounts, IAM roles, and API scopes.
  • Implement secure VM login management and enforce organization policies.
  • Leverage Shielded VMs, Confidential VMs, and the Certificate Authority Service.
  • Explore best practices for securing Compute Engine resources.

Securing Cloud Data: Techniques & Best Practices

  • Manage access with IAM permissions and ACLs for Cloud Storage.
  • Audit cloud data and use Signed URLs and policy documents.
  • Encrypt data with CMEK, CSEK, and Cloud HSM.
  • Secure BigQuery with IAM roles, authorized views, and storage best practices.

Securing Applications: Techniques & Best Practices

  • Identify common application security vulnerabilities.
  • Use tools like the Web Security Scanner to mitigate risks.
  • Protect against threats like identity and OAuth phishing using Identity-Aware Proxy.
  • Manage sensitive data with Secret Manager.

Securing Google Kubernetes Engine: Techniques & Best Practices

  • Implement authentication and authorization for Kubernetes.
  • Harden clusters and secure workloads.
  • Monitor and log Kubernetes activities for enhanced security.

Protecting Against Distributed Denial of Service Attacks (DDoS)

  • Understand how DDoS attacks work and Google Cloud’s mitigation strategies.
  • Learn about complementary partner products for DDoS protection.

Content-related Vulnerabilities: Techniques & Best Practices

  • Mitigate threats like ransomware, data misuse, and privacy violations.
  • Use the DLP API to redact sensitive data.
  • Explore content-related mitigations for protecting sensitive content.

Monitoring, Logging, Auditing & Scanning

  • Utilize tools like the Security Command Center for security automation.
  • Monitor and log activities with Cloud Monitoring, Cloud Logging, and Cloud Audit Logs.
  • Implement effective security scanning and auditing techniques.

CONTACT US TO START YOUR GOOGLE CLOUD JOURNEY