Cloud Security
Security in Google Cloud
Ready to enhance your cloud security? Dive into Google Cloud’s tools and techniques for monitoring, logging, auditing, and scanning while mastering best practices for a secure and resilient environment
3 Days

Target Audience
Designed for cloud professionals:
• Security analysts, architects, and engineers.
• Cybersecurity specialists ensuring robust protections.
• Cloud architects embedding security in infrastructure designs
What you'll learn
Security Foundations:
Understand core principles, IAM, and secure VPC, Compute Engine, and GKE setups.
Data & Application Security:
Apply best practices to protect data, applications, and mitigate vulnerabilities.
Monitoring & Defense:
Use tools for monitoring, auditing, and defending against DDoS attacks.

Prerequisites for Success
Prerequisites for Success
Participants should have foundational knowledge of information security, experience with Linux and command-line tools, systems operations experience, and familiarity with Python or JavaScript. Completion of Google Cloud Fundamentals: Core Infrastructure and Networking in Google Cloud is recommended, as is a basic understanding of Kubernetes

COURSE AGENDA
Foundations of Google Cloud Security
- Understand Google Cloud’s approach to security.
- Learn about the shared security responsibility model.
- Explore threats mitigated by Google and Google Cloud.
- Discover the concept of Access Transparency.
Securing Access to Google Cloud
- Explore identity solutions like Cloud Identity and Google Cloud Directory Sync.
- Learn about Managed Microsoft AD and compare Google authentication with SAML-based SSO.
- Understand the Identity Platform and authentication best practices.
Identity, Access & Key Management (IAM)
- Use the Resource Manager to organize resources.
- Understand IAM roles, service accounts, and organization policies.
- Explore workload identity federation and policy intelligence tools.
Module 4: Configuring Virtual Private Cloud for Isolation & Security
- Secure your VPC using firewalls, load balancing, and SSL policies.
- Learn about interconnect and peering options for network security.
- Use tools like VPC Service Controls, Access Context Manager, VPC flow logs, and Cloud IDS for enhanced isolation and monitoring.
Securing Compute Engine: Techniques & Best Practices
- Manage access using service accounts, IAM roles, and API scopes.
- Implement secure VM login management and enforce organization policies.
- Leverage Shielded VMs, Confidential VMs, and the Certificate Authority Service.
- Explore best practices for securing Compute Engine resources.
Securing Cloud Data: Techniques & Best Practices
- Manage access with IAM permissions and ACLs for Cloud Storage.
- Audit cloud data and use Signed URLs and policy documents.
- Encrypt data with CMEK, CSEK, and Cloud HSM.
- Secure BigQuery with IAM roles, authorized views, and storage best practices.
Securing Applications: Techniques & Best Practices
- Identify common application security vulnerabilities.
- Use tools like the Web Security Scanner to mitigate risks.
- Protect against threats like identity and OAuth phishing using Identity-Aware Proxy.
- Manage sensitive data with Secret Manager.
Securing Google Kubernetes Engine: Techniques & Best Practices
- Implement authentication and authorization for Kubernetes.
- Harden clusters and secure workloads.
- Monitor and log Kubernetes activities for enhanced security.
Protecting Against Distributed Denial of Service Attacks (DDoS)
- Understand how DDoS attacks work and Google Cloud’s mitigation strategies.
- Learn about complementary partner products for DDoS protection.
Content-related Vulnerabilities: Techniques & Best Practices
- Mitigate threats like ransomware, data misuse, and privacy violations.
- Use the DLP API to redact sensitive data.
- Explore content-related mitigations for protecting sensitive content.
Monitoring, Logging, Auditing & Scanning
- Utilize tools like the Security Command Center for security automation.
- Monitor and log activities with Cloud Monitoring, Cloud Logging, and Cloud Audit Logs.
- Implement effective security scanning and auditing techniques.