Course subjects
Module 1: Foundations of Google Cloud Security
Google Cloud’s approach to security
The shared security responsibility model
Threats mitigated by Google and Google Cloud
Access transparency
Module 2: Securing Access to Google Cloud
Cloud Identity
Google Cloud Directory Sync
Managed Microsoft AD
Google authentication versus SAML-based SSO
Identity Platform
Authentication best practices
Demo: Defining Users with Cloud Identity Console
Module 3: Identity and Access Management (IAM)
Module 4: Configuring Virtual Private Cloud for Isolation and Security
VPC firewalls
Load balancing and SSL policies
Interconnect and Peering options
VPC Service Controls
Access Context Manager
VPC Flow Logs
Cloud IDS
Lab: Configuring VPC Firewalls
Lab: Configuring and Using VPC Flow Logs in Cloud Logging
Demo: Securing Projects with VPC Service Controls
Lab: Getting Started with Cloud IDS
Module 5: Securing Compute Engine: Techniques and Best Practices
Service accounts, IAM roles, and API scopes
Managing VM logins
Organisation policy controls
Shielded VMs and Confidential VMs
Certificate Authority Service
Compute Engine best practices
Lab: Configuring, Using, and Auditing VM Service Accounts and Scopes
Module 6: Securing Cloud Data: Techniques and Best Practices
Cloud Storage IAM permissions, and ACLs
Auditing cloud data
Signed URLs and policy documents
Encrypting with CMEK and CSEK
Cloud HSM
BigQuery IAM roles and authorised views
Storage best practices
Lab: Using Customer-Supplied Encryption Keys with Cloud Storage
Lab: Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS
Lab: Creating a BigQuery Authorised View
Module 7: Securing Applications: Techniques and Best Practices
Types of application security vulnerabilities
Web Security Scanner
Threat: Identity and Oauth phishing
Identity-Aware Proxy
Secret Manager
Lab: Using Web Security Scanner to Find Vulnerabilities in an App Engine Application
Lab: Securing Compute Engine Applications with BeyondCorp Enterprise
Lab: Configuring and Using Credentials with Secret Manager
Module 8: Securing Google Kubernetes Engine: Techniques and Best Practices
Module 9: Protecting Against Distributed Denial of Service Attacks (DDoS)
Module 10: Content-Related Vulnerabilities: Techniques and Best Practice
Threat: Ransomware
Ransomware mitigations
Threats: Data misuse, privacy violations, sensitive content
Content-related mitigation
Redacting Sensitive Data with the DLP API
Lab: Redacting Sensitive Data with the DLP API
Module 11: Monitoring, Logging, Auditing, and Scanning
Security Command Center
Cloud Monitoring and Cloud Logging
Cloud Audit Logs
Cloud security automation
Lab: Configuring and Using Cloud Monitoring and Cloud Logging
Lab: Configuring and Viewing Cloud Audit Logs