This self-paced training course offers an in-depth study of security controls and techniques in Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, you'll learn to deploy and manage secure Google Cloud solutions, including components such as Cloud Identity, Resource Manager, Identity and Access Management (IAM), Virtual Private Cloud firewalls, Cloud Load Balancing, Direct Peering, Carrier Peering, Cloud Interconnect, and VPC Service Controls.
Key Features:
-
RPS Consulting’s Google Cloud Security Training is highly regarded for professionals seeking to enhance their skills and advance their careers.
-
The 11-module OEM-certified course provides a comprehensive understanding of mitigating attacks and securing Google Cloud-based services.
-
Gain expertise in identifying, exploiting, and preventing common vulnerabilities, especially related to dynamic code execution.
-
Learn to protect the confidentiality, integrity, and availability of user data and manage security threats across services like G Suite, Google Cloud Platform, and Google Cloud Endpoints.
-
The course includes hands-on labs and is available on demand, with sessions led by certified instructors.
Course Prerequisites
To successfully undertake the Cloud Security Engineer course, it is recommended that learners have the following minimum required knowledge and skills:
-
Basic understanding of cloud computing concepts: Familiarity with fundamental cloud principles and services will help you grasp the course content effectively.
-
General knowledge of IT security concepts: A foundational understanding of security principles and best practices is essential for applying security measures in the cloud environment.
-
Experience with Google Cloud Platform (GCP): While not mandatory, some hands-on experience using GCP will enhance your learning experience. It is beneficial to have familiarity with navigating the GCP Console and its services.
-
Networking concepts: Basic knowledge of networking basics, such as IP addresses, subnets, and firewalls, will be advantageous since these concepts are integral to cloud security.
These prerequisites are designed to ensure that participants can engage with the material effectively and maximize their learning outcomes. If you meet these criteria, you are well-prepared to embark on your journey in Cloud Security Engineering!
Target Audience
The Cloud Security Engineer course equips professionals with essential skills to design, configure, and manage secure solutions on Google Cloud, catering to individuals aiming to enhance their cloud security expertise.
-
Cloud Security Professionals
-
Security Engineers
-
Cloud Architects
-
Systems Administrators
-
DevOps Engineers
-
Compliance Officers
-
IT Managers
-
Network Security Specialists
-
Solutions Architects
-
Data Protection Officers
-
Cybersecurity Analysts
-
Application Developers
-
IT Consultants
-
Business Continuity Managers
-
Risk Management Professionals
Course Outline
Module 1: Preparing for Your Professional Cloud Security Engineer Journey
Topics:
Module 2: Google Cloud Fundamentals: Core Infrastructure
Topics:
-
Introducing Google Cloud
-
Resources and Access in the Cloud
-
Virtual Machines and Networks in the Cloud
-
Storage in the Cloud
-
Containers in the Cloud
-
Applications in the Cloud
-
Developing and Deploying in the Cloud
-
Logging and Monitoring in the Cloud
Hands-On:
-
A Tour of Google Cloud Hands-on Labs
-
Compute Engine: Qwik Start - Windows
-
Getting Started with Cloud Shell and gcloud
-
Kubernetes Engine: Qwik Start
-
Cloud Storage: Qwik Start - Cloud Console
Module 3: Networking in Google Cloud: Defining and Implementing Networks
Topics:
-
Google Cloud VPC Networking Fundamentals
-
Controlling Access to VPC Networks
-
Sharing Networks Across Projects
-
Load Balancing
Hands-On:
-
Multiple VPC Networks
-
VPC Network Peering
-
VPC Networks - Controlling Access
-
HTTP Load Balancer with Cloud Armor
-
Create an Internal Load Balancer
Module 4: Managing Security in Google Cloud
Topics:
-
Foundations of Google Cloud Security
-
Cloud Identity
-
Identity and Access Management (IAM)
-
Configuring Virtual Private Cloud for Isolation and Security
Hands-On:
-
Cloud IAM: Qwik Start
-
IAM Custom Roles
-
Service Accounts and Roles: Fundamentals
-
User Authentication: Identity-Aware Proxy
-
Getting Started with Cloud KMS
-
Setting up a Private Kubernetes Cluster
Module 5: Logging, Monitoring, and Observability in Google Cloud
Topics:
-
Introduction to Monitoring in Google Cloud
-
Avoiding Customer Pain
-
Alerting Policies
-
Monitoring Critical Systems
-
Configuring Google Cloud Services for Observability
-
Advanced Logging and Analysis
-
Monitoring Network Security and Audit Logs
-
Managing Incidents
-
Investigating Application Performance Issues
-
Optimizing the Costs of Monitoring
Hands-On:
Module 6: Security Best Practices in Google Cloud
Topics:
-
Securing Compute Engine: Techniques and Best Practices
-
Securing Cloud Data: Techniques and Best Practices
-
Application Security: Techniques and Best Practices
-
Securing Kubernetes: Techniques and Best Practices
Hands-On:
-
Migrating to GKE Containers
-
How to Use a Network Policy on Google Kubernetes Engine
-
Using Role-based Access Control in Kubernetes Engine
-
Google Kubernetes Engine Security: Binary Authorization
-
Securing Applications on Kubernetes Engine - Three Examples
-
Hardening Default GKE Cluster Configurations
Module 7: Mitigating Security Vulnerabilities on Google Cloud Platform
Topics:
Hands-On:
-
Configuring, Using, and Auditing VM Service Accounts and Scopes
-
Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS
-
Configuring Traffic Blocklisting with Google Cloud Armor
-
Using Web Security Scanner to Find Vulnerabilities in an App Engine Application