Course Details
Course Outline
1 - Foundations of GCP Security
Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency
2 - Cloud Identity
Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices
3 - Identity and Access Management
GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices
4 - Configuring Google Virtual Private Cloud for Isolation and Security
Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering optionsAvailable security products from partners
5 - Monitoring, Logging, Auditing, and Scanning
Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti
6 - Securing Compute Engine: techniques and best practices
Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys
7 - Securing cloud data: techniques and best practices
Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLsSigned policy documentsEncrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keysBest practices, including deleting archived versions of objects after key rotationBigQuery authorized viewsBigQuery IAM rolesBest practices, including preferring IAM permissions over ACLs
8 - Protecting against Distributed Denial of Service Attacks: techniques and best practices
How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products
9 - Application Security: techniques and best practices
Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security ScannerThreat: Identity and Oauth phishingIdentity Aware Proxy
10 - Content-related vulnerabilities: techniques and best practices
Threat: RansomwareMitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
This class is intended for the following job roles:
[Cloud] information security analysts, architects, and engineers
Information security/cybersecurity specialists
Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles.
The course should also be useful to developers of cloud applications
Prerequisites
Other Prerequisites
To get the most out of this course, participants should have:
Prior completion of Google Cloud Platform Fundamentals: Core Infrastructure or equivalent experience
Prior completion of Networking in Google Cloud Platform or equivalent experience
Knowledge of foundational concepts in information security:
Fundamental concepts:
vulnerability, threat, attack surface
confidentiality, integrity, availability
Common threat types and their mitigation strategies
Public-key cryptography
Public and private key pairs
Certificates
Cipher types
Key width
Certificate authorities
Transport Layer Security/Secure Sockets Layer encrypted communication
Public key infrastructures
Security policy
Basic proficiency with command-line tools and Linux operating system environments
Systems Operations experience, including deploying and managing applications, either on-premises or in a public cloud environment
Reading comprehension of code in Python or JavaScript