Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Google

Mitigating Security Vulnerabilities on Google Cloud

Google via Google Cloud Skills Boost

Overview

In this self-paced training course, participants learn mitigations for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. They also learn about the Security Command Center, cloud logging and audit logging, and using Forseti to view overall compliance with your organization's security policies.

Syllabus

  • Welcome to Mitigating Security Vulnerabilities on Google Cloud
    • Welcome and Getting Started Guide!
  • Protecting against Distributed Denial of Service Attacks (DDoS)
    • Module overview
    • How DDoS attacks work
    • DDoS mitigation and prevention on Google Cloud
    • Using Google Cloud Armor
    • Types of complementary partner products
    • Lab Intro: Configuring Traffic Blocklisting with Google Cloud Armor
    • Configuring Traffic Blocklisting with Google Cloud Armor
    • Module review
    • Quiz: Protecting against DDoS Attacks
  • Content-Related Vulnerabilities: Techniques and Best Practices
    • Module overview
    • Threat: Ransomware
    • Ransomware mitigations
    • Threats: Data misuse, privacy violations, sensitive content
    • Content-related mitigation
    • Lab Intro: Redacting Sensitive Data with the DLP API
    • Redacting Sensitive Data with the DLP API
    • Module review
    • Quiz: Content-Related Vulnerabilities
  • Monitoring, Logging, Auditing and Scanning
    • Module overview
    • Security Command Center
    • Tiers and pricing
    • Demo: Using Security Command Center
    • Cloud Monitoring and Cloud Logging
    • Lab Intro: Configuring and Using Cloud Logging and Cloud Monitoring
    • Configuring and Using Cloud Logging and Cloud Monitoring
    • Cloud Audit Logs
    • Lab Intro: Configuring and Viewing Cloud Audit Logs
    • Configuring and Viewing Cloud Audit Logs
    • Cloud security automation
    • Module review
    • Module Quiz
  • Course Resources
    • Mitigating Vulnerabilities on Google Cloud Course Resources
  • Your Next Steps
    • Course Badge

Reviews

Start your review of Mitigating Security Vulnerabilities on Google Cloud

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.