In this self-paced training course, participants learn mitigations for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. They also learn about the Security Command Center, cloud logging and audit logging, and using Forseti to view overall compliance with your organization's security policies.
Overview
In this self-paced training course, participants learn mitigations for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. They also learn about the Security Command Center, cloud logging and audit logging, and using Forseti to view overall compliance with your organization's security policies.
Syllabus
- Welcome to Mitigating Security Vulnerabilities on Google Cloud 0mins
- Welcome to Mitigating Security Vulnerabilities on Google Cloud 0mins
- Protecting against Distributed Denial of Service Attacks (DDoS) 14mins
- Protecting against Distributed Denial of Service Attacks (DDoS) 14mins
- Content-Related Vulnerabilities: Techniques and Best Practices 12mins
- Content-Related Vulnerabilities: Techniques and Best Practices 12mins
- Monitoring, Logging, Auditing and Scanning 25mins
- Monitoring, Logging, Auditing and Scanning 25mins
- Course Resources 0mins
- Course Resources 0mins
Taught by
Google Cloud