Earn a skill badge by completing the Build and Secure Networks in Google Cloud quest, where you will learn about multiple networking-related resources to build, scale, and secure your applications on Google Cloud, including how to: 1. Enable Identity-Aware Proxy. 2. Create VPC networks. 3. Create virtual machine instances with nginx web servers using Compute Engine. 4. Create firewall rules to control internal and external access to your VMs. 5. Configure, stress, and protect a multi-region HTTP application with an HTTP load balancer and Google Cloud Armor. 6. Configure and test an internal TCP load balancer with a regional backend service. A skill badge is an exclusive digital badge issued by Google Cloud in recognition of your proficiency with Google Cloud products and services and tests your ability to apply your knowledge in an interactive hands-on environment. Complete the skill badge quest, and final assessment challenge lab, to receive a digital badge that you can share with your network.
User Authentication: Identity-Aware Proxy
Learn how to restrict access selected authenticated users with Identity-Aware Proxy without special programming. Discover how to retrieve user identity information from IAP.
Multiple VPC Networks
In this lab, you create several VPC networks and VM instances and test connectivity across networks.
VPC Networks - Controlling Access
In this lab, you create two nginx web servers and control external HTTP access to the web servers using tagged firewall rules. Then, you explore IAM policies and service accounts.
HTTP Load Balancer with Cloud Armor
In this lab, you configure an HTTP Load Balancer with global backends. Then, you stress test the Load Balancer and blacklist the stress test IP with Cloud Armor.
Create an Internal Load Balancer
In this lab, you create two managed instance groups in the same region. Then, you configure an Internal Load Balancer with the instances groups as the backends.
Build and Secure Networks in Google Cloud: Challenge Lab
In this lab you will be challenged to secure remote SSH access and implement firewall rules.