Description
Introduction of Google Infrastructure &Security Management
Google Infrastructure &Security Management course is a deep insights into managing and securing infrastructure on Google Cloud Platform (GCP). This course covers core concepts, tools, and best practices for building, securing, and optimizing cloud environments.
Prerequisites
- Familiarity with cloud computing fundamentals.
- Basic understanding of networking and IT security concepts.
- Prior experience with GCP is helpful but not mandatory.
Table of contents
- Overview of Google Cloud Infrastructure
1.1 Understanding GCP Global Infrastructure: Regions, Zones, and Networks
1.2 Core Services Overview: Compute, Storage, and Networking
1.3 Billing, Quotas, and Resource Management - Google Cloud Security Fundamentals
2.1 Shared Responsibility Model in GCP
2.2 Identity and Access Management (IAM)
2.3 Encryption in Transit and At Rest: Key Management with Cloud KMS - Network and Application Security
3.1 Configuring Virtual Private Cloud (VPC) for Secure Access(Ref: Building a Secure Cloud: Architecting for Security in AWS, Azure, and Google Cloud)
3.2 Network Firewalls, Security Rules, and Load Balancers
3.3 Securing APIs with Cloud Endpoints and Apigee - Securing Workloads and Applications
4.1 Container Security with GKE and Anthos
4.2 Building and Deploying Secure Serverless Applications
4.3 Hardening VM Instances and OS-level Security - Compliance and Governance
5.1 Policy Enforcement with Organization Policies
5.2 Meeting Compliance Requirements: PCI-DSS, GDPR, and HIPAA
5.3 Monitoring Compliance with Cloud Security Command Center - Monitoring, Logging, and Incident Management
6.1 Cloud Operations Suite: Monitoring, Logging, and Trace
6.2 Setting Up Alerts and Dashboards for Proactive Security
6.3 Managing Incidents with Security Command Center and Cloud Pub/Sub - Advanced Security Practices
7.1 DDoS Protection with Cloud Armor
7.2 Implementing Zero Trust Architecture
7.3 Automating Security Workflows with Cloud Functions and Pub/Sub - Capstone Project
8.1 Designing a Secure, Scalable GCP Architecture
8.2 Implementing Security Best Practices Across Services
8.3 Validating Security and Compliance with GCP Tools
Reviews
There are no reviews yet.