GOOGLE CLOUD

Security in Google Cloud

This training course gives you a broad study of security controls and techniques in Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, you’ll explore and deploy the components of a secure Google Cloud solution, including Cloud Identity, Resource Manager, Identity and Access Management (IAM), Virtual Private Cloud firewalls, Cloud Load Balancing, Direct Peering, Carrier Peering, Cloud Interconnect, and VPC Service Controls.

What you will learn

  • Understand Google’s approach to security.

  • Manage administration identities using Cloud Identity.

  • Implement least privilege administration using Resource Manager and IAM.

  • Implement Identity-Aware Proxy.

  • Implement IP traffic controls using VPC firewalls and Google Cloud Armor.

  • Remediate security vulnerabilities, especially public access to data and virtual machines.

  • Scan for and redact sensitive data using the Cloud Data Loss Prevention API.

  • Analyze changes to resource metadata configuration using audit logs.

  • Scan a Google Cloud deployment with Forseti, to remediate important types of vulnerabilities, especially in public access to data and VMs.

Who this course is for

  • Cloud information security analysts, architects, and engineers

  • Information security/cybersecurity specialists

  • Cloud infrastructure architects

Prerequisites

  • Prior completion of Google Cloud Fundamentals: Core Infrastructure or equivalent experience

  • Prior completion of Networking in Google Cloud or equivalent experience

  • Basic understanding of Kubernetes terminology (preferred but not required)

  • Knowledge of foundational concepts in information security, through experience or through online training such as SANS’s SEC301: Introduction to Cyber Security

  • Basic proficiency with command-line tools and Linux operating system environments

  • Systems Operations experience, including deploying and managing applications, either on-premises or in a public cloud environment

  • Reading comprehension of code in Python or Javascript

Level

  • Intermediate

Duration

  • 3 x 8 hour sessions

Language

  • Delivered in English

Course TOPICS

Module 1: Foundations of Google Cloud Security

  • Google Cloud’s Approach to Security

  • The Shared Security Responsibility Model

  • Threats Mitigated by Google and Google Cloud

  • Access Transparency

Module 2: Cloud Identity

  • Cloud Identity

  • Google Cloud Directory Sync

  • Google Authentication Versus SAML-based SSO

  • Authentication Best Practices

Module 3: Identity and Access Management (IAM)

  • Resource Manager

  • IAM Roles

  • IAM Policies

  • IAM Recommender

  • IAM Troubleshooter

  • IAM Audit Logs

  • IAM Best Practices

Module 4: Configuring Virtual Private Cloud for Isolation and Security

  • VPC Firewalls

  • Load Balancing and SSL Policies

  • Interconnect and Peering Policies

  • Best Practices for VPC Networks

  • VPC Flow Logs

Module 5: Securing Compute Engine: Techniques and Best Practices

  • Service Accounts, IAM Roles and API Scopes

  • Managing VM Logins

  • Organization Policy Controls

  • Compute Engine Best Practices

  • Encrypting Disks with CSEK

Module 6: Securing Cloud Data: Techniques and Best Practices

  • Cloud Storage IAM permissions and ACLs

  • Auditing Cloud Data

  • Signed URLs and Policy Documents

  • Encrypting with CMEK and CSEK

  • Cloud HSM

  • BigQuery IAM Roles and Authorized Views

  • Storage Best Practices

Module 7: Application Security: Techniques and Best Practices

  • Types of Application Security Vulnerabilities

  • Web Security Scanner

  • Threat: Identity and Oauth Phishing

  • Identity-Aware Proxy

  • Secret Manager

Module 8: Securing Google Kubernetes Engine: Techniques and Best Practices

  • Introduction to Kubernetes/GKE

  • Authentication and Authorization

  • Hardening Your Clusters

  • Securing Your Workloads

  • Monitoring and Logging

Module 9: Protecting against Distributed Denial of Service Attacks (DDoS)

  • How DDoS Attacks Work

  • Google Cloud Mitigations

  • Types of Complementary Partner Products

Module 10: Content-Related Vulnerabilities: Techniques and Best Practices

  • Threat Ransomware

  • Ransomware Mitigations

  • Threats: Data Misuse, Privacy Violations, Sensitive Content

  • Content-Related Mitigations

Module 11: Monitoring, Logging, Auditing, and Scanning

  • Cloud Audit Logs

  • Deploying and Using Forseti

Ref: T-GCPSEC-I-02

Have questions?

No worries. Send us a quick message and we'll be happy to answer any questions you have.

© Copyright 2023. Axalon. All rights reserved.

Facebook site
LinkedIn profile