Google Cloud Security Best Practices Crash Course

Best Practices for Securing Google Cloud Resources and Data

Whether you are a software developer, database administrator, DevOps engineer, data engineer, network engineer or architect, security is part of your job. This course gives you an overview of key security controls and services in Google Cloud and when to use them to protect resources and data.  This course includes best practices for:

What you’ll learn

  • Use Identity and Access Management (IAM) to control access to resources Google Cloud.
  • Use organization policies to control what can be done with resources in Google Cloud.
  • Implement best practices to improve application and operations security.
  • Apply security best practices for Compute Engine, Google Kubernetes Engine (GKE), and other Google Cloud services..
  • Use Data Loss Prevention service to protect sensitive and private data.
  • Choose among Google Cloud security controls for a variety of security requirements.

Course Content

  • Introduction –> 1 lecture • 4min.
  • Access Controls –> 7 lectures • 49min.
  • Application Security –> 5 lectures • 26min.
  • Data Protection –> 4 lectures • 21min.
  • Securing Compute Engine and Google Kubernetes Engine –> 5 lectures • 18min.
  • Networking Security in Google Cloud –> 5 lectures • 17min.
  • Conclusion –> 1 lecture • 3min.

Google Cloud Security Best Practices Crash Course

Requirements

Whether you are a software developer, database administrator, DevOps engineer, data engineer, network engineer or architect, security is part of your job. This course gives you an overview of key security controls and services in Google Cloud and when to use them to protect resources and data.  This course includes best practices for:

  • Managing identities including service accounts and federated identities
  • Controlling access to resource using IAM roles
  • Using organization policies to ensure consistent compliance with security policies
  • Protecting web applications against security risks
  • Using Apigee to protect APIs
  • Building secure containers
  • Securely managing secrets, such as passwords, API keys, and credentials
  • Protecting data in Cloud Storage as well as databases
  • Preventing data exfiltration using. Google Cloud’s Data Loss Prevention (DLP) service
  • Securing Compute Engine instances and Google Kubernetes Engine clusters
  • Using network security controls including Cloud NAT, Cloud Armor, Identity-Aware Proxy, and VPC Service Controls

This course is designed for those who are new to Google Cloud or want additional exposure to recommended ways to protect data and resources in Google Cloud.  The course present an overview of principles, patterns, and practices that will help you improve the security of your Google Cloud environments.

This course does not delve into implementation details, such as the syntax of gcloud commands to implement a security measure on a virtual machine.  Implementation details are covered in other courses, particularly the Google Cloud Associate Engineer: Get Certified course.

Let’s dive into learning about a variety of important best practices for protecting your Google Cloud environment.

Get Tutorial