DevSecOps in GCP
DevSecOps
| Intermediate
- 16 videos | 1h 26m 34s
- Includes Assessment
- Earns a Badge
Google Cloud Platform (GCP) is a suite of cloud computing services that runs on the same infrastructure that Google uses internally for its end-user products and includes a range of hosted services for compute, storage, and application development. In this course, you will explore the security, privacy, and compliance features of the GCP. Discover the five layers of GCP security, including cloud infrastructure, products and services, blueprints for security posture, workload, and applications, and solution packages. Investigate the tenants of GCP, including secure-by-design, the Security Operations Suite, zero trust security, and continuous integration and continuous delivery (CI/CD). Finally, find out how the Google Cloud Logging service can be used to review data for the DevSecOps pipeline.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseProvide an overview of the gcp and its features and compare it to other solutions including on-premises, azure, and awsProvide an overview of gcp security, privacy, and compliance featuresDifferentiate between on-premises security and gcp security and outline some of the barriers of adopting gcp devsecopsOutline the five layers of gcp security, including cloud infrastructure, products and services, security blueprint, blueprints for security posture, workload, and applications, and solution packagesProvide an overview of how you can use the security foundations blueprintDescribe how involving security teams in the devops process allows them to provide expertise, tools, and frameworksOutline the secure-by-design foundation and how it can be used to improve risk management
-
Recognize how the chronicle security operations suite can be used to detect, investigate, and respond to threatsDescribe how gcp enables organizations to implement a zero trust approachDescribe how gcp uses a hierarchy to organize resources allowing for greater job-specific accessList strategies for injecting security into a pipeline, such as identifying test points, determining secrets, and encrypting dataDescribe how the google cloud logging service can be used to review data for the devsecops pipelineOutline platform-specific security best practices and recommendations for gcpDescribe some platform-specific tools used to help implement devsecops in gcpSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 5sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
6m 4sAfter completing this video, you will be able to provide an overview of the GCP and its features and compare it to other solutions including on-premises, Azure, and AWS. FREE ACCESS
-
6m 11sUpon completion of this video, you will be able to provide an overview of GCP security, privacy, and compliance features. FREE ACCESS
-
6m 42sAfter completing this video, you will be able to differentiate between on-premises security and GCP security and outline some of the barriers of adopting GCP DevSecOps. FREE ACCESS
-
5m 31sUpon completion of this video, you will be able to outline the five layers of GCP security, including cloud infrastructure, products and services, security blueprint, blueprints for security posture, workload, and applications, and solution packages. FREE ACCESS
-
6m 10sAfter completing this video, you will be able to provide an overview of how you can use the security foundations blueprint. FREE ACCESS
-
6m 26sUpon completion of this video, you will be able to describe how involving security teams in the DevOps process allows them to provide expertise, tools, and frameworks. FREE ACCESS
-
5m 36sAfter completing this video, you will be able to outline the secure-by-design foundation and how it can be used to improve risk management. FREE ACCESS
-
6m 27sUpon completion of this video, you will be able to recognize how the Chronicle Security Operations suite can be used to detect, investigate, and respond to threats. FREE ACCESS
-
6mAfter completing this video, you will be able to describe how GCP enables organizations to implement a zero trust approach. FREE ACCESS
-
6m 9sUpon completion of this video, you will be able to describe how GCP uses a hierarchy to organize resources allowing for greater job-specific access. FREE ACCESS
-
6m 11sAfter completing this video, you will be able to list strategies for injecting security into a pipeline, such as identifying test points, determining secrets, and encrypting data. FREE ACCESS
-
5m 46sUpon completion of this video, you will be able to describe how the Google Cloud Logging service can be used to review data for the DevSecOps pipeline. FREE ACCESS
-
6mAfter completing this video, you will be able to outline platform-specific security best practices and recommendations for GCP. FREE ACCESS
-
5m 24sUpon completion of this video, you will be able to describe some platform-specific tools used to help implement DevSecOps in GCP. FREE ACCESS
-
51sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.