DevSecOps in GCP

DevSecOps    |    Intermediate
  • 16 videos | 1h 26m 34s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Google Cloud Platform (GCP) is a suite of cloud computing services that runs on the same infrastructure that Google uses internally for its end-user products and includes a range of hosted services for compute, storage, and application development. In this course, you will explore the security, privacy, and compliance features of the GCP. Discover the five layers of GCP security, including cloud infrastructure, products and services, blueprints for security posture, workload, and applications, and solution packages. Investigate the tenants of GCP, including secure-by-design, the Security Operations Suite, zero trust security, and continuous integration and continuous delivery (CI/CD). Finally, find out how the Google Cloud Logging service can be used to review data for the DevSecOps pipeline.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provide an overview of the gcp and its features and compare it to other solutions including on-premises, azure, and aws
    Provide an overview of gcp security, privacy, and compliance features
    Differentiate between on-premises security and gcp security and outline some of the barriers of adopting gcp devsecops
    Outline the five layers of gcp security, including cloud infrastructure, products and services, security blueprint, blueprints for security posture, workload, and applications, and solution packages
    Provide an overview of how you can use the security foundations blueprint
    Describe how involving security teams in the devops process allows them to provide expertise, tools, and frameworks
    Outline the secure-by-design foundation and how it can be used to improve risk management
  • Recognize how the chronicle security operations suite can be used to detect, investigate, and respond to threats
    Describe how gcp enables organizations to implement a zero trust approach
    Describe how gcp uses a hierarchy to organize resources allowing for greater job-specific access
    List strategies for injecting security into a pipeline, such as identifying test points, determining secrets, and encrypting data
    Describe how the google cloud logging service can be used to review data for the devsecops pipeline
    Outline platform-specific security best practices and recommendations for gcp
    Describe some platform-specific tools used to help implement devsecops in gcp
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 5s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 4s
    After completing this video, you will be able to provide an overview of the GCP and its features and compare it to other solutions including on-premises, Azure, and AWS. FREE ACCESS
  • Locked
    3.  Security, Privacy, and Cloud Compliance
    6m 11s
    Upon completion of this video, you will be able to provide an overview of GCP security, privacy, and compliance features. FREE ACCESS
  • Locked
    4.  On-premises vs. Cloud
    6m 42s
    After completing this video, you will be able to differentiate between on-premises security and GCP security and outline some of the barriers of adopting GCP DevSecOps. FREE ACCESS
  • Locked
    5.  Layers of Google Cloud Platform Security
    5m 31s
    Upon completion of this video, you will be able to outline the five layers of GCP security, including cloud infrastructure, products and services, security blueprint, blueprints for security posture, workload, and applications, and solution packages. FREE ACCESS
  • Locked
    6.  Security Foundations Blueprint
    6m 10s
    After completing this video, you will be able to provide an overview of how you can use the security foundations blueprint. FREE ACCESS
  • Locked
    7.  Security Preparation and Planning
    6m 26s
    Upon completion of this video, you will be able to describe how involving security teams in the DevOps process allows them to provide expertise, tools, and frameworks. FREE ACCESS
  • Locked
    8.  Security By Design
    5m 36s
    After completing this video, you will be able to outline the secure-by-design foundation and how it can be used to improve risk management. FREE ACCESS
  • Locked
    9.  Security Operations Suite
    6m 27s
    Upon completion of this video, you will be able to recognize how the Chronicle Security Operations suite can be used to detect, investigate, and respond to threats. FREE ACCESS
  • Locked
    10.  Zero Trust Security
    6m
    After completing this video, you will be able to describe how GCP enables organizations to implement a zero trust approach. FREE ACCESS
  • Locked
    11.  Resource Hierarchy
    6m 9s
    Upon completion of this video, you will be able to describe how GCP uses a hierarchy to organize resources allowing for greater job-specific access. FREE ACCESS
  • Locked
    12.  Security and Continuous Integration and Continuous Delivery (CI/CD)
    6m 11s
    After completing this video, you will be able to list strategies for injecting security into a pipeline, such as identifying test points, determining secrets, and encrypting data. FREE ACCESS
  • Locked
    13.  Google Cloud Logging Services
    5m 46s
    Upon completion of this video, you will be able to describe how the Google Cloud Logging service can be used to review data for the DevSecOps pipeline. FREE ACCESS
  • Locked
    14.  GCP Security Best Practices
    6m
    After completing this video, you will be able to outline platform-specific security best practices and recommendations for GCP. FREE ACCESS
  • Locked
    15.  GCP Platform Security Tools
    5m 24s
    Upon completion of this video, you will be able to describe some platform-specific tools used to help implement DevSecOps in GCP. FREE ACCESS
  • Locked
    16.  Course Summary
    51s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.0 of 1 users Rating 4.0 of 1 users (1)
Rating 4.0 of 2 users Rating 4.0 of 2 users (2)
Rating 3.5 of 2 users Rating 3.5 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 28 users Rating 4.6 of 28 users (28)
Rating 4.5 of 75 users Rating 4.5 of 75 users (75)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)