GCP Big Data & Security

Google Cloud    |    Intermediate
  • 11 videos | 1h 7m 20s
  • Includes Assessment
  • Earns a Badge
Rating 4.0 of 108 users Rating 4.0 of 108 users (108)
Complex operations require more managed and secure systems. Explore the use of Cloud Spanner and Bigtable to create more complex data service configurations and managing secure data infrastructure.

WHAT YOU WILL LEARN

  • Describe cloud spanner and its purpose in gcp
    Describe cloud spanner replication and instances
    Describe cloud spanner schema, datatypes, and best practices
    Describe gcp bigtable
    Specify the steps to design a bigtable schema
    Demonstrate the process of creating a bigtable instance on gcp
  • Describe the cloud platform security model
    Describe the use of cloud identity and access management
    Describe the security layers on gcp
    Define the security standards google works to comply with
    Describe the use of big data and how to keep data secure on gcp

IN THIS COURSE

  • 2m 51s
    After completing this video, you will be able to describe Cloud Spanner and its purpose in Google Cloud Platform. FREE ACCESS
  • 6m 41s
    Upon completion of this video, you will be able to describe Cloud Spanner replication and instances. FREE ACCESS
  • Locked
    3.  Cloud Spanner Schema, Datatypes and Best Practices
    7m 32s
    Upon completion of this video, you will be able to describe Cloud Spanner schema, datatypes, and best practices. FREE ACCESS
  • Locked
    4.  Bigtable Operations
    6m 37s
    After completing this video, you will be able to describe Google Cloud Platform Bigtable. FREE ACCESS
  • Locked
    5.  Designing a Schema using Bigtable
    7m 14s
    Upon completion of this video, you will be able to specify the steps to design a schema for Bigtable. FREE ACCESS
  • Locked
    6.  Creating a Bigtable Instance
    6m 23s
    During this video, you will learn how to create a Bigtable instance on GCP. FREE ACCESS
  • Locked
    7.  Secure Data with Security Control
    5m
    After completing this video, you will be able to describe the security model for cloud platforms. FREE ACCESS
  • Locked
    8.  Identify and Access Management
    6m 6s
    Upon completion of this video, you will be able to describe the use of Cloud Identity and Access Management. FREE ACCESS
  • Locked
    9.  GCP Security Layers
    8m 5s
    After completing this video, you will be able to describe the security layers on Google Cloud Platform. FREE ACCESS
  • Locked
    10.  Data and Security Compliance on GCP
    4m 20s
    Find out how to define the security standards that Google works to comply with. FREE ACCESS
  • Locked
    11.  Exercise: Overview of Big Data and Security
    6m 31s
    After completing this video, you will be able to describe the use of Big Data and how to keep data secure on Google Cloud Platform. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 7 users Rating 4.7 of 7 users (7)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.7 of 11 users Rating 4.7 of 11 users (11)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 35 users Rating 4.7 of 35 users (35)
Rating 4.2 of 363 users Rating 4.2 of 363 users (363)
Rating 4.5 of 357 users Rating 4.5 of 357 users (357)