GCP Data Engineer Pro: Navigating the Google Cloud Platform

Google Cloud 2024    |    Intermediate
  • 12 videos | 1h 5m 27s
  • Earns a Badge
In the ever-evolving field of data engineering, a solid understanding of the foundational elements of Google Cloud Platform (GCP) is essential. In this course, you will ensure that your foundational knowledge of how Google Cloud Platform operates is in place before moving to the more specific elements that are core to the role of the data engineer. You will review the basic GCP services and configurations, including using the Google Cloud Console and command line interface (CLI) to define security settings using identity and access management (IAM) and navigate a new project and virtual machine. This course is one of a collection that prepares learners for the Google Professional Data Engineer exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Compare infrastructure elements of google cloud infrastructure such as compute, storage, high availability, and networks
    Outline the google cloud elements of regions and zones and their importance in deployments
    Identify the core elements of identity and access management (iam) used to create secured environments
    Identify the steps and requirements to create a google cloud platform (gcp) account
    Recognize the core objects and navigation elements used to create and manage projects in the gcp
  • Use or create the roles, users, and service accounts needed to provide security in a gcp deployment
    Create a project and deploy a virtual machine in the google cloud console
    Create a project and deploy a virtual machine in the gcloud cli
    Identify the core concepts of what a cloud key management service (kms) provides and how it can interact with data
    Create the centralized security elements in a kms infrastructure that are used to encrypt data
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 57s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 8m 29s
    After completing this video, you will be able to compare infrastructure elements of Google Cloud infrastructure such as compute, storage, high availability, and networks. FREE ACCESS
  • Locked
    3.  Regions and Zones
    4m 59s
    Upon completion of this video, you will be able to outline the Google Cloud elements of regions and zones and their importance in deployments. FREE ACCESS
  • Locked
    4.  Defining Identity with IAM Roles, Users, Service Accounts, and Policies
    8m
    After completing this video, you will be able to identify the core elements of identity and access management (IAM) used to create secured environments. FREE ACCESS
  • Locked
    5.  Creating a Free Tier GCP Account
    3m 5s
    In this video, we will identify the steps and requirements to create a Google Cloud Platform (GCP) account. FREE ACCESS
  • Locked
    6.  The Google Cloud Console and gcloud CLI
    6m 13s
    Upon completion of this video, you will be able to recognize the core objects and navigation elements used to create and manage projects in the GCP. FREE ACCESS
  • Locked
    7.  Setting Up Core Identity and Access Elements in Google Cloud
    4m 58s
    In this video, you will learn how to use or create the roles, users, and service accounts needed to provide security in a GCP deployment. FREE ACCESS
  • Locked
    8.  Managing with the Google Cloud Console
    6m 53s
    In this video, find out how to create a project and deploy a virtual machine in the Google Cloud Console. FREE ACCESS
  • Locked
    9.  Managing with the gcloud CLI
    7m 59s
    Discover how to create a project and deploy a virtual machine in the gcloud CLI. FREE ACCESS
  • Locked
    10.  Cloud Key Management Service (KMS) on GCP
    4m 40s
    After completing this video, you will be able to identify the core concepts of what a cloud Key Management Service (KMS) provides and how it can interact with data. FREE ACCESS
  • Locked
    11.  Creating Cloud KMS Key Rings and Symmetric Encryption Keys
    8m 14s
    Find out how to create the centralized security elements in a KMS infrastructure that are used to encrypt data. FREE ACCESS
  • Locked
    12.  Course Summary
    1m 1s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.0 of 1 users Rating 4.0 of 1 users (1)
Rating 4.5 of 75 users Rating 4.5 of 75 users (75)