Google Cloud Digital Leader: Trust & Security on Google Cloud

Google Cloud 2024    |    Beginner
  • 14 videos | 1h 34m 23s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 3 users Rating 4.7 of 3 users (3)
Securing cloud environments involves understanding key security principles and implementing robust control measures. This approach ensures organizations can protect their resources, manage identities effectively, and maintain the integrity and availability of their data. In this course, you will discover privileged access, the principle of least privilege (POLP), and the CIA Triad, which are essential components of a robust security framework. Next, you will explore various security measures to protect cloud resources. You will compare on-premises security with cloud security and examine the different cybersecurity threats that organizations face today. Additionally, you will gain insights into the security infrastructure of Google Data Centers and how they ensure the safety and reliability of their services. Finally, you will dive into Google Cloud's Identity and Access Management (IAM) service and study the different types of principals in Cloud IAM and the various roles they can assume. By differentiating between basic, predefined, and custom roles, you will learn how to manage identities and access effectively. This course helps prepare learners for the Google Cloud Digital Leader certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define and summarize the need for privileged access
    Define and analyze the principle of least privilege (polp)
    Define security by default and security posture
    Outline security measures to protect cloud resources
    Recall the elements of the cia triad in cloud security
    Differentiate between on-premises security and cloud security
  • Provide an overview of different types of cybersecurity threats
    List security features in google data centers
    Analyze google cloud support for key management
    Contrast authentication, authorization, and audit
    Describe the types of principals in cloud identity and access management (iam)
    Define basic, predefined, and custom roles in cloud iam
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 31s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 8m 48s
    After completing this video, you will be able to define and summarize the need for privileged access. FREE ACCESS
  • Locked
    3.  The Principle of Least Privilege
    10m 10s
    Upon completion of this video, you will be able to define and analyze the principle of least privilege (POLP). FREE ACCESS
  • Locked
    4.  Protecting against Security Threats
    5m 21s
    After completing this video, you will be able to define security by default and security posture. FREE ACCESS
  • Locked
    5.  Security Measures to Protect Cloud Resources
    6m 25s
    Upon completion of this video, you will be able to outline security measures to protect cloud resources. FREE ACCESS
  • Locked
    6.  Cloud Security Components: The CIA Triad
    11m 44s
    After completing this video, you will be able to recall the elements of the CIA triad in cloud security. FREE ACCESS
  • Locked
    7.  On-premises Security vs. Cloud Security
    6m 55s
    Upon completion of this video, you will be able to differentiate between on-premises security and cloud security. FREE ACCESS
  • Locked
    8.  Cybersecurity Threats
    7m 26s
    After completing this video, you will be able to provide an overview of different types of cybersecurity threats. FREE ACCESS
  • Locked
    9.  Google Data Center Security
    2m 57s
    Upon completion of this video, you will be able to list security features in Google data centers. FREE ACCESS
  • Locked
    10.  Google Cloud Products for Key Management
    10m 30s
    After completing this video, you will be able to analyze Google Cloud support for key management. FREE ACCESS
  • Locked
    11.  Cloud Identity Management
    6m 36s
    Upon completion of this video, you will be able to contrast authentication, authorization, and audit. FREE ACCESS
  • Locked
    12.  Types of Principals in Cloud IAM
    8m 59s
    After completing this video, you will be able to describe the types of principals in Cloud Identity and Access Management (IAM). FREE ACCESS
  • Locked
    13.  Types of Roles in Cloud IAM
    5m 34s
    Upon completion of this video, you will be able to define basic, predefined, and custom roles in Cloud IAM. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 30s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)