Google Professional Cloud Architect: Designing Google Cloud Security
Google Cloud
| Intermediate
- 15 videos | 1h 26m 58s
- Includes Assessment
- Earns a Badge
One of the top reasons organizations have historically been reluctant to embrace cloud technologies is the fear that security is not robust enough for their needs. A cloud architect and Google Cloud Identity and Access Management (IAM) can help to address these security concerns. In this course, discover how to control authentication and authorization using IAM and implement cloud separation of duties. Next, learn how to organize a resource hierarchy, use auditing and policy security controls, secure access to network controls and storage with IAM, and remote access your environment securely. Finally, examine use cases you can expect to encounter in an exam environment. This course is one of a collection that prepares learners for the Google Professional Cloud Architect exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize how google cloud's identity and access management (iam) system works and how you can use it to manage access in google cloudRecall the use cases that effectively leverage iamOutline how to configure different projects with different iam roles to establish separation of dutiesIdentify the tools used to create a resource hierarchy, their differences, and how they can be leveraged to create a more secure cloud infrastructureCreate groups for aggregating users and roles to aggregate permissions assignments, including both default and custom rolesOutline how the organization policy service enables centralized and programmatic control over cloud resourcesWork with iam policies and the available options
-
Identify the iam roles and permissions needed to use network connectivity centerRecognize the scope of protections available when implementing managed networking functionality via vpc service controlsOutline the iam roles and permissions needed to use google cloud storage bucketsIdentify the benefits and process of using identity and context to secure applications and virtual machinesRecall the benefits of providing secure remote access through a zero trust modelRecognize potential security design decisions in google case studiesSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 12s
-
8m 11s
-
9m 33s
-
3m 12s
-
10m 6s
-
4m 50s
-
5m 29s
-
5m 32s
-
3m 47s
-
4m 45s
-
6m 51s
-
5m 48s
-
5m 5s
-
11m 30s
-
1m 8s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.