Google Professional Cloud Architect: Google Cloud Cryptography Design
Google Cloud
| Intermediate
- 10 videos | 52m 54s
- Includes Assessment
- Earns a Badge
Cryptography is a critical cornerstone of modern cybersecurity. Encryption is a particularly vital part of maintaining an environment that is compliant and engenders trust in customers. In this course, you will explore how Google Cloud manages the various types of keys used to perform cryptography and the different ways encryption can be applied to data at rest and data in transit. You will investigate Google Cloud key management, cryptographic key sources, encryption with customer-managed keys, and cloud storage encryption management. Then you will learn about data in transit in Google Cloud and Google Secret Manager. Finally, you will delve into managing secrets in Google Cloud and Google case studies and cryptography design. This course aids learners in preparing for the Google Cloud Certified Professional Cloud Architect exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify the needs and tools required to manage symmetric and asymmetric cryptographic keys for google cloud servicesDescribe the benefits of using differently sourced keys for cryptography in google cloudDescribe the process used to encrypt data at rest with customer-managed keysOutline the process used to manage encrypted buckets in google cloud storage
-
Identify methods to encrypt data as it is stored in different locations in a google cloud infrastructureProvide an overview of the integration of secret manager with the storage of application programming interface (api) keys, passwords, certificates, and other sensitive dataCreate secrets using secret managerApply google case studies to identify security cryptography decisionsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 9sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
5m 20sAfter completing this video, you will be able to identify the needs and tools required to manage symmetric and asymmetric cryptographic keys for Google Cloud services. FREE ACCESS
-
5m 16sUpon completion of this video, you will be able to describe the benefits of using differently sourced keys for cryptography in Google Cloud. FREE ACCESS
-
8m 46sAfter completing this video, you will be able to describe the process used to encrypt data at rest with customer-managed keys. FREE ACCESS
-
5m 28sUpon completion of this video, you will be able to outline the process used to manage encrypted buckets in Google Cloud Storage. FREE ACCESS
-
8m 35sAfter completing this video, you will be able to identify methods to encrypt data as it is stored in different locations in a Google Cloud infrastructure. FREE ACCESS
-
4m 15sUpon completion of this video, you will be able to provide an overview of the integration of Secret Manager with the storage of application programming interface (API) keys, passwords, certificates, and other sensitive data. FREE ACCESS
-
6m 53sDuring this video, you will learn how to create secrets using Secret Manager. FREE ACCESS
-
6m 28sAfter completing this video, you will be able to apply Google case studies to identify security cryptography decisions. FREE ACCESS
-
43sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.