Google Professional Cloud Architect: Google Cloud Cryptography Design

Google Cloud    |    Intermediate
  • 10 videos | 52m 54s
  • Includes Assessment
  • Earns a Badge
Rating 4.0 of 1 users Rating 4.0 of 1 users (1)
Cryptography is a critical cornerstone of modern cybersecurity. Encryption is a particularly vital part of maintaining an environment that is compliant and engenders trust in customers. In this course, you will explore how Google Cloud manages the various types of keys used to perform cryptography and the different ways encryption can be applied to data at rest and data in transit. You will investigate Google Cloud key management, cryptographic key sources, encryption with customer-managed keys, and cloud storage encryption management. Then you will learn about data in transit in Google Cloud and Google Secret Manager. Finally, you will delve into managing secrets in Google Cloud and Google case studies and cryptography design. This course aids learners in preparing for the Google Cloud Certified Professional Cloud Architect exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify the needs and tools required to manage symmetric and asymmetric cryptographic keys for google cloud services
    Describe the benefits of using differently sourced keys for cryptography in google cloud
    Describe the process used to encrypt data at rest with customer-managed keys
    Outline the process used to manage encrypted buckets in google cloud storage
  • Identify methods to encrypt data as it is stored in different locations in a google cloud infrastructure
    Provide an overview of the integration of secret manager with the storage of application programming interface (api) keys, passwords, certificates, and other sensitive data
    Create secrets using secret manager
    Apply google case studies to identify security cryptography decisions
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 9s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 5m 20s
    After completing this video, you will be able to identify the needs and tools required to manage symmetric and asymmetric cryptographic keys for Google Cloud services. FREE ACCESS
  • Locked
    3.  Cryptographic Key Sources
    5m 16s
    Upon completion of this video, you will be able to describe the benefits of using differently sourced keys for cryptography in Google Cloud. FREE ACCESS
  • Locked
    4.  Encrypting with Customer-managed Keys
    8m 46s
    After completing this video, you will be able to describe the process used to encrypt data at rest with customer-managed keys. FREE ACCESS
  • Locked
    5.  Cloud Storage Encryption Management
    5m 28s
    Upon completion of this video, you will be able to outline the process used to manage encrypted buckets in Google Cloud Storage. FREE ACCESS
  • Locked
    6.  Data in Transit in Google Cloud
    8m 35s
    After completing this video, you will be able to identify methods to encrypt data as it is stored in different locations in a Google Cloud infrastructure. FREE ACCESS
  • Locked
    7.  Google Secret Manager
    4m 15s
    Upon completion of this video, you will be able to provide an overview of the integration of Secret Manager with the storage of application programming interface (API) keys, passwords, certificates, and other sensitive data. FREE ACCESS
  • Locked
    8.  Managing Secrets in Google Cloud
    6m 53s
    During this video, you will learn how to create secrets using Secret Manager. FREE ACCESS
  • Locked
    9.  Google Case Studies and Cryptography Design
    6m 28s
    After completing this video, you will be able to apply Google case studies to identify security cryptography decisions. FREE ACCESS
  • Locked
    10.  Course Summary
    43s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.0 of 1 users Rating 4.0 of 1 users (1)