Google Professional Cloud Architect: : Google Cloud Security Design
Google Cloud
| Intermediate
- 15 videos | 1h 29m 41s
- Includes Assessment
- Earns a Badge
Organizations might fear cloud technologies because they think security is not robust enough for their needs. A cloud architect and Google Cloud Identity and Access Management (IAM) can help to address these security concerns. In this course, you'll learn about IAM, Separation of Duties (SOD), and designing a secure resource hierarchy. Then you'll dig into creating groups and roles, the Organization Policy Service, working with IAM policies, and Access Control Design. Finally, you'll explore securing Google virtual private clouds (VPCs) with service controls, securing Google Cloud Storage with access control, network access security with identity, secure remote access design with Google BeyondCorp, and Google case studies and security design. This course aids learners in preparing for the Google Professional Cloud Architect certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline how google cloud's identity and access management (iam) system works and how it can be used to manage access in google cloudIdentify use cases for effectively leveraging iamOutline how to configure different projects with different iam roles to establish separation of duties (sod)Identify the tools used to create a resource hierarchy, their differences, and how they can be leveraged to create a more secure cloud infrastructureProvide an overview of using groups and roles for aggregating users and assigning permissionsOutline how the organization policy service enables centralized and programmatic control over google cloud resourcesOutline how to work with iam policies and their available options
-
Identify the iam roles and permissions needed to use network connectivity centerOutline the scope of available protections when implementing managed networking functionality via vpc service controlsIdentify the iam roles and permissions needed to use google cloud storage bucketsIdentify the process and benefits of using identity and context to secure applications and virtual machinesOutline the benefits of providing secure remote access through a zero trust modelReference google case studies to identify security design considerationsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 11sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
10m 22sAfter completing this video, you will be able to outline how Google Cloud's Identity and Access Management (IAM) system works and how it can be used to manage access in Google Cloud. FREE ACCESS
-
9m 1sUpon completion of this video, you will be able to identify use cases for effectively leveraging IAM. FREE ACCESS
-
4m 35sAfter completing this video, you will be able to outline how to configure different projects with different IAM roles to establish separation of duties (SOD). FREE ACCESS
-
7m 53sUpon completion of this video, you will be able to identify the tools used to create a resource hierarchy, their differences, and how they can be leveraged to create a more secure cloud infrastructure. FREE ACCESS
-
6m 19sAfter completing this video, you will be able to provide an overview of using groups and roles for aggregating users and assigning permissions. FREE ACCESS
-
5m 36sUpon completion of this video, you will be able to outline how the Organization Policy Service enables centralized and programmatic control over Google Cloud resources. FREE ACCESS
-
9m 24sAfter completing this video, you will be able to outline how to work with IAM policies and their available options. FREE ACCESS
-
5m 22sUpon completion of this video, you will be able to identify the IAM roles and permissions needed to use Network Connectivity Center. FREE ACCESS
-
4m 33sAfter completing this video, you will be able to outline the scope of available protections when implementing managed networking functionality via VPC Service Controls. FREE ACCESS
-
7m 57sUpon completion of this video, you will be able to identify the IAM roles and permissions needed to use Google Cloud Storage buckets. FREE ACCESS
-
4m 11sAfter completing this video, you will be able to identify the process and benefits of using identity and context to secure applications and virtual machines. FREE ACCESS
-
5m 9sUpon completion of this video, you will be able to outline the benefits of providing secure remote access through a zero trust model. FREE ACCESS
-
7m 2sAfter completing this video, you will be able to reference Google case studies to identify security design considerations. FREE ACCESS
-
1m 7sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.