Google Professional Cloud Architect: : Google Cloud Security Design

Google Cloud    |    Intermediate
  • 15 videos | 1h 29m 41s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Organizations might fear cloud technologies because they think security is not robust enough for their needs. A cloud architect and Google Cloud Identity and Access Management (IAM) can help to address these security concerns. In this course, you'll learn about IAM, Separation of Duties (SOD), and designing a secure resource hierarchy. Then you'll dig into creating groups and roles, the Organization Policy Service, working with IAM policies, and Access Control Design. Finally, you'll explore securing Google virtual private clouds (VPCs) with service controls, securing Google Cloud Storage with access control, network access security with identity, secure remote access design with Google BeyondCorp, and Google case studies and security design. This course aids learners in preparing for the Google Professional Cloud Architect certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline how google cloud's identity and access management (iam) system works and how it can be used to manage access in google cloud
    Identify use cases for effectively leveraging iam
    Outline how to configure different projects with different iam roles to establish separation of duties (sod)
    Identify the tools used to create a resource hierarchy, their differences, and how they can be leveraged to create a more secure cloud infrastructure
    Provide an overview of using groups and roles for aggregating users and assigning permissions
    Outline how the organization policy service enables centralized and programmatic control over google cloud resources
    Outline how to work with iam policies and their available options
  • Identify the iam roles and permissions needed to use network connectivity center
    Outline the scope of available protections when implementing managed networking functionality via vpc service controls
    Identify the iam roles and permissions needed to use google cloud storage buckets
    Identify the process and benefits of using identity and context to secure applications and virtual machines
    Outline the benefits of providing secure remote access through a zero trust model
    Reference google case studies to identify security design considerations
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 11s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 10m 22s
    After completing this video, you will be able to outline how Google Cloud's Identity and Access Management (IAM) system works and how it can be used to manage access in Google Cloud. FREE ACCESS
  • Locked
    3.  IAM Use Cases
    9m 1s
    Upon completion of this video, you will be able to identify use cases for effectively leveraging IAM. FREE ACCESS
  • Locked
    4.  Separation of Duties (SOD)
    4m 35s
    After completing this video, you will be able to outline how to configure different projects with different IAM roles to establish separation of duties (SOD). FREE ACCESS
  • Locked
    5.  Designing a Secure Resource Hierarchy
    7m 53s
    Upon completion of this video, you will be able to identify the tools used to create a resource hierarchy, their differences, and how they can be leveraged to create a more secure cloud infrastructure. FREE ACCESS
  • Locked
    6.  Creating Groups and Roles in IAM
    6m 19s
    After completing this video, you will be able to provide an overview of using groups and roles for aggregating users and assigning permissions. FREE ACCESS
  • Locked
    7.  Controlling Access Using the Organization Policy Service
    5m 36s
    Upon completion of this video, you will be able to outline how the Organization Policy Service enables centralized and programmatic control over Google Cloud resources. FREE ACCESS
  • Locked
    8.  Working with IAM Policies
    9m 24s
    After completing this video, you will be able to outline how to work with IAM policies and their available options. FREE ACCESS
  • Locked
    9.  Cloud Networking with Access Control Design
    5m 22s
    Upon completion of this video, you will be able to identify the IAM roles and permissions needed to use Network Connectivity Center. FREE ACCESS
  • Locked
    10.  Securing Google Virtual Private Clouds (VPCs) with Service Controls
    4m 33s
    After completing this video, you will be able to outline the scope of available protections when implementing managed networking functionality via VPC Service Controls. FREE ACCESS
  • Locked
    11.  Securing Google Cloud Storage with Access Control
    7m 57s
    Upon completion of this video, you will be able to identify the IAM roles and permissions needed to use Google Cloud Storage buckets. FREE ACCESS
  • Locked
    12.  Network Access Security with Identity
    4m 11s
    After completing this video, you will be able to identify the process and benefits of using identity and context to secure applications and virtual machines. FREE ACCESS
  • Locked
    13.  Secure Remote Access Design with Google BeyondCorp
    5m 9s
    Upon completion of this video, you will be able to outline the benefits of providing secure remote access through a zero trust model. FREE ACCESS
  • Locked
    14.  Google Case Studies and Security Design
    7m 2s
    After completing this video, you will be able to reference Google case studies to identify security design considerations. FREE ACCESS
  • Locked
    15.  Course Summary
    1m 7s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.0 of 1 users Rating 4.0 of 1 users (1)