Google Professional Cloud Developer: Infrastructure Design

Google Cloud    |    Intermediate
  • 20 videos | 2h 39m 37s
  • Includes Assessment
  • Earns a Badge
Rating 4.2 of 35 users Rating 4.2 of 35 users (35)
Organizations continue to take advantage of Google Cloud Platform's powerful network to deliver enterprise-class applications. Google uses a secure by design infrastructure, built-in protection, and a global network that helps organizations protect their information. In this course, learn about Google Cloud security, security mechanisms, container scanning, and workload identity federation. Discover how to implement Binary Authorization using Cloud Build and GKE, manage notifications with Secret Manager, and use JSON web tokens and OAuth 2.0 to authenticate services. Finally, practice authenticating using asynchronous or synchronous means between services, control communication between services, and use certificate-based authentication to protect resources. This course is one of a collection that prepares learners for the Google Professional Cloud Developer exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize the aspects of google cloud security
    Recall the elements of the google cloud architecture framework
    Outline how security is designed in google's infrastructure
    Implement binary authorization using cloud build and google kubernetes engine (gke)
    Outline container scanning and how it can identify vulnerabilities
    Manage notifications using secret manager
    Recall the aspects of authentication principals, application credentials, and how to authenticate calls from google cloud apis
    Authenticate google services using json web tokens
    Utilize oauth 2.0 to access google apis
  • Identify what service accounts are and what distinguishes them from a user account
    Use predefined or custom roles for users, groups, and service accounts
    Authenticate using asynchronous or synchronous means between services
    Utilize anthos service mesh to communicate between services
    Control communication between services using kubernetes network policy enforcement
    Integrate kubernetes namespaces with projects, folders, and organizations
    Outline workload identity federation and how it can grant on-premises or multi-cloud workloads access to resources
    Use certificate-based authentication to protect access to google resources
    Identify google cloud security best practices
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 2s
  • 6m 37s
  • Locked
    3.  Google Cloud Architecture Framework
    7m 1s
  • Locked
    4.  Security Mechanisms
    9m 40s
  • Locked
    5.  Implementing Binary Authorization
    17m 38s
  • Locked
    6.  Container Scanning
    7m 46s
  • Locked
    7.  Managing Application Secrets and Keys
    11m 2s
  • Locked
    8.  Google Services Authentication
    7m 17s
  • Locked
    9.  Authenticating Google Services with JSON Web Tokens
    6m 51s
  • Locked
    10.  Utilizing OAuth 2.0 to Access Google APIs
    8m 47s
  • Locked
    11.  Service Accounts
    9m 41s
  • Locked
    12.  Using IAM Roles
    7m 35s
  • Locked
    13.  Authenticating Service-to-service
    4m 26s
  • Locked
    14.  Utilizing Anthos Service Mesh
    10m 31s
  • Locked
    15.  Controlling Communication with Network Policies
    8m 8s
  • Locked
    16.  Integrating Kubernetes Namespaces
    11m 34s
  • Locked
    17.  Workload Identity Federation
    6m 57s
  • Locked
    18.  Using Certificate-based Access
    8m 6s
  • Locked
    19.  Google Cloud Security Best Practices
    7m 52s
  • Locked
    20.  Course Summary
    1m 6s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 443 users Rating 4.5 of 443 users (443)
Rating 4.7 of 37 users Rating 4.7 of 37 users (37)
Rating 4.4 of 78 users Rating 4.4 of 78 users (78)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 66 users Rating 4.7 of 66 users (66)
Rating 4.6 of 49 users Rating 4.6 of 49 users (49)
Rating 4.4 of 78 users Rating 4.4 of 78 users (78)