Module 1: Foundations of Google Cloud Security
- Google Cloud’s Approach to Security
- The Shared Security Responsibility Model
- Threats Mitigated by Google and Google Cloud
- Access Transparency
Module 2: Cloud Identity
- Cloud Identity
- Google Cloud Directory Sync
- Google Authentication Versus SAML-based SSO
- Authentication Best Practices
Module 3: Identity and Access Management (IAM)
- Resource Manager
- IAM Roles
- IAM Policies
- IAM Recommender
- IAM Troubleshooter
- IAM Audit Logs
- IAM Best Practices
Module 4: Configuring Virtual Private Cloud for Isolation and Security
- VPC Firewalls
- Load Balancing and SSL Policies
- Interconnect and Peering Policies
- Best Practices for VPC Networks
- VPC Flow Logs
Module 5: Securing Compute Engine: Techniques and Best Practices
- Service Accounts, IAM Roles and API Scopes
- Managing VM Logins
- Organization Policy Controls
- Compute Engine Best Practices
- Encrypting Disks with CSEK
Module 6: Securing Cloud Data: Techniques and Best Practices
- Cloud Storage IAM permissions and ACLs
- Auditing Cloud Data
- Signed URLs and Policy Documents
- Encrypting with CMEK and CSEK
- Cloud HSM
- BigQuery IAM Roles and Authorized Views
- Storage Best Practices
Module 7: Application Security: Techniques and Best Practices
- Types of Application Security Vulnerabilities
- Web Security Scanner
- Threat: Identity and Oauth Phishing
- Identity-Aware Proxy
- Secret Manager
Module 8: Securing Google Kubernetes Engine: Techniques and Best Practices
- Introduction to Kubernetes/GKE
- Authentication and Authorization
- Hardening Your Clusters
- Securing Your Workloads
- Monitoring and Logging
Module 9: Protecting against Distributed Denial of Service Attacks (DDoS)
- How DDoS Attacks Work
- Google Cloud Mitigations
- Types of Complementary Partner Products
Module 10: Content-Related Vulnerabilities: Techniques and Best Practices
- Threat Ransomware
- Ransomware Mitigations
- Threats: Data Misuse, Privacy Violations, Sensitive Content
- Content-Related Mitigations
Module 11: Monitoring, Logging, Auditing, and Scanning
- Cloud Audit Logs
- Deploying and Using Forseti