Objectives
- This course teaches participants the following skills:
- Understanding the Google approach to security Managing administrative identities using Cloud Identity.
- Implementing least privilege administrative access using Google Resource Manager, Cloud IAM.
- Implementing IP traffic controls using VPC firewalls and Google Cloud Armor.
- Implementing Identity-Aware Proxy.
- Analyzing changes to the configuration or metadata of resources with Cloud audit logs.
- Securing a Kubernetes environment.
- Scanning for and redacting sensitive data with the Cloud Data Loss Prevention API.
- Scanning a Google Cloud deployment with Forseti.
- Mitigating important types of vulnerabilities, especially in public access to data and VMs