Description
Audience and prerequisites
This class is intended for the following job roles:
- Cloud information security analysts, architects, and engineers
- Information security or cybersecurity specialists
- Cloud infrastructure architects
Prerequisites:
To get the most out of this course, participants should:
- Prior completion of the Google Cloud Fundamentals: Core Infrastructure course or equivalent experience.
- Prior completion of the Networking in Google Cloud course or equivalent experience.
- Knowledge of foundational concepts in information security, through experience or online training such as SANS SEC301: Introduction to Cyber Security.
- Basic proficiency with command-line tools and Linux operating system environments.
- Systems Operations experience, including deploying and managing applications, either on-premises or in a public cloud environment.
- Reading comprehension of code in Python or Javascript.
- Basic understanding of Kubernetes terminology (preferred but not required).
Objectives
This course teaches participants the following skills:
- Identify the foundations of Google Cloud security.
- Manage administration identities with Google Cloud.
- Implement user administration with Identity and Access Management (IAM).
- Configure Virtual Private Clouds (VPCs) for isolation, security and logging.
- Apply techniques and best practices for securely managing Compute Engine.
- Apply techniques and best practices for securely managing Google Cloud data.
- Apply techniques and best practices for securing Google Cloud applications.
- Apply techniques and best practices for securing Google Kubernetes Engine (GKE) resources.
- Manage protection against distributed denial-of-service attacks (DDoS).
- Manage content-related vulnerabilities.
- Implement Google Cloud monitoring, logging, auditing and scanning solutions.
Topics
Foundations of Google Cloud Security
- Explain the shared security responsibility model of Google Cloud.
- Describe how Google Cloud approaches security.
- Recognize threats mitigated by Google and Google Cloud.
- Identify Google Cloud’s commitments to regulatory compliance.
Securing Access to Google Cloud
- Describe what Cloud Identity is and what it does.
- Explain how Google Cloud Directory Sync securely syncs users and permissions between your on-premises LDAP or AD server and the cloud.
- Explore and apply best practices for managing groups, permissions, domains and administrators with Cloud Identity.
Identity and Access Management (IAM)
- Identify IAM roles and permissions that can be used to organize resources in Google Cloud.
- Explain the management-related features of Google Cloud projects.
- Define IAM policies, including organization policies.
- Implement access control with IAM.
- Provide access to Google Cloud resources by using predefined and custom IAM roles.
Configuring Virtual Private Cloud for Isolation and Security
- Describe the function of VPC networks.
- Recognize and implement best practices for configuring VPC firewalls (both ingress and egress rules).
- Secure projects with VPC Service Controls.
- Apply SSL policies to load balancers.
- Enable VPC ?ow logging, and then use Cloud Logging to access logs.
- Deploy Cloud IDS, and view threat details in the Google Cloud console.
Securing Compute Engine: Techniques and Best Practices
- Create and manage service accounts for Compute Engine instances (default and customer-defined).
- Detail IAM roles and scopes for VMs.
- Explore and apply best practices for Compute Engine instances.
- Explain the function of the Organization Policy Service.
Securing Cloud Data: Techniques and Best Practices
- Use IAM permissions and roles to secure cloud resources.
- Create and wrap encryption keys using the Compute Engine RSA public key certificate.
- Encrypt and attach persistent disks to Compute Engine instances.
- Manage keys and encrypted data by using Cloud Key Management Service (Cloud KMS) and Cloud HSM.
- Create BigQuery-authorized views.
- Recognize and implement best practices for configuring storage options
Securing Applications: Techniques and Best Practices
- Recall various types of application security vulnerabilities.
- Detect vulnerabilities in App Engine applications by using Web Security Scanner.
- Secure Compute Engine Applications by using BeyondCorp Enterprise.
- Secure application credentials by using Secret Manager.
- Identify the threats of OAuth and Identity Phishing.
Securing Google Kubernetes Engine: Techniques and Best Practices
- Explain the di?erences between Kubernetes service accounts and Google service accounts.
- Recognize and implement best practices for securely configuring GKE.
- Explain logging and monitoring options in Google Kubernetes Engine.
Protecting against Distributed Denial-of-Service Attacks (DDoS)
- Identify the four layers of DDoS Mitigation.
- Identify methods Google Cloud uses to mitigate the risk of DDoS for its customers.
- Use Google Cloud Armor to blocklist an IP address and restrict access to an HTTP Load Balancer.
Content-Related Vulnerabilities: Techniques and Best Practices
- Discuss the threat of ransomware.
- Explain ransomware mitigation strategies (backups, IAM, Cloud Data Loss Prevention API).
- Highlight common threats to content (data misuse; privacy violations; sensitive, restricted, or unacceptable content).
- Identify solutions for threats to content (classification, scanning and redacting).
- Detect and redact sensitive data by using the Cloud DLP API
Monitoring, Logging, Auditing and Scanning
- Explain and use the Security Command Center.
- Apply Cloud Monitoring and Cloud Logging to a project.
- Apply Cloud Audit Logs to a project.
- Identify methods for automating security in Google Cloud environments.