Companies Home Search Profile

Mitigating Security Vulnerabilities on Google Cloud Platform

Focused View

Google Cloud

1:32:39

36 View
  • 01 - Getting Started with Google Cloud Platform and Qwiklabs.mp4
    03:58
  • 02 - Overview.mp4
    01:09
  • 03 - Compute Engine Identity and API Access.mp4
    01:51
  • 04 - VM and API Scopes.mp4
    02:11
  • 05 - Connecting to Virtual Machines.mp4
    05:54
  • 06 - Organization Policy Service.mp4
    01:37
  • 07 - Organization Policy Constraints.mp4
    01:52
  • 08 - Compute Engine Security.mp4
    03:42
  • 09 - Configuring, using, and auditing VM service accounts and scopes.mp4
    00:10
  • 10 - Encryption Overview.mp4
    03:25
  • 11 - Customer Supplied and Managed Keys.mp4
    01:49
  • 12 - Encrypting Disks with Customer-Supplied Encryption Keys.mp4
    00:10
  • 13 - Review.mp4
    02:53
  • 14 - Overview.mp4
    01:32
  • 15 - Cloud Storage Permissions and Roles.mp4
    02:32
  • 16 - Auditing Storage Buckets.mp4
    01:48
  • 17 - Signed URLS and Signed Policy Documents.mp4
    04:05
  • 18 - Encryption, CSEK, CMEK Review.mp4
    01:48
  • 19 - Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS.mp4
    00:10
  • 20 - Using Customer-Supplied Encryption Keys with Cloud Storage.mp4
    00:10
  • 21 - BigQuery IAM Roles and Authorized Views.mp4
    01:56
  • 22 - Creating a BigQuery authorized view.mp4
    00:10
  • 23 - Cloud Storage Best Practices.mp4
    02:05
  • 24 - Big Query Storage Best Practices.mp4
    01:01
  • 25 - Review.mp4
    02:21
  • 26 - Overview.mp4
    00:52
  • 27 - DDoS Attack Overview.mp4
    01:21
  • 28 - DDoS Mitigation and Prevention on GCP.mp4
    05:13
  • 29 - Using Cloud Armor.mp4
    01:26
  • 30 - Security Partner Products.mp4
    01:12
  • 31 - Infrastructure, Data Protection, Logging and Compliance Partners.mp4
    01:05
  • 32 - Configuring GCLB, CDN, traffic blacklisting with Cloud Armor.mp4
    00:10
  • 33 - Review.mp4
    01:48
  • 34 - Overview.mp4
    01:00
  • 35 - Application Vulnerabilities.mp4
    03:33
  • 36 - How Cloud Security Scanner Works.mp4
    02:51
  • 37 - Avoiding Unwanted Impact.mp4
    01:33
  • 38 - Using Cloud Security Scanner to find vulnerabilities in an App Engine application.mp4
    00:10
  • 39 - Types of Phishing Attacks.mp4
    02:50
  • 40 - Cloud Identity-Aware Proxy (Cloud IAP).mp4
    01:58
  • 41 - Configuring Identity Aware Proxy to Protect a Project.mp4
    00:10
  • 42 - Review.mp4
    02:55
  • 43 - Overview.mp4
    01:01
  • 44 - What is Ransomware.mp4
    00:55
  • 45 - Mitigating the Threat of Ransomware.mp4
    03:26
  • 46 - Misuse of Data and Content.mp4
    01:56
  • 47 - Threat Mitigation Strategies for Content.mp4
    02:43
  • 48 - Redacting Sensitive Data with Data Loss Prevention API.mp4
    00:10
  • 49 - Review.mp4
    02:02
  • Description


    This course gives participants broad study of security controls and techniques on Google Cloud Platform.

    What You'll Learn?


      This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Google Cloud
    Google Cloud
    Instructor's Courses
    Google Cloud can help solve your toughest problems and grow your business. With Google Cloud, their infrastructure is your infrastructure. Their tools are your tools. And their innovations are your innovations.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 49
    • duration 1:32:39
    • level average
    • Release Date 2023/10/12

    Courses related to Cyber Security

    Courses related to Network Security

    Courses related to Information Security

    Courses related to Cyber Security Awareness

    Courses related to Google Cloud