GoogleBar

Security in Google Cloud Platform

Want to understand how to deploy the components of a secure Google Cloud Platform solution? This two-day instructor led course will help.
product
google badge
2 day course
Supporting material
Classroom, Virtual, Private
Classroom
Face to face, interactive classroom training run from our global training centres.
Virtual Classroom
A convenient and interactive learning experience, that enables you to attend on of our courses from the comfort of your own home or anywhere you can log on. We offer Virtual Classroom on selected live classroom courses where this will appear as an option under the location drop down if available. These can also be booked as Private Virtual Classrooms for exclusive business sessions.
Private
A private training session for your team. Groups can be of any size, at a location of your choice including our training centres.

As a Google Cloud Partner, we’ll share our years of industry experience to help you understand the Google approach to security.

On this course you’ll gain an understanding of security controls and techniques on Google Cloud Platform. Through a combination of lectures, demonstrations, and hands-on labs, you’ll explore and deploy the components of a secure GCP solution.

You’ll learn mitigation techniques for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use.

This Security on Google Cloud Platform course is available at our training centre in The Shard, London. We also offer private training at a location of your choice or via Virtual Classroom.

 
Course overview
Who should attend:
  • Cloud information security analysts, architects, and engineers
  • Information security/cybersecurity specialists
  • Cloud infrastructure architects
  • Developers of cloud applications

By the end of the course (run over two consecutive days) you’ll have a deeper understanding of the main networking infrastructure on Google Cloud Platform and how you can use these solutions to achieve business objectives.

Walk away with the ability to:
  • Managing administrative identities using Cloud Identity
  • Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM
  • Implementing IP traffic controls using VPC firewalls and Cloud Armor
  • Implementing Identity Aware Proxy
  • Analysing changes to the configuration or metadata of resources with GCP audit logs
  • Scanning for and redact sensitive data with the Data Loss Prevention API
  • Scanning a GCP deployment with Forseti
  • Remediating important types of vulnerabilities, especially in public access to data and VM
Prerequisites

To get the most out of this course you should have completed the Google Cloud Platform Fundamentals: Core Infrastructure and the Networking in Google Cloud Platform courses, or have equivalent experience.
You will need to have knowledge of the foundational concepts in information security, as well as basic proficiency with command-line tools and Linux operating system environments. It is also recommended you have Systems Operations experience, including deploying and managing applications, either on-premises or in a public cloud environment.

Course agenda
Part I: Managing Security in Google Cloud Platform
Module 1: Foundations of GCP Security
  • Google Cloud's approach to security
  • The shared security responsibility model
  • Threats mitigated by Google and by GCP
  • Access Transparency
Module 2: Cloud Identity
  • Cloud Identity
  • Syncing with Microsoft Active Directory
  • Choosing between Google authentication and SAML-based SSO
  • GCP best practices
Module 3: Identity and Access Management
  • GCP Resource Manager: projects, folders, and organisations
  • GCP IAM roles, including custom roles
  • GCP IAM policies, including organisation policies
  • GCP IAM best practices
Module 4: Configuring Google Virtual Private Cloud for Isolation and Security
  • Configuring VPC firewalls (both ingress and egress rules)
  • Load balancing and SSL policies
  • Private Google API access
  • SSL proxy use
  • Best practices for structuring VPC networks
  • Best security practices for VPNs
  • Security considerations for interconnect and peering options
  • Available security products from partners
Module 5: Monitoring, Logging, Auditing, and Scanning
  • Stackdriver monitoring and logging
  • VPC flow logs
  • Cloud audit logging
  • Deploying and Using Forseti
Part II: Mitigating Vulnerabilities on Google Cloud Platform
Module 6: Securing Compute Engine: techniques and best practices
  • Compute Engine service accounts, default and customer-defined
  • IAM roles for VMs
  • API scopes for VMs
  • Managing SSH keys for Linux VMs
  • Managing RDP logins for Windows VMs
  • Organisation policy controls: trusted images, public IP address, disabling serial port
  • Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys
  • Finding and remediating public access to VMs
  • VM best practices
  • Encrypting VM disks with customer-supplied encryption keys
Module 7: Securing cloud data: techniques and best practices
  • Cloud Storage and IAM permissions
  • Cloud Storage and ACLs
  • Auditing cloud data, including finding and remediating publicly accessible data
  • Signed Cloud Storage URLs
  • Signed policy documents
  • Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys
  • Best practices, including deleting archived versions of objects after key rotation
  • BigQuery authorised views
  • BigQuery IAM roles
  • Best practices, including preferring IAM permissions over ACLs
Module 8: Protecting against Distributed Denial of Service Attacks: techniques and best practices
  • How DDoS attacks work
  • Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor
  • Types of complementary partner products
Module 9: Application Security: techniques and best practices
  • Types of application security vulnerabilities
  • DoS protections in App Engine and Cloud Functions
  • Cloud Security Scanner
  • Threat: Identity and Oauth phishing
  • Identity Aware Proxy
Module 10: Content-related vulnerabilities: techniques and best practices
  • Threat: Ransomware
  • Mitigations: Backups, IAM, Data Loss Prevention API
  • Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content
  • Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API
close
Don't miss out
Keep up to date with news, views and offers from Jellyfish Training.
Your data will be handled in accordance with our Privacy Policy
Book this course
£1,095 ex VAT
Loading...
Other options available
Private classes
Call our sales team today
All of our scheduled courses are available as private sessions, tailored to the needs of your team. These can be delivered at our own training centres globally, any location of your choice or via Virtual Classroom.
LEARN MORE
Enterprise Solutions
Whether you employ ten or ten thousand employees, our enterprise training solutions can be designed to suit your organisations learning needs.
More about Enterprise Solutions
Related news
& insights
BROWSE ALL ARTICLES
Blog
14 Funny & Weird Collective Nouns...
01 Sep, 2019
Our love for the English language at Jellyfish Training recently took us down a road of collective nouns. We thought we’d create this funny list for you and bring them to life with illustrations....
Blog
How to Create Audience Segments in Google Analytics
10 Sep, 2019
Here's our easy guide to getting started with audience segmentation in Google Analytics....
Blog
Free Keyword Research Template
11 Sep, 2019
Keyword research is the process of finding and analyzing actual search terms that people enter into search engines. Find here our free Keyword Research Template do help get you started....
Blog
A Social Media Plan to save you hours of work
11 Sep, 2019
A strategic marketing activity plan for your social media allows you to focus on the important factors that are going to help you meet your business objectives, and not get weighted down to the unprod...
North America
Europe, Middle East & Africa