This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Identity, Resource Manager, Cloud IAM, Virtual Private Cloud firewalls, Cloud Load Balancing, Cloud Peering, Cloud Interconnect, and VPC Service Controls.
Managing Security in Google Cloud
This course is part of multiple programs.
Instructor: Google Cloud Training
Sponsored by Google People Development
32,162 already enrolled
(1,073 reviews)
What you'll learn
Identify the foundations of Google Cloud security.
Manage administration identities with Google Cloud.
Implement user administration with Identity and Access Management (IAM).
Configure Virtual Private Clouds (VPCs) for isolation, security, and logging.
Skills you'll gain
Details to know
Add to your LinkedIn profile
4 assignments
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 5 modules in this course
Welcome to Managing Security in Google Cloud, the first course of Security in Google Cloud. This course gives you an overview of security controls and techniques on Google Cloud. Through lectures, demonstrations, and hands-on labs, you will explore and deploy the components of a secure Google Cloud solution.
What's included
1 video1 reading
Securing systems is a hot topic and should be a priority for everyone today - and, as you will see, it is definitely a priority here at Google. In this module we will introduce you to Google Cloud’s approach to security. We will also discuss the shared security responsibility model, which is a collaborative effort between Google and its users. Next, we will outline several threats that are mitigated for you when your systems are run on Google’s infrastructure in Google Cloud. And, finally, we will end with a section on access transparency.
What's included
7 videos1 assignment
In this module we will discuss Cloud Identity, a service which makes it easy to manage cloud users, devices, and apps from one console. We will also discuss a few related features to help reduce the operational overhead of managing Google Cloud users, such as the Google Cloud Directory Sync and Single Sign-On. We will end with some authentication best practices.
What's included
10 videos1 assignment
Identity and Access Management (IAM) lets administrators authorize who can take action on specific resources, giving you full control and visibility to manage your cloud resources centrally. More specifically, we will cover; the Resource Manager which enables you to centrally manage projects, folders, and organizations, IAM roles and policies, including custom roles, and IAM best practices, including separation of duties and the principle of least privilege.
What's included
11 videos1 assignment1 app item
Managed networking on Google Cloud utilizes a Virtual Private Cloud (or VPC). In this module we will discuss VPC related security concepts including: VPC firewalls, load balancing SSL policies, network Interconnect & peering options, VPC network best practices and VPC flow logs. You will also have the opportunity to practice what you’ve learned, by completing the labs exercises “Configuring VPC Firewalls” and “Configuring and Using VPC Flow Logs in Cloud Logging.”
What's included
18 videos1 assignment3 app items
Instructor
Offered by
Why people choose Coursera for their career
Learner reviews
1,073 reviews
- 5 stars
73.92%
- 4 stars
20.67%
- 3 stars
4.46%
- 2 stars
0.37%
- 1 star
0.55%
Showing 3 of 1073
Reviewed on Mar 30, 2022
Definitely needs some updates on the labs to reflect the changes of the interface and where some of the commands/options are actually kept now.
Reviewed on Feb 24, 2019
Excellent, great overview of not just how to enforce security but how to analyze what's going on on your landscape
Reviewed on Jun 15, 2019
Very detailed and well organized course. It includes practical labs, exercising security concepts and practices on realistic GCP project scenarios.
Recommended if you're interested in Information Technology
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy