This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.
Security Best Practices in Google Cloud
This course is part of multiple programs.
Instructor: Google Cloud Training
Sponsored by Google People Development
14,652 already enrolled
(346 reviews)
What you'll learn
Apply techniques and best practices to secure Compute Engine
Apply techniques and best practices to secure cloud data
Apply techniques and best practices to secure applications
Apply techniques and best practices for securing Google Kubernetes Engine (GKE) resources.
Details to know
Add to your LinkedIn profile
4 assignments
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 5 modules in this course
Welcome to Security Best Practices in Google Cloud! In this course we will build upon the foundations laid during the earlier course in this series, Managing Security in Google Cloud. In this section, expect to learn more about how to implement security "best practices" to lower the risk of malicious attacks against your systems, software and data.
What's included
2 readings
In this module we will start with a discussion of service accounts, IAM roles and API scopes as they apply to compute engine. We will also discuss managing VM logins, and how to use organization policies to set constraints that apply to all resources in your organization's hierarchy. Next, we will review compute engine best practices to give you some tips for securing compute engine.Lastly, we will cover encrypting persistent disks with Customer-Supplied Encryption keys.
What's included
14 videos1 assignment1 app item
In this module we discuss controlling IAM permissions and access control lists on Cloud Storage buckets, auditing cloud data, including finding and remediating data that has been set to publicly accessible, how to use signed Cloud Storage URLs and signed policy documents, and encrypting data at rest. In addition, BigQuery IAM roles and authorized views will be covered to demonstrate managing access to datasets and tables. The module will conclude with an overview of storage best practices
What's included
13 videos1 assignment3 app items
In this module we will discuss application security techniques and best practices. We will see how Web Security Scanner can be used to identify vulnerabilities in your applications, and dive into the subject of Identity and Oauth phishing. Lastly, you will learn how Identity-Aware Proxy, or IAP, can be used to control access to your cloud applications.
What's included
10 videos1 assignment3 app items
Protecting workloads in Google Kubernetes Engine involves many layers of the stack, including the contents of your container image, the container runtime, the cluster network, and access to the cluster API server. In this module, you will learn how to securely set up your Authentication and Authorization, how to harden your clusters, secure your workloads, and monitor everything to make sure it stays in good health.
What's included
7 videos1 assignment
Instructor
Offered by
Why people choose Coursera for their career
Learner reviews
346 reviews
- 5 stars
75.14%
- 4 stars
17.34%
- 3 stars
5.78%
- 2 stars
1.15%
- 1 star
0.57%
Showing 3 of 346
Reviewed on Feb 12, 2021
This Module has escalated my learning experience on Security Best Practices!
Reviewed on Jul 20, 2020
Kubernetes related part has different quality than rest of the course. It is very shallow and adds no real value to the course.
Reviewed on Sep 13, 2020
Very helpful course. It provided clear view of the security standards that needs to be followed to utilise GCP securely. Thank you for the course and qwiklabs.
Recommended if you're interested in Information Technology
LearnKartS
Google Cloud
Google Cloud
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy