Skip to Scheduled Dates
Course Overview
One small change in cloud security can create a ripple effect across your entire Google Cloud Platform (GCP) environment, strengthening threat resistance, compliance, and efficiency. When you master core areas like Identity and Access Management (IAM), VPC configuration, and workload protection, your security posture shifts from reactive to proactive. Tools such as Cloud IDS, Web Security Scanner, and BeyondCorp Enterprise begin working together as a unified defense system.
This hands-on course teaches you how to architect secure cloud solutions through real-world labs and scenarios. You’ll practice configuring access controls, protecting workloads, and automating threat detection across GCP. Instead of chasing vulnerabilities after attacks, you’ll learn to build systems that are secure by design. From mitigating DDoS threats to managing content vulnerabilities, this training gives you the practical skills to design and deploy secure cloud solutions with confidence.
Who Should Attend
Cloud information security analysts, architects, and engineers
Information security/cybersecurity specialists
Cloud infrastructure architects
Developers of cloud applications.
Course Objectives
By the end of the course, you’ll be able to deploy and manage a secure GCP environment using a wide array of security controls and best practices.
You will learn how to:
- Identify the foundations of Google Cloud security
- Configure IAM roles and policies for least-privilege access
- Secure Compute Engine, Cloud Storage, and Kubernetes workloads
- Design secure VPC networks and apply network-level controls
- Detect, monitor, and respond to security threats using built-in GCP tools
- Prevent and mitigate common vulnerabilities and DDoS attacks
Course Outline
- Foundations of Google Cloud Security
- Shared responsibility model
- Security controls and tools overview
- Securing Access to Google Cloud
- Identity types, Cloud Identity
- IAM basics and advanced permissions
- Identity and Access Management (IAM)
- Policies, roles, service accounts
- Best practices for access control
- Configuring Virtual Private Cloud for Isolation and Security
- Subnets, firewalls, Private Google Access
- Flow logs and secure communication
- Securing Compute Engine
- Instance identity and metadata
- OS patching, image management
- Securing Cloud Data
- Cloud Storage and encryption options
- IAM for data access
- Securing Applications
- Secure design principles
- Web Security Scanner, content protection
- Securing Google Kubernetes Engine (GKE)
- Workload identity, RBAC, network policies
- Secure pod deployment
- Protecting Against DDoS Attacks
- Cloud Armor, Load Balancing, autoscaling
- Real-time protection strategies
- Addressing Content-Related Vulnerabilities
- Cloud DLP, BeyondCorp, data classification
- Monitoring, Logging, Auditing, and Scanning
- Cloud Audit Logs, Security Command Center, Cloud Monitoring
- Threat detection and incident response