Mitigating Security Vulnerabilities on Google Cloud

Course Overview

In this training course, participants learn mitigations for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks as well as threats involving content classification and use. They also learn about the Security Command Center, cloud logging and audit logging, and using Forseti to view overall compliance with your organization's security policies.

Pre-requisites

  • Before-hand completion of Google Cloud Fundamentals: Core Infrastructure or equivalent experience. 
  • Networking in the Google Cloud pre-requisites or similar experience
  • Having knowledge of foundational and fundamental concepts in information security: 
  • Concepts that are fundamental: vulnerability, threat, attack surface, confidentiality, integrity, and availability common danger categories, as well as their mitigating techniques, Public-key encryption, pairs of public and private keys, Certificate Authorities, Cipher Types, Key Width, Public vital infrastructures, Transport Layer Security/Secure Sockets Layer encryption, and security policy
  • Basic familiarity with Linux operating system environments and command-line tools
  • Experience in systems operations, including setting up and managing apps in a private or public cloud. Being able to read Python or JavaScript code.

Audience Profile

  • [Cloud] information security analysts, architects, and engineers. 
  • Information security/cybersecurity specialists. 
  • Cloud infrastructure architects. 
  • They are also intended for Google and partner field personnel working with customers in those roles. Also useful for cloud application developers

Learning Objectives

  • Manage protection against distributed denial of service attacks (DDoS).
  • Manage content-related vulnerabilities.
  • Implement Google Cloud monitoring, logging, auditing, and scanning solutions.

Content Outline

Welcome to Mitigating Security Vulnerabilities on Google Cloud! In this course, we will build upon the foundations laid during the earlier courses in this series. In this section, expect to learn more about the security tools available when using Google Cloud and how to use them to lower the risk of malicious attacks against your systems, software, and data.

Distributed Denial of Service Attacks are a significant concern today and can have a massive impact on businesses if they are not adequately prepared. In this module, we will begin with a quick discussion on how DDoS attacks work and then review some DDoS mitigation techniques provided by Google Cloud. We will finish up with a review of complementary partner products and a lab where you will get a chance to see some DDoS mitigations in action.

In this module, we will discuss threats to your content. First, we review the threat of ransomware and some of the mitigations you can utilize in Google Cloud to help protect your systems from it. Then we will discuss threats related to data misuse and privacy violations and discuss a few mitigation strategies that can be utilized to protect applications and systems.

Collecting, processing, aggregating, and displaying real-time quantitative data helps supply raw input into business analytics and facilitates analysis of security breaches. Google Cloud provides many services and features to help with this, which is what this module is all about. In this module, we will investigate Cloud Monitoring and Cloud Logging, Cloud Audit Logs, and then discuss how to leverage Forseti Security to monitor your Google Cloud resources systematically.

FAQs

A: Some of the benefits of cloud services are listed below:-

  • Cloud services widely help utilize the corporate segment investment; hence it is cost-saving.
  • Cloud services help in developing scalable and healthy applications. The current scaling process consumes significantly less time.
  • Cloud services can save maintenance and deployment time.

A: Google docs, Pixlr, and Jaycut are the few top cloud service applications.

A: Utility computing allows the user quickly to pay only for what they are using. It is a plug-in managed by an organization that decides what type of services has to be deployed from the Cloud. Most organizations prefer to use a hybrid strategy.

A: Cloud-based development generally refers to making and deploying cloud apps, a type of highly evolved web app. App development mainly used to require long-hours and large amounts of data for traditional programming through archaic languages like ADA, COBOL, and PASCAL.

A: To attend the training session, you should have operational Desktops or Laptops with the required specification and a good internet connection to access the labs. 

A: We recommend you attend the live session to practice & clarify the doubts instantly and get more value from your investment. However, if, due to some contingency, you have to skip the class, Radiant Techlearning will help you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption and NOT for distribution or any commercial use.

A: Radiant Techlearning has a data center containing a Virtual Training environment for participants' hand-on-practice. 

Participants can easily access these labs over Cloud with the help of a remote desktop connection. 

Radiant virtual labs allow you to learn from anywhere and in any time zone. 

A: The learners will be enthralled as we engage them in the natural world and Oriented industry projects during the training program. These projects will improve your skills and knowledge and give you a better experience. These real-time projects will help you a lot in your future tasks and assignments.

Send a Message.


  • Enroll