Table of contents
Getting Started
0mins
Lock icon
Course Introduction | 0m
Lock icon
About the Training Architect | 0m
Getting Started
0mins
Lock icon
Introducing our Demonstration Organization | 0m
Lock icon
Protecting Your Google Cloud Account | 0m
Identity and Access Management (IAM)
30mins
Lock icon
GCP Resource Hierarchy | 0m
Lock icon
Identity and Access Management (IAM) | 0m
Lock icon
Navigating IAM | 0m
Lock icon
Adding IAM Roles | 0m
Lock icon
Folders | 0m
Lock icon
Service Accounts | 0m
Lock icon
Custom Roles | 0m
Lock icon
Edit IAM Policy | 0m
Lock icon
IAM Best Practices | 0m
Lock icon
Putting it all Together | 0m
Lock icon
QUIZ: Google Cloud IAM and SecurityQUIZ: Google Cloud IAM and Security | 30m
Securing GCP Network Infrastructure
30mins
Lock icon
Virtual Private Cloud (VPC) | 0m
Lock icon
Firewalls Basics | 0m
Lock icon
Viewing Firewall Rules | 0m
Lock icon
Create Targeted Firewall Rule | 0m
Lock icon
Automate Firewall Rules for Webserver | 0m
Lock icon
Limiting Exposure | 0m
Lock icon
Google Cloud VPN | 0m
Lock icon
Bastion Host | 0m
Lock icon
Interactive Serial Console | 0m
Lock icon
Routes | 0m
Lock icon
Private Google Access | 0m
Lock icon
Network IAM Roles | 0m
Lock icon
QUIZ: Google Cloud VPC Security EssentialsQUIZ: Google Cloud VPC Security Essentials | 30m
Securing your Operating System
30mins
Lock icon
OS Security Overview | 0m
Lock icon
Limit OS Access by Location | 0m
Lock icon
OS Updates | 0m
Lock icon
Securing Scaling Instance Groups | 0m
Lock icon
SSH Keys and Metadata | 0m
Lock icon
Securing SSH Access to Linux Instances | 0m
Lock icon
Linux Access and IAM Roles | 0m
Lock icon
Windows Instance Access Management | 0m
Lock icon
OS Security Best Practices and Acceptable Use | 0m
Lock icon
QUIZ: Securing the Operating SystemQUIZ: Securing the Operating System | 30m
Securing Your Data
30mins
Lock icon
Securing Cloud Storage | 0m
Lock icon
Cloud Storage IAM Roles | 0m
Lock icon
Demonstrating Storage IAM Scopes | 0m
Lock icon
Access Control Lists (ACLs) | 0m
Lock icon
Demonstrating ACLs | 0m
Lock icon
Signed URLs | 0m
Lock icon
Database Security | 0m
Lock icon
QUIZ: Securing Your Data with Google CloudQUIZ: Securing Your Data with Google Cloud | 30m
Monitoring GCP
0mins
Lock icon
Logging and Monitoring with Stackdriver | 0m
Lock icon
Viewing Stackdriver Logs | 0m
Lock icon
Exporting Logs | 0m
Lock icon
Monitoring and Alerts | 0m
Google Cloud Platform and Auditing
30mins
Lock icon
Compliance on Google Cloud Platform | 0m
Lock icon
QUIZ: Monitoring, Alerting, and Auditing within the Google CloudQUIZ: Monitoring, Alerting, and Auditing within the Google Cloud | 30m
GCP Encryption Options
30mins
Lock icon
Encryption on Google Cloud Platform | 0m
Lock icon
Key Management Service | 0m
Lock icon
Encryption Demonstration with KMS | 0m
Lock icon
QUIZ: Google Cloud Encryption OptionsQUIZ: Google Cloud Encryption Options | 30m
Final Steps
0mins
Lock icon
Next Steps | 0m
About the author
Matthew Ulasien
I'm a technology professional with over 20 years of experience, with my head firmly lost in the clouds.
More Courses by Matthew U.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon