About Course
This self-paced training course offers an in-depth study of security controls and techniques in Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, you’ll learn to deploy and manage secure Google Cloud solutions, including components such as Cloud Identity, Resource Manager, Identity and Access Management (IAM), Virtual Private Cloud firewalls, Cloud Load Balancing, Direct Peering, Carrier Peering, Cloud Interconnect, and VPC Service Controls.
Key Features:
- RPS Consulting’s Google Cloud Security Training is highly regarded for professionals seeking to enhance their skills and advance their careers.
- The 11-module OEM-certified course provides a comprehensive understanding of mitigating attacks and securing Google Cloud-based services.
- Gain expertise in identifying, exploiting, and preventing common vulnerabilities, especially related to dynamic code execution.
- Learn to protect the confidentiality, integrity, and availability of user data and manage security threats across services like G Suite, Google Cloud Platform, and Google Cloud Endpoints.
- The course includes hands-on labs and is available on demand, with sessions led by certified instructors.
Course Modules
Module 1: Preparing for Your Professional Cloud Security Engineer Journey
Topics Covered
-
Introduction
-
Configuring Access Within a Cloud Solution Environment
-
Ensuring Data Protection
-
Managing Operations in a Cloud Environment
-
Ensuring Compliance
Module 2: Google Cloud Fundamentals: Core Infrastructure
Topics Covered
-
Introducing Google Cloud
-
Resources and Access in the Cloud
-
Virtual Machines and Networks in the Cloud
-
Storage in the Cloud
-
Containers in the Cloud
-
Applications in the Cloud
-
Developing and Deploying in the Cloud
-
Logging and Monitoring in the Cloud
Hands-On Labs
-
A Tour of Google Cloud Hands-on Labs
-
Compute Engine: Qwik Start – Windows
-
Getting Started with Cloud Shell and gcloud
-
Kubernetes Engine: Qwik Start
-
Cloud Storage: Qwik Start – Cloud Console
Module 3: Networking in Google Cloud: Defining and Implementing Networks
Topics Covered
-
Google Cloud VPC Networking Fundamentals
-
Controlling Access to VPC Networks
-
Sharing Networks Across Projects
-
Load Balancing
Hands-On Labs
-
Multiple VPC Networks
-
VPC Network Peering
-
VPC Networks – Controlling Access
-
HTTP Load Balancer with Cloud Armor
-
Create an Internal Load Balancer
Module 4: Managing Security in Google Cloud
Topics Covered
-
Foundations of Google Cloud Security
-
Cloud Identity
-
Identity and Access Management (IAM)
-
Configuring Virtual Private Cloud for Isolation and Security
Hands-On Labs
-
Cloud IAM: Qwik Start
-
IAM Custom Roles
-
Service Accounts and Roles: Fundamentals
-
User Authentication: Identity-Aware Proxy
-
Getting Started with Cloud KMS
-
Setting up a Private Kubernetes Cluster
Module 5: Logging, Monitoring, and Observability in Google Cloud
Topics Covered
-
Introduction to Monitoring in Google Cloud
-
Avoiding Customer Pain
-
Alerting Policies
-
Monitoring Critical Systems
-
Configuring Google Cloud Services for Observability
-
Advanced Logging and Analysis
-
Monitoring Network Security and Audit Logs
-
Managing Incidents
-
Investigating Application Performance Issues
-
Optimizing the Costs of Monitoring
Hands-On Labs
-
Cloud Monitoring: Qwik Start
Module 6: Security Best Practices in Google Cloud
Topics Covered
-
Securing Compute Engine: Techniques and Best Practices
-
Securing Cloud Data: Techniques and Best Practices
-
Application Security: Techniques and Best Practices
-
Securing Kubernetes: Techniques and Best Practices
Hands-On Labs
-
Migrating to GKE Containers
-
How to Use a Network Policy on Google Kubernetes Engine
-
Using Role-based Access Control in Kubernetes Engine
-
Google Kubernetes Engine Security: Binary Authorization
-
Securing Applications on Kubernetes Engine – Three Examples
-
Hardening Default GKE Cluster Configurations
Module 7: Mitigating Security Vulnerabilities on Google Cloud Platform
Topics Covered
-
Securing Compute Engine
-
Securing Cloud Data
-
Protecting Against Distributed Denial of Service (DDoS) Attacks
-
Application Security
-
Content-Related Vulnerabilities
Hands-On Labs
-
Configuring, Using, and Auditing VM Service Accounts and Scopes
-
Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS
-
Configuring Traffic Blocklisting with Google Cloud Armor
-
Using Web Security Scanner to Find Vulnerabilities in an App Engine Application
Why Choose us
⭢ Live Online Training (Duration : 24 Hours)
⭢ Guaranteed to run classes
⭢ Experienced & certified trainers
⭢ Query Handling session
Enquire About This Course
Benefits of the course
- Secure Cloud Infrastructure and Applications:
- Gain the expertise to identify, mitigate, and respond to security threats across leading cloud platforms like AWS, Azure, and Google Cloud.
- Master Cloud Security Tools and Best Practices:
- Learn to implement security controls, manage identity and access, encrypt data, and ensure compliance using tools such as AWS Security Hub, Azure Defender, Google Chronicle, IAM, and more.
- Hands-On Labs and Real-World Scenarios:
- Apply threat detection, incident response, and security automation through practical exercises and cloud-native simulations.
- Prepare for Industry-Leading Certifications:
- Get ready for certifications like AWS Certified Security – Specialty, Microsoft Certified: Azure Security Engineer Associate (AZ-500), or Google Professional Cloud Security Engineer.
- Advance Your Career in Cybersecurity:
- Unlock roles like Cloud Security Engineer, Security Operations Analyst, Cloud Compliance Specialist, or DevSecOps Engineer in high-demand security-focused organizations.
©2025. All rights reserved by Spireweb.co.in