offer Hand Emojji Images Get Pixelpondindia Courses  -95% off.

Cloud Security Engineer

This self-paced training course offers an in-depth study of security controls and techniques in Google Cloud. Through recorded lectures, demonstrations, and hands-on labs,…

Free
  • Last Updated: May 15, 2025

About Course

This self-paced training course offers an in-depth study of security controls and techniques in Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, you’ll learn to deploy and manage secure Google Cloud solutions, including components such as Cloud Identity, Resource Manager, Identity and Access Management (IAM), Virtual Private Cloud firewalls, Cloud Load Balancing, Direct Peering, Carrier Peering, Cloud Interconnect, and VPC Service Controls.

Key Features:
  • RPS Consulting’s Google Cloud Security Training is highly regarded for professionals seeking to enhance their skills and advance their careers.
  • The 11-module OEM-certified course provides a comprehensive understanding of mitigating attacks and securing Google Cloud-based services.
  • Gain expertise in identifying, exploiting, and preventing common vulnerabilities, especially related to dynamic code execution.
  • Learn to protect the confidentiality, integrity, and availability of user data and manage security threats across services like G Suite, Google Cloud Platform, and Google Cloud Endpoints.
  • The course includes hands-on labs and is available on demand, with sessions led by certified instructors.
Course Modules

Module 1: Preparing for Your Professional Cloud Security Engineer Journey

Topics Covered

  • Introduction

  • Configuring Access Within a Cloud Solution Environment

  • Ensuring Data Protection

  • Managing Operations in a Cloud Environment

  • Ensuring Compliance

Module 2: Google Cloud Fundamentals: Core Infrastructure

Topics Covered

  • Introducing Google Cloud

  • Resources and Access in the Cloud

  • Virtual Machines and Networks in the Cloud

  • Storage in the Cloud

  • Containers in the Cloud

  • Applications in the Cloud

  • Developing and Deploying in the Cloud

  • Logging and Monitoring in the Cloud

Hands-On Labs

  • A Tour of Google Cloud Hands-on Labs

  • Compute Engine: Qwik Start – Windows

  • Getting Started with Cloud Shell and gcloud

  • Kubernetes Engine: Qwik Start

  • Cloud Storage: Qwik Start – Cloud Console

Module 3: Networking in Google Cloud: Defining and Implementing Networks

Topics Covered

  • Google Cloud VPC Networking Fundamentals

  • Controlling Access to VPC Networks

  • Sharing Networks Across Projects

  • Load Balancing

Hands-On Labs

  • Multiple VPC Networks

  • VPC Network Peering

  • VPC Networks – Controlling Access

  • HTTP Load Balancer with Cloud Armor

  • Create an Internal Load Balancer

Module 4: Managing Security in Google Cloud

Topics Covered

  • Foundations of Google Cloud Security

  • Cloud Identity

  • Identity and Access Management (IAM)

  • Configuring Virtual Private Cloud for Isolation and Security

Hands-On Labs

  • Cloud IAM: Qwik Start

  • IAM Custom Roles

  • Service Accounts and Roles: Fundamentals

  • User Authentication: Identity-Aware Proxy

  • Getting Started with Cloud KMS

  • Setting up a Private Kubernetes Cluster

Module 5: Logging, Monitoring, and Observability in Google Cloud

Topics Covered

  • Introduction to Monitoring in Google Cloud

  • Avoiding Customer Pain

  • Alerting Policies

  • Monitoring Critical Systems

  • Configuring Google Cloud Services for Observability

  • Advanced Logging and Analysis

  • Monitoring Network Security and Audit Logs

  • Managing Incidents

  • Investigating Application Performance Issues

  • Optimizing the Costs of Monitoring

Hands-On Labs

  • Cloud Monitoring: Qwik Start

Module 6: Security Best Practices in Google Cloud

Topics Covered

  • Securing Compute Engine: Techniques and Best Practices

  • Securing Cloud Data: Techniques and Best Practices

  • Application Security: Techniques and Best Practices

  • Securing Kubernetes: Techniques and Best Practices

Hands-On Labs

  • Migrating to GKE Containers

  • How to Use a Network Policy on Google Kubernetes Engine

  • Using Role-based Access Control in Kubernetes Engine

  • Google Kubernetes Engine Security: Binary Authorization

  • Securing Applications on Kubernetes Engine – Three Examples

  • Hardening Default GKE Cluster Configurations

Module 7: Mitigating Security Vulnerabilities on Google Cloud Platform

Topics Covered

  • Securing Compute Engine

  • Securing Cloud Data

  • Protecting Against Distributed Denial of Service (DDoS) Attacks

  • Application Security

  • Content-Related Vulnerabilities

Hands-On Labs

  • Configuring, Using, and Auditing VM Service Accounts and Scopes

  • Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS

  • Configuring Traffic Blocklisting with Google Cloud Armor

  • Using Web Security Scanner to Find Vulnerabilities in an App Engine Application

Why Choose us

Live Online Training (Duration : 24 Hours)

⭢ Guaranteed to run classes

⭢ Experienced & certified trainers

⭢ Query Handling session


Enquire About This Course

     


     

    Show More

    Benefits of the course

    • Secure Cloud Infrastructure and Applications:
    • Gain the expertise to identify, mitigate, and respond to security threats across leading cloud platforms like AWS, Azure, and Google Cloud.
    • Master Cloud Security Tools and Best Practices:
    • Learn to implement security controls, manage identity and access, encrypt data, and ensure compliance using tools such as AWS Security Hub, Azure Defender, Google Chronicle, IAM, and more.
    • Hands-On Labs and Real-World Scenarios:
    • Apply threat detection, incident response, and security automation through practical exercises and cloud-native simulations.
    • Prepare for Industry-Leading Certifications:
    • Get ready for certifications like AWS Certified Security – Specialty, Microsoft Certified: Azure Security Engineer Associate (AZ-500), or Google Professional Cloud Security Engineer.
    • Advance Your Career in Cybersecurity:
    • Unlock roles like Cloud Security Engineer, Security Operations Analyst, Cloud Compliance Specialist, or DevSecOps Engineer in high-demand security-focused organizations.
    SORT By Rating
    SORT By Order
    SORT By Author
    SORT By Price
    SORT By Category