Course

Mitigating Security Vulnerabilities on Google Cloud 日本語版

Google Cloud

This self-paced training course, offered by Google Cloud, provides participants with essential knowledge to mitigate security vulnerabilities on Google Cloud infrastructure. The course covers a range of topics including distributed denial-of-service (DDoS) protection, managing content-related vulnerabilities, and implementing monitoring, logging, auditing, and scanning solutions on Google Cloud.

Throughout the training, participants will learn about various threats such as DDoS attacks and phishing attacks and explore methods to mitigate these risks. Additionally, the course delves into managing content-related vulnerabilities, implementing Google Cloud monitoring, logging, auditing, and scanning solutions, and ensuring overall compliance with the organization's security policies through tools like Security Command Center, Cloud Logging, and Forseti.

  • Learn to manage DDoS protection
  • Discover best practices for managing content-related vulnerabilities
  • Implement Google Cloud monitoring, logging, auditing, and scanning solutions

Certificate Available ✔

Get Started / More Info
Mitigating Security Vulnerabilities on Google Cloud 日本語版
Course Modules

Welcome to the self-paced training course, "Mitigating Security Vulnerabilities on Google Cloud." Explore essential modules covering DDoS protection, content-related vulnerabilities, and monitoring, logging, auditing, and scanning solutions on Google Cloud.

「Mitigating Security Vulnerabilities on Google Cloud」にようこそ

Welcome to "Mitigating Security Vulnerabilities on Google Cloud."

分散型サービス拒否攻撃(DDoS)からの保護

This module provides an overview of DDoS attacks, mechanisms, mitigation techniques, and preventive measures within Google Cloud. Participants will also explore related partner products and gain hands-on experience with Google Cloud Armor.

コンテンツ関連の脆弱性: 手法とベスト プラクティス

Participants will learn about managing content-related vulnerabilities, including ransomware protection, data misuse, privacy infringement, and confidential content protection. The module also includes a practical lab using the DLP API to anonymize sensitive data.

モニタリング、ロギング、監査、スキャン

This module covers Security Command Center, Cloud Monitoring, Cloud Logging, Cloud Audit Logs, and the automation of cloud security. Participants will gain practical experience in configuring and utilizing these essential security tools within Google Cloud.

More Cloud Computing Courses

IBM Full Stack Software Developer

IBM

Prepare for a high-growth career in full stack development with IBM's Full Stack Software Developer program. Gain hands-on experience in cloud native application...

Check Point Jump Start - CloudGuard Workload Protection

Check Point Software Technologies Ltd.

Check Point Jump Start - CloudGuard Workload Protection is an in-depth program focusing on cloud workload protection and application security, offering insight into...

Getting Started with Cloud Shell and gcloud

Google Cloud

Getting Started with Cloud Shell and gcloud: Learn to connect to computing resources hosted on Google Cloud Platform via the web and use Cloud Shell and the Cloud...

Encoder-Decoder Architecture - Español

Google Cloud

En este curso, aprenderás sobre la arquitectura de codificador-decodificador y cómo implementarla en TensorFlow para generar poemas. Adquiere habilidades para...