Security in Google Cloud Platform Training Logo

Security in Google Cloud Platform Training

Live Online & Classroom Enterprise Certification Training

Powered By

Google Cloud Platform Logo

This Google Cloud Platform Security training gives participants broad study of security controls and techniques on Google Cloud Platform.

ATP_Authorized Logo

Powered By

Google Cloud Platform Logo

Looking for a private batch ?

REQUEST A CALLBACK

Need help finding the right training?

Your Message

  • Certified Trainer

  • Authorized Courseware

  • Completion Certificate from ATP

  • Enterprise Reporting

  • Lifetime Access

  • CloudLabs

  • 24x7 Support

  • Real-time code analysis and feedback

What is GCP Security Certification Training about?

This GCP Security Certification training course contains lectures, demonstrations, and hands-on labs for participants to explore and deploy the components of a secure GCP solution. Participants also learn mitigation techniques for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use.

Who is GCP Security Certification Training for?

This GCP Security training class is intended for the following job roles (Cloud): 


  • Information security analysts
  • Architects, and Engineers
  • Information security/cybersecurity specialists
  • Cloud infrastructure architects
  • Google and partner field personnel who work with customers in those job roles
  • Developers of cloud applications.

What are the prerequisites for GCP Security Certification Training?

No Prerequisites

Available Training Modes

Live Online Training

12 Hours

Classroom Training

2 Days

Course Outline Expand All

Expand All

  • Google Cloud's approach to security
  • The shared security responsibility model
  • Threats mitigated by Google and by GCP
  • Access Transparency
  • Cloud Identity
  • Syncing with Microsoft Active Directory
  • Choosing between Google authentication and SAML-based SSO
  • GCP best practices
  • GCP Resource Manager: projects, folders, and organizations
  • GCP IAM roles, including custom roles
  • GCP IAM policies, including organization policies
  • GCP IAM best practices
  • Configuring VPC firewalls (both ingress and egress rules)
  • Load balancing and SSL policies
  • Private Google API access
  • SSL proxy use
  • Best practices for structuring VPC networks
  • Best security practices for VPNs
  • Security considerations for interconnect and peering options
  • Available security products from partners
  • Stackdriver monitoring and logging
  • VPC flow logs
  • Cloud audit logging
  • Deploying and Using Forseti
  • Compute Engine service accounts, default and customer-defined
  • IAM roles for VMs
  • API scopes for VMs
  • Managing SSH keys for Linux VMs
  • Managing RDP logins for Windows VMs
  • Organization policy controls: trusted images, public IP address, disabling serial port
  • Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys
  • Finding and remediating public access to VMs
  • VM best practices
  • Encrypting VM disks with customer-supplied encryption keys
  • Cloud Storage and IAM permissions
  • Cloud Storage and ACLs
  • Auditing cloud data, including finding and remediating publicly accessible data
  • Signed Cloud Storage URLs
  • Signed policy documents
  • Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys
  • Best practices, including deleting archived versions of objects after key rotation
  • BigQuery authorized views
  • BigQuery IAM roles
  • Best practices, including preferring IAM permissions over ACLs
  • How DDoS attacks work
  • Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor
  • Types of complementary partner products
  • Types of application security vulnerabilities
  • DoS protections in App Engine and Cloud Functions
  • Cloud Security Scanner
  • Threat: Identity and Oauth phishing
  • Identity Aware Proxy
  • Threat: Ransomware
  • Mitigations: Backups, IAM, Data Loss Prevention API
  • Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content
  • Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API

Who is the instructor for this training?

The trainer for this Google Cloud Platform training has extensive experience in this domain, including years of experience training & mentoring professionals.

Course Logo

GCP Security Certification Training - Certification & Exam

  • SpringPeople is the Authorized Training Partner of Google Cloud Platform
  • Security in Google Cloud Platform training prepares you for Professional Cloud Security Engineer Certification exam 
  • The training fees is exclusive of exam cost.
  • For any queries; feel free to reach us at gcp@springpeople.com

Reviews