Google Cloud Platform (GCP) lets organizations take advantage of the powerful network and technologies that Google uses to deliver its own products. Global companies like Coca-Cola and cutting-edge technology stars like Spotify are already running sophisticated applications on GCP. This course will help you design an enterprise-class Google Cloud infrastructure for your own organization.
When you architect an infrastructure for mission-critical applications, not only do you need to choose the appropriate compute, storage, and networking components, but you also need to design for security, high availability, regulatory compliance, and disaster recovery. This course uses a case study to demonstrate how to apply these design principles to meet real-world requirements.
Learning Objectives
- Map compute, storage, and networking requirements to Google Cloud Platform services
- Create designs for high availability and disaster recovery
- Use appropriate authentication, roles, service accounts, and data protection
- Create a design to comply with regulatory requirements
Intended Audience
This course is intended for anyone looking to design and build an enterprise-class Google Cloud Platform infrastructure for their own organization.
Prerequisites
To get the most out of this course, you should have some basic knowledge of Google Cloud Platform.
Welcome to “Designing a Google Cloud Infrastructure”. I’m Guy Hummel, and I’ll be showing you how to build an enterprise IT solution in Google Cloud Platform.
To get the most from this series of videos, you should already have a good understanding of the fundamental components of Google Cloud Platform. I’ll be showing you how to use these building blocks to construct an enterprise-class application architecture.
We’re going to use a case study as an example of how to apply enterprise principles to a design. I’ll start by explaining how you would take an organization’s requirements and translate them into the appropriate compute, storage, and network components on GCP. I’ll also show you how to make it a high-availability design.
Then I’ll cover how to secure the environment, including how to authenticate and give permissions to people as well as to applications, how to encrypt your data, and how to comply with a rigorous security standard like PCI DSS.
Finally, we’ll wrap up with how to design a solution that can recover from disasters.
We’d love to get your feedback on this course, so please give it a rating when you’re finished. Thanks!
Guy launched his first training website in 1995 and he's been helping people learn IT technologies ever since. He has been a sysadmin, instructor, sales engineer, IT manager, and entrepreneur. In his most recent venture, he founded and led a cloud-based training infrastructure company that provided virtual labs for some of the largest software vendors in the world. Guy’s passion is making complex technology easy to understand. His activities outside of work have included riding an elephant and skydiving (although not at the same time).