image
Conclusion

Contents

Designing a GCP Security Infrastructure
1
Introduction
PREVIEW40s
2
Case Study
PREVIEW3m 5s
4
Roles
3m 25s
8
Conclusion
PREVIEW20s
Conclusion
Difficulty
Intermediate
Duration
28m
Students
12
Ratings
5/5
starstarstarstarstar
Description

This course walks you through the main security components of Google Cloud Platform and uses a case study to show you how these can be applied to a real-world example.

Learning Objectives

By the end of this course, you will understand how the following components can be used to secure your GCP environments:

  • Authentication
  • Roles
  • Service accounts
  • Data protection and encryption
  • Legislation and compliance

Intended Audience

This course is intended for anyone who wants to learn more about Google Cloud Platform.

Prerequisites

To get the most from this course, you should already have a basic understanding of Google Cloud Platform.

Transcript

I hope you enjoyed learning how to design a Google Cloud Platform security infrastructure. Now you know how to secure your infrastructure with authentication, roles, access control lists, service accounts, encryption, and compliance.

 

Please give this course a rating, and if you have any questions or comments, please let us know. Thanks!

About the Author
Students
201667
Courses
97
Learning Paths
162

Guy launched his first training website in 1995 and he's been helping people learn IT technologies ever since. He has been a sysadmin, instructor, sales engineer, IT manager, and entrepreneur. In his most recent venture, he founded and led a cloud-based training infrastructure company that provided virtual labs for some of the largest software vendors in the world. Guy’s passion is making complex technology easy to understand. His activities outside of work have included riding an elephant and skydiving (although not at the same time).