<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="22865" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/google-sgcp-3d" lastchanged="2025-09-30T15:08:40+02:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>Security in Google Cloud</title><productcode>SGCP-3D</productcode><vendorcode>GO</vendorcode><vendorname>Google</vendorname><fullproductcode>GO-SGCP-3D</fullproductcode><version>3.0.5</version><objective>&lt;ul&gt;
&lt;li&gt;Identify the foundations of Google Cloud security.&lt;/li&gt;&lt;li&gt;Manage administration identities with Google Cloud.&lt;/li&gt;&lt;li&gt;Implement user administration with Identity and Access Management (IAM).&lt;/li&gt;&lt;li&gt;Configure Virtual Private Clouds (VPCs) for isolation, security, and logging.&lt;/li&gt;&lt;li&gt;Apply techniques and best practices for securely managing Compute Engine.&lt;/li&gt;&lt;li&gt;Apply techniques and best practices for securely managing Google Cloud data.&lt;/li&gt;&lt;li&gt;Apply techniques and best practices for securing Google Cloud applications.&lt;/li&gt;&lt;li&gt;Apply techniques and best practices for securing Google Kubernetes Engine (GKE) resources.&lt;/li&gt;&lt;li&gt;Manage protection against distributed denial-of-service attacks (DDoS).&lt;/li&gt;&lt;li&gt;Manage content-related vulnerabilities.&lt;/li&gt;&lt;li&gt;Implement Google Cloud monitoring, logging, auditing, and scanning solutions.&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;ul&gt;
&lt;li&gt;Prior completion of &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/google-gcf-ci&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Google Cloud Fundamentals: Core Infrastructure &lt;span class=&quot;fl-prod-pcode&quot;&gt;(GCF-CI)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt; or equivalent experience&lt;/li&gt;&lt;li&gt;Prior completion of &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/google-ngcp&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Networking in Google Cloud &lt;span class=&quot;fl-prod-pcode&quot;&gt;(NGCP)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt; or equivalent experience&lt;/li&gt;&lt;li&gt;Knowledge of foundational concepts in information security, through experience or through online training such as SANS&amp;#039;s SEC301: Introduction to Cyber Security&lt;/li&gt;&lt;li&gt;Basic proficiency with command-line tools and Linux operating system environments&lt;/li&gt;&lt;li&gt;Systems Operations experience, including deploying and managing applications, either on-premises or in a public cloud environment&lt;/li&gt;&lt;li&gt;Reading comprehension of code in Python or JavaScript&lt;/li&gt;&lt;li&gt;Basic understanding of Kubernetes terminology (preferred but not required)&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;This class is intended for the following job roles:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Cloud information security analysts, architects, and engineers&lt;/li&gt;&lt;li&gt;Information security or cybersecurity specialists&lt;/li&gt;&lt;li&gt;Cloud infrastructure architects&lt;/li&gt;&lt;/ul&gt;</audience><outline>&lt;p&gt;&lt;strong&gt;Module 1: Foundations of Google Cloud Security&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The approach of Google Cloud to security&lt;/li&gt;&lt;li&gt;The shared security responsibility model&lt;/li&gt;&lt;li&gt;Threats mitigated by Google and Google Cloud&lt;/li&gt;&lt;li&gt;Access transparency&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 2: Securing Access to Google Cloud&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Cloud Identity&lt;/li&gt;&lt;li&gt;Google Cloud Directory Sync&lt;/li&gt;&lt;li&gt;Managed Microsoft AD&lt;/li&gt;&lt;li&gt;Google authentication versus SAML-based SSO&lt;/li&gt;&lt;li&gt;Identity Platform&lt;/li&gt;&lt;li&gt;Authentication best practices&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 3: Identity and Access Management (IAM)&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Resource Manager&lt;/li&gt;&lt;li&gt;IAM roles&lt;/li&gt;&lt;li&gt;Service accounts&lt;/li&gt;&lt;li&gt;IAM and Organization policies&lt;/li&gt;&lt;li&gt;Workload identity federation&lt;/li&gt;&lt;li&gt;Policy Intelligence&lt;/li&gt;&lt;li&gt;Lab: Configuring IAM&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 4: Configuring Virtual Private Cloud for Isolation and Security&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;VPC firewalls&lt;/li&gt;&lt;li&gt;Load balancing and SSL policies&lt;/li&gt;&lt;li&gt;Cloud Interconnect&lt;/li&gt;&lt;li&gt;VPC Network Peering&lt;/li&gt;&lt;li&gt;VPC Service Controls&lt;/li&gt;&lt;li&gt;Access Context Manager&lt;/li&gt;&lt;li&gt;VPC Flow Logs&lt;/li&gt;&lt;li&gt;Cloud IDS&lt;/li&gt;&lt;li&gt;Labs:&lt;ul&gt; 
&lt;li&gt;Configuring VPC firewalls&lt;/li&gt;&lt;li&gt;Configuring and Using VPC Flow Logs in Cloud Logging&lt;/li&gt;&lt;li&gt;Demo: Securing Projects with VPC Service Controls&lt;/li&gt;&lt;li&gt;Getting Started with Cloud IDS&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 5: Securing Compute Engine: Techniques and Best Practices&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Service accounts, IAM roles, and API scopes&lt;/li&gt;&lt;li&gt;Managing VM logins&lt;/li&gt;&lt;li&gt;Organization policy controls&lt;/li&gt;&lt;li&gt;Shielded VMs and Confidential VMs&lt;/li&gt;&lt;li&gt;Certificate Authority Service&lt;/li&gt;&lt;li&gt;Compute Engine best practices&lt;/li&gt;&lt;li&gt;Lab: Configuring, Using, and Auditing VM Service Accounts and Scopes&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 6: Securing Cloud Data: Techniques and Best Practices&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Cloud Storage IAM permissions and ACLs&lt;/li&gt;&lt;li&gt;Auditing cloud data&lt;/li&gt;&lt;li&gt;Signed URLs and policy documents&lt;/li&gt;&lt;li&gt;Encrypting with Customer-managed encryption keys (CMEK) and Customer-supplied encryption keys (CSEK)&lt;/li&gt;&lt;li&gt;Cloud HSM&lt;/li&gt;&lt;li&gt;BigQuery IAM roles and authorized views&lt;/li&gt;&lt;li&gt;Storage best practices&lt;/li&gt;&lt;li&gt;Lab: Using Customer-Supplied Encryption Keys with Cloud Storage&lt;/li&gt;&lt;li&gt;Lab: Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS&lt;/li&gt;&lt;li&gt;Lab: Creating a BigQuery Authorized View&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 7: Securing Applications: Techniques and Best Practices&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Types of application security vulnerabilities&lt;/li&gt;&lt;li&gt;Web Security Scanner&lt;/li&gt;&lt;li&gt;Threat Identity and OAuth phishing&lt;/li&gt;&lt;li&gt;Identity-Aware Proxy&lt;/li&gt;&lt;li&gt;Secret Manager&lt;/li&gt;&lt;li&gt;Lab: Identity Application Vulnerabilities with Security Command Center&lt;/li&gt;&lt;li&gt;Lab: Securing Compute Engine Applications with BeyondCorp Enterprise&lt;/li&gt;&lt;li&gt;Lab: Configuring and Using Credentials with Secret Manager&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 8: Securing Google Kubernetes Engine: Techniques and Best Practices&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Types of application security vulnerabilities&lt;/li&gt;&lt;li&gt;Web Security Scanner&lt;/li&gt;&lt;li&gt;Threat: Identity and OAuth phishing&lt;/li&gt;&lt;li&gt;Identity-Aware Proxy&lt;/li&gt;&lt;li&gt;Secret Manager&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 9: Protecting against Distributed Denial of Service Attacks (DDoS)&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How DDoS attacks work&lt;/li&gt;&lt;li&gt;Google Cloud mitigations&lt;/li&gt;&lt;li&gt;Types of complementary partner products&lt;/li&gt;&lt;li&gt;Lab: Configuring Traffic Blocklisting with Google Cloud Armor&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 10: Content-Related Vulnerabilities: Techniques and Best Practices&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Threat: Ransomware&lt;/li&gt;&lt;li&gt;Ransomware mitigations&lt;/li&gt;&lt;li&gt;Threats: data misuse, privacy violations, sensitive content&lt;/li&gt;&lt;li&gt;Content-related mitigation&lt;/li&gt;&lt;li&gt;Redacting Sensitive Data with the DLP API&lt;/li&gt;&lt;li&gt;Lab: Redacting Sensitive Data with DLP API&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 11: Monitoring, Logging, Auditing, and Scanning &lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Security Command Center&lt;/li&gt;&lt;li&gt;Cloud Monitoring and Cloud Logging&lt;/li&gt;&lt;li&gt;Cloud Audit Logs&lt;/li&gt;&lt;li&gt;Cloud security automation&lt;/li&gt;&lt;li&gt;Lab: Configuring and Using Cloud Monitoring and Cloud Logging&lt;/li&gt;&lt;li&gt;Lab: Configuring and Viewing Cloud Audit Logs&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>- Identify the foundations of Google Cloud security.
- Manage administration identities with Google Cloud.
- Implement user administration with Identity and Access Management (IAM).
- Configure Virtual Private Clouds (VPCs) for isolation, security, and logging.
- Apply techniques and best practices for securely managing Compute Engine.
- Apply techniques and best practices for securely managing Google Cloud data.
- Apply techniques and best practices for securing Google Cloud applications.
- Apply techniques and best practices for securing Google Kubernetes Engine (GKE) resources.
- Manage protection against distributed denial-of-service attacks (DDoS).
- Manage content-related vulnerabilities.
- Implement Google Cloud monitoring, logging, auditing, and scanning solutions.</objective_plain><essentials_plain>- Prior completion of Google Cloud Fundamentals: Core Infrastructure (GCF-CI) or equivalent experience
- Prior completion of Networking in Google Cloud (NGCP) or equivalent experience
- Knowledge of foundational concepts in information security, through experience or through online training such as SANS's SEC301: Introduction to Cyber Security
- Basic proficiency with command-line tools and Linux operating system environments
- Systems Operations experience, including deploying and managing applications, either on-premises or in a public cloud environment
- Reading comprehension of code in Python or JavaScript
- Basic understanding of Kubernetes terminology (preferred but not required)</essentials_plain><audience_plain>This class is intended for the following job roles:



- Cloud information security analysts, architects, and engineers
- Information security or cybersecurity specialists
- Cloud infrastructure architects</audience_plain><outline_plain>Module 1: Foundations of Google Cloud Security



- The approach of Google Cloud to security
- The shared security responsibility model
- Threats mitigated by Google and Google Cloud
- Access transparency
Module 2: Securing Access to Google Cloud



- Cloud Identity
- Google Cloud Directory Sync
- Managed Microsoft AD
- Google authentication versus SAML-based SSO
- Identity Platform
- Authentication best practices
Module 3: Identity and Access Management (IAM)



- Resource Manager
- IAM roles
- Service accounts
- IAM and Organization policies
- Workload identity federation
- Policy Intelligence
- Lab: Configuring IAM
Module 4: Configuring Virtual Private Cloud for Isolation and Security



- VPC firewalls
- Load balancing and SSL policies
- Cloud Interconnect
- VPC Network Peering
- VPC Service Controls
- Access Context Manager
- VPC Flow Logs
- Cloud IDS
- Labs: 
- Configuring VPC firewalls
- Configuring and Using VPC Flow Logs in Cloud Logging
- Demo: Securing Projects with VPC Service Controls
- Getting Started with Cloud IDS
Module 5: Securing Compute Engine: Techniques and Best Practices



- Service accounts, IAM roles, and API scopes
- Managing VM logins
- Organization policy controls
- Shielded VMs and Confidential VMs
- Certificate Authority Service
- Compute Engine best practices
- Lab: Configuring, Using, and Auditing VM Service Accounts and Scopes
Module 6: Securing Cloud Data: Techniques and Best Practices



- Cloud Storage IAM permissions and ACLs
- Auditing cloud data
- Signed URLs and policy documents
- Encrypting with Customer-managed encryption keys (CMEK) and Customer-supplied encryption keys (CSEK)
- Cloud HSM
- BigQuery IAM roles and authorized views
- Storage best practices
- Lab: Using Customer-Supplied Encryption Keys with Cloud Storage
- Lab: Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS
- Lab: Creating a BigQuery Authorized View
Module 7: Securing Applications: Techniques and Best Practices



- Types of application security vulnerabilities
- Web Security Scanner
- Threat Identity and OAuth phishing
- Identity-Aware Proxy
- Secret Manager
- Lab: Identity Application Vulnerabilities with Security Command Center
- Lab: Securing Compute Engine Applications with BeyondCorp Enterprise
- Lab: Configuring and Using Credentials with Secret Manager
Module 8: Securing Google Kubernetes Engine: Techniques and Best Practices



- Types of application security vulnerabilities
- Web Security Scanner
- Threat: Identity and OAuth phishing
- Identity-Aware Proxy
- Secret Manager
Module 9: Protecting against Distributed Denial of Service Attacks (DDoS)



- How DDoS attacks work
- Google Cloud mitigations
- Types of complementary partner products
- Lab: Configuring Traffic Blocklisting with Google Cloud Armor
Module 10: Content-Related Vulnerabilities: Techniques and Best Practices



- Threat: Ransomware
- Ransomware mitigations
- Threats: data misuse, privacy violations, sensitive content
- Content-related mitigation
- Redacting Sensitive Data with the DLP API
- Lab: Redacting Sensitive Data with DLP API
Module 11: Monitoring, Logging, Auditing, and Scanning 



- Security Command Center
- Cloud Monitoring and Cloud Logging
- Cloud Audit Logs
- Cloud security automation
- Lab: Configuring and Using Cloud Monitoring and Cloud Logging
- Lab: Configuring and Viewing Cloud Audit Logs</outline_plain><duration unit="d" days="3">3 days</duration><pricelist><price country="US" currency="USD">1995.00</price><price country="IT" currency="EUR">1950.00</price><price country="DE" currency="EUR">1950.00</price><price country="CH" currency="CHF">2490.00</price><price country="SG" currency="USD">1995.00</price><price country="GB" currency="GBP">1980.00</price><price country="IL" currency="ILS">6770.00</price><price country="BE" currency="EUR">2095.00</price><price country="NL" currency="EUR">2095.00</price><price country="PL" currency="PLN">5200.00</price><price country="SI" currency="EUR">1950.00</price><price country="CA" currency="CAD">2755.00</price><price country="FR" currency="EUR">2450.00</price></pricelist><miles/></course>