<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="22865" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/google-sgcp-3d" lastchanged="2025-09-30T15:08:40+02:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>Security in Google Cloud</title><productcode>SGCP-3D</productcode><vendorcode>GO</vendorcode><vendorname>Google</vendorname><fullproductcode>GO-SGCP-3D</fullproductcode><version>3.0.5</version><objective>&lt;p&gt;This course teaches participants the following skills:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Understanding the Google approach to security&lt;/li&gt;&lt;li&gt;Managing administrative identities using Cloud Identity.&lt;/li&gt;&lt;li&gt;Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM.&lt;/li&gt;&lt;li&gt;Implementing IP traffic controls using VPC firewalls and Cloud Armor&lt;/li&gt;&lt;li&gt;Implementing Identity Aware Proxy&lt;/li&gt;&lt;li&gt;Analyzing changes to the configuration or metadata of resources with GCP audit logs&lt;/li&gt;&lt;li&gt;Scanning for and redact sensitive data with the Data Loss Prevention API&lt;/li&gt;&lt;li&gt;Scanning a GCP deployment with Forseti&lt;/li&gt;&lt;li&gt;Remediating important types of vulnerabilities, especially in public access to data and VMs&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;To get the most out of this course, participants should have:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Prior completion of &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/fr/course/google-gcf-ci&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Google Cloud Fundamentals: Core Infrastructure &lt;span class=&quot;fl-prod-pcode&quot;&gt;(GCF-CI)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt; or equivalent experience&lt;/li&gt;&lt;li&gt;Prior completion of &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/fr/course/google-ngcp&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Networking in Google Cloud Platform &lt;span class=&quot;fl-prod-pcode&quot;&gt;(NGCP)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt; or equivalent experience&lt;/li&gt;&lt;li&gt;Knowledge of foundational concepts in information security:
&lt;ul&gt;
&lt;li&gt;Fundamental concepts:
&lt;ul&gt;
&lt;li&gt;vulnerability, threat, attack surface&lt;/li&gt;&lt;li&gt;confidentiality, integrity, availability&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Common threat types and their mitigation strategies&lt;/li&gt;&lt;li&gt;Public-key cryptography
&lt;ul&gt;
&lt;li&gt;Public and private key pairs&lt;/li&gt;&lt;li&gt;Certificates&lt;/li&gt;&lt;li&gt;Cipher types&lt;/li&gt;&lt;li&gt;Key width&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Certificate authorities&lt;/li&gt;&lt;li&gt;Transport Layer Security/Secure Sockets Layer encrypted communication&lt;/li&gt;&lt;li&gt;Public key infrastructures&lt;/li&gt;&lt;li&gt;Security policy&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Basic proficiency with command-line tools and Linux operating system environments&lt;/li&gt;&lt;li&gt;Systems Operations experience, including deploying and managing applications, either on-premises or in a public cloud environment&lt;/li&gt;&lt;li&gt;Reading comprehension of code in Python or JavaScript&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;This class is intended for the following job roles:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Cloud information security analysts, architects, and engineers&lt;/li&gt;&lt;li&gt;Information security/cybersecurity specialists&lt;/li&gt;&lt;li&gt;Cloud infrastructure architects&lt;/li&gt;&lt;li&gt;Developers of cloud applications.&lt;/li&gt;&lt;/ul&gt;</audience><contents>&lt;p&gt;PART I: MANAGING SECURITY IN GOOGLE CLOUD&lt;/p&gt;
&lt;p&gt;Module 1 Foundations of GCP Security
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Understand the GCP shared security responsibility model&lt;/li&gt;&lt;li&gt;Understand Google Cloud&amp;rsquo;s approach to security&lt;/li&gt;&lt;li&gt;Understand the kinds of threats mitigated by Google and by GCP&lt;/li&gt;&lt;li&gt;Define and Understand Access Transparency and Access Approval (beta)&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Module 2 Cloud Identity
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Cloud Identity&lt;/li&gt;&lt;li&gt;Syncing with Microsoft Active Directory using Google Cloud Directory Sync&lt;/li&gt;&lt;li&gt;Using Managed Service for Microsoft Active Directory (beta )&lt;/li&gt;&lt;li&gt;Choosing between Google authentication and SAML-based SSO&lt;/li&gt;&lt;li&gt;Best practices, including DNS configuration, super admin accounts&lt;/li&gt;&lt;li&gt;Lab: Defining Users with Cloud Identity Console&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Module 3 Identity, Access, and Key Management
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;GCP Resource Manager: projects, folders, and organizations&lt;/li&gt;&lt;li&gt;GCP IAM roles, including custom roles&lt;/li&gt;&lt;li&gt;GCP IAM policies, including organization policies&lt;/li&gt;&lt;li&gt;GCP IAM Labels&lt;/li&gt;&lt;li&gt;GCP IAM Recommender&lt;/li&gt;&lt;li&gt;GCP IAM Troubleshooter&lt;/li&gt;&lt;li&gt;GCP IAM Audit Logs&lt;/li&gt;&lt;li&gt;Best practices, including separation of duties and least privilege, the use of Google groups in policies, and avoiding the use of primitive roles&lt;/li&gt;&lt;li&gt;Labs: Configuring Cloud IAM, including custom roles and organization policies&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Module 4 Configuring Google Virtual Private Cloud for Isolation and Security
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Configuring VPC firewalls (both ingress and egress rules)&lt;/li&gt;&lt;li&gt;Load balancing and SSL policies&lt;/li&gt;&lt;li&gt;Private Google API access&lt;/li&gt;&lt;li&gt;SSL proxy use&lt;/li&gt;&lt;li&gt;Best practices for VPC networks, including peering and shared VPC use, correct use of subnetworks&lt;/li&gt;&lt;li&gt;Best security practices for VPNs&lt;/li&gt;&lt;li&gt;Security considerations for interconnect and peering options&lt;/li&gt;&lt;li&gt;Available security products from partners&lt;/li&gt;&lt;li&gt;Defining a service perimeter, including perimeter bridges&lt;/li&gt;&lt;li&gt;Setting up private connectivity to Google APIs and services&lt;/li&gt;&lt;li&gt;Lab: Configuring VPC firewalls&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
PART II: SECURITY BEST PRACTICES ON GOOGLE CLOUD&lt;/p&gt;
&lt;p&gt;Module 5 Securing Compute Engine: techniques and best practices
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Compute Engine service accounts, default and customer-defined&lt;/li&gt;&lt;li&gt;IAM roles for VMs&lt;/li&gt;&lt;li&gt;API scopes for VMs&lt;/li&gt;&lt;li&gt;Managing SSH keys for Linux VMs&lt;/li&gt;&lt;li&gt;Managing RDP logins for Windows VMs&lt;/li&gt;&lt;li&gt;Organization policy controls: trusted images, public IP address, disabling serial port&lt;/li&gt;&lt;li&gt;Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys&lt;/li&gt;&lt;li&gt;Finding and remediating public access to VMs&lt;/li&gt;&lt;li&gt;Best practices, including using hardened custom images, custom service accounts (not the default service account), tailored API scopes, and the use of application default credentials instead of user-managed keys&lt;/li&gt;&lt;li&gt;Lab: Configuring, using, and auditing VM service accounts and scopes&lt;/li&gt;&lt;li&gt;Encrypting VM disks with customer-supplied encryption keys&lt;/li&gt;&lt;li&gt;Lab: Encrypting disks with customer-supplied encryption keys&lt;/li&gt;&lt;li&gt;Using Shielded VMs to maintain the integrity of virtual machines&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Module 6 Securing cloud data: techniques and best practices
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Cloud Storage and IAM permissions&lt;/li&gt;&lt;li&gt;Cloud Storage and ACLs&lt;/li&gt;&lt;li&gt;Auditing cloud data, including finding and remediating publicly accessible data&lt;/li&gt;&lt;li&gt;Signed Cloud Storage URLs&lt;/li&gt;&lt;li&gt;Signed policy documents&lt;/li&gt;&lt;li&gt;Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys&lt;/li&gt;&lt;li&gt;Best practices, including deleting archived versions of objects after key rotation&lt;/li&gt;&lt;li&gt;Lab: Using customer-supplied encryption keys with Cloud Storage&lt;/li&gt;&lt;li&gt;Lab: Using customer-managed encryption keys with Cloud Storage and Cloud KMS&lt;/li&gt;&lt;li&gt;BigQuery authorized views&lt;/li&gt;&lt;li&gt;BigQuery IAM roles&lt;/li&gt;&lt;li&gt;Best practices, including preferring IAM permissions over ACLs&lt;/li&gt;&lt;li&gt;Lab: Creating a BigQuery authorized view&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Module 7 Securing Applications: techniques and best practices
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Types of application security vulnerabilities&lt;/li&gt;&lt;li&gt;DoS protections in App Engine and Cloud Functions&lt;/li&gt;&lt;li&gt;Cloud Security Scanner&lt;/li&gt;&lt;li&gt;Lab: Using Cloud Security Scanner to find vulnerabilities in an App Engine application&lt;/li&gt;&lt;li&gt;Identity Aware Proxy&lt;/li&gt;&lt;li&gt;Lab: Configuring Identity Aware Proxy to protect a project&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Module 8 Securing Kubernetes: techniques and best practices
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Authorization&lt;/li&gt;&lt;li&gt;Securing Workloads&lt;/li&gt;&lt;li&gt;Securing Clusters&lt;/li&gt;&lt;li&gt;Logging and Monitoring&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;PART III: MITIGATING VULNERABILITIES IN GOOGLE CLOUD&lt;/p&gt;
&lt;p&gt;Module 9 Protecting against Distributed Denial of Service Attacks
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How DDoS attacks work&lt;/li&gt;&lt;li&gt;Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor (including its rules language)&lt;/li&gt;&lt;li&gt;Types of complementary partner products&lt;/li&gt;&lt;li&gt;Lab: Configuring GCLB, CDN, traffic blacklisting with Cloud Armor&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Module 10 Protecting against content-related vulnerabilities
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Threat: Ransomware&lt;/li&gt;&lt;li&gt;Mitigations: Backups, IAM, Data Loss Prevention API&lt;/li&gt;&lt;li&gt;Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content&lt;/li&gt;&lt;li&gt;Threat: Identity and Oauth phishing&lt;/li&gt;&lt;li&gt;Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API&lt;/li&gt;&lt;li&gt;Lab: Redacting Sensitive Data with Data Loss Prevention API&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Module 11 Monitoring, Logging, Auditing, and Scanning 
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Security Command Center&lt;/li&gt;&lt;li&gt;Stackdriver monitoring and logging&lt;/li&gt;&lt;li&gt;Lab: Installing Stackdriver agents&lt;/li&gt;&lt;li&gt;Lab: Configuring and using Stackdriver monitoring and logging&lt;/li&gt;&lt;li&gt;VPC flow logs&lt;/li&gt;&lt;li&gt;Lab: Viewing and using VPC flow logs in Stackdriver&lt;/li&gt;&lt;li&gt;Cloud audit logging&lt;/li&gt;&lt;li&gt;Lab: Configuring and viewing audit logs in Stackdriver&lt;/li&gt;&lt;li&gt;Deploying and Using Forseti&lt;/li&gt;&lt;li&gt;Lab: Inventorying a Deployment with Forseti Inventory (demo)&lt;/li&gt;&lt;li&gt;Lab: Scanning a Deployment with Forseti Scanner (demo)&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;p&gt;PART I: MANAGING SECURITY IN GOOGLE CLOUD&lt;/p&gt;
&lt;p&gt;Module 1 Foundations of GCP Security
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Understand the GCP shared security responsibility model&lt;/li&gt;&lt;li&gt;Understand Google Cloud&amp;rsquo;s approach to security&lt;/li&gt;&lt;li&gt;Understand the kinds of threats mitigated by Google and by GCP&lt;/li&gt;&lt;li&gt;Define and Understand Access Transparency and Access Approval (beta)&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Module 2 Cloud Identity
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Cloud Identity&lt;/li&gt;&lt;li&gt;Syncing with Microsoft Active Directory using Google Cloud Directory Sync&lt;/li&gt;&lt;li&gt;Using Managed Service for Microsoft Active Directory (beta )&lt;/li&gt;&lt;li&gt;Choosing between Google authentication and SAML-based SSO&lt;/li&gt;&lt;li&gt;Best practices, including DNS configuration, super admin accounts&lt;/li&gt;&lt;li&gt;Lab: Defining Users with Cloud Identity Console&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Module 3 Identity, Access, and Key Management
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;GCP Resource Manager: projects, folders, and organizations&lt;/li&gt;&lt;li&gt;GCP IAM roles, including custom roles&lt;/li&gt;&lt;li&gt;GCP IAM policies, including organization policies&lt;/li&gt;&lt;li&gt;GCP IAM Labels&lt;/li&gt;&lt;li&gt;GCP IAM Recommender&lt;/li&gt;&lt;li&gt;GCP IAM Troubleshooter&lt;/li&gt;&lt;li&gt;GCP IAM Audit Logs&lt;/li&gt;&lt;li&gt;Best practices, including separation of duties and least privilege, the use of Google groups in policies, and avoiding the use of primitive roles&lt;/li&gt;&lt;li&gt;Labs: Configuring Cloud IAM, including custom roles and organization policies&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Module 4 Configuring Google Virtual Private Cloud for Isolation and Security
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Configuring VPC firewalls (both ingress and egress rules)&lt;/li&gt;&lt;li&gt;Load balancing and SSL policies&lt;/li&gt;&lt;li&gt;Private Google API access&lt;/li&gt;&lt;li&gt;SSL proxy use&lt;/li&gt;&lt;li&gt;Best practices for VPC networks, including peering and shared VPC use, correct use of subnetworks&lt;/li&gt;&lt;li&gt;Best security practices for VPNs&lt;/li&gt;&lt;li&gt;Security considerations for interconnect and peering options&lt;/li&gt;&lt;li&gt;Available security products from partners&lt;/li&gt;&lt;li&gt;Defining a service perimeter, including perimeter bridges&lt;/li&gt;&lt;li&gt;Setting up private connectivity to Google APIs and services&lt;/li&gt;&lt;li&gt;Lab: Configuring VPC firewalls&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
PART II: SECURITY BEST PRACTICES ON GOOGLE CLOUD&lt;/p&gt;
&lt;p&gt;Module 5 Securing Compute Engine: techniques and best practices
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Compute Engine service accounts, default and customer-defined&lt;/li&gt;&lt;li&gt;IAM roles for VMs&lt;/li&gt;&lt;li&gt;API scopes for VMs&lt;/li&gt;&lt;li&gt;Managing SSH keys for Linux VMs&lt;/li&gt;&lt;li&gt;Managing RDP logins for Windows VMs&lt;/li&gt;&lt;li&gt;Organization policy controls: trusted images, public IP address, disabling serial port&lt;/li&gt;&lt;li&gt;Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys&lt;/li&gt;&lt;li&gt;Finding and remediating public access to VMs&lt;/li&gt;&lt;li&gt;Best practices, including using hardened custom images, custom service accounts (not the default service account), tailored API scopes, and the use of application default credentials instead of user-managed keys&lt;/li&gt;&lt;li&gt;Lab: Configuring, using, and auditing VM service accounts and scopes&lt;/li&gt;&lt;li&gt;Encrypting VM disks with customer-supplied encryption keys&lt;/li&gt;&lt;li&gt;Lab: Encrypting disks with customer-supplied encryption keys&lt;/li&gt;&lt;li&gt;Using Shielded VMs to maintain the integrity of virtual machines&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Module 6 Securing cloud data: techniques and best practices
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Cloud Storage and IAM permissions&lt;/li&gt;&lt;li&gt;Cloud Storage and ACLs&lt;/li&gt;&lt;li&gt;Auditing cloud data, including finding and remediating publicly accessible data&lt;/li&gt;&lt;li&gt;Signed Cloud Storage URLs&lt;/li&gt;&lt;li&gt;Signed policy documents&lt;/li&gt;&lt;li&gt;Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys&lt;/li&gt;&lt;li&gt;Best practices, including deleting archived versions of objects after key rotation&lt;/li&gt;&lt;li&gt;Lab: Using customer-supplied encryption keys with Cloud Storage&lt;/li&gt;&lt;li&gt;Lab: Using customer-managed encryption keys with Cloud Storage and Cloud KMS&lt;/li&gt;&lt;li&gt;BigQuery authorized views&lt;/li&gt;&lt;li&gt;BigQuery IAM roles&lt;/li&gt;&lt;li&gt;Best practices, including preferring IAM permissions over ACLs&lt;/li&gt;&lt;li&gt;Lab: Creating a BigQuery authorized view&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Module 7 Securing Applications: techniques and best practices
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Types of application security vulnerabilities&lt;/li&gt;&lt;li&gt;DoS protections in App Engine and Cloud Functions&lt;/li&gt;&lt;li&gt;Cloud Security Scanner&lt;/li&gt;&lt;li&gt;Lab: Using Cloud Security Scanner to find vulnerabilities in an App Engine application&lt;/li&gt;&lt;li&gt;Identity Aware Proxy&lt;/li&gt;&lt;li&gt;Lab: Configuring Identity Aware Proxy to protect a project&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Module 8 Securing Kubernetes: techniques and best practices
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Authorization&lt;/li&gt;&lt;li&gt;Securing Workloads&lt;/li&gt;&lt;li&gt;Securing Clusters&lt;/li&gt;&lt;li&gt;Logging and Monitoring&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;PART III: MITIGATING VULNERABILITIES IN GOOGLE CLOUD&lt;/p&gt;
&lt;p&gt;Module 9 Protecting against Distributed Denial of Service Attacks
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How DDoS attacks work&lt;/li&gt;&lt;li&gt;Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor (including its rules language)&lt;/li&gt;&lt;li&gt;Types of complementary partner products&lt;/li&gt;&lt;li&gt;Lab: Configuring GCLB, CDN, traffic blacklisting with Cloud Armor&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Module 10 Protecting against content-related vulnerabilities
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Threat: Ransomware&lt;/li&gt;&lt;li&gt;Mitigations: Backups, IAM, Data Loss Prevention API&lt;/li&gt;&lt;li&gt;Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content&lt;/li&gt;&lt;li&gt;Threat: Identity and Oauth phishing&lt;/li&gt;&lt;li&gt;Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API&lt;/li&gt;&lt;li&gt;Lab: Redacting Sensitive Data with Data Loss Prevention API&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Module 11 Monitoring, Logging, Auditing, and Scanning 
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Security Command Center&lt;/li&gt;&lt;li&gt;Stackdriver monitoring and logging&lt;/li&gt;&lt;li&gt;Lab: Installing Stackdriver agents&lt;/li&gt;&lt;li&gt;Lab: Configuring and using Stackdriver monitoring and logging&lt;/li&gt;&lt;li&gt;VPC flow logs&lt;/li&gt;&lt;li&gt;Lab: Viewing and using VPC flow logs in Stackdriver&lt;/li&gt;&lt;li&gt;Cloud audit logging&lt;/li&gt;&lt;li&gt;Lab: Configuring and viewing audit logs in Stackdriver&lt;/li&gt;&lt;li&gt;Deploying and Using Forseti&lt;/li&gt;&lt;li&gt;Lab: Inventorying a Deployment with Forseti Inventory (demo)&lt;/li&gt;&lt;li&gt;Lab: Scanning a Deployment with Forseti Scanner (demo)&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>This course teaches participants the following skills:



- Understanding the Google approach to security
- Managing administrative identities using Cloud Identity.
- Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM.
- Implementing IP traffic controls using VPC firewalls and Cloud Armor
- Implementing Identity Aware Proxy
- Analyzing changes to the configuration or metadata of resources with GCP audit logs
- Scanning for and redact sensitive data with the Data Loss Prevention API
- Scanning a GCP deployment with Forseti
- Remediating important types of vulnerabilities, especially in public access to data and VMs</objective_plain><essentials_plain>To get the most out of this course, participants should have:



- Prior completion of Google Cloud Fundamentals: Core Infrastructure (GCF-CI) or equivalent experience
- Prior completion of Networking in Google Cloud Platform (NGCP) or equivalent experience
- Knowledge of foundational concepts in information security:

- Fundamental concepts:

- vulnerability, threat, attack surface
- confidentiality, integrity, availability
- Common threat types and their mitigation strategies
- Public-key cryptography

- Public and private key pairs
- Certificates
- Cipher types
- Key width
- Certificate authorities
- Transport Layer Security/Secure Sockets Layer encrypted communication
- Public key infrastructures
- Security policy
- Basic proficiency with command-line tools and Linux operating system environments
- Systems Operations experience, including deploying and managing applications, either on-premises or in a public cloud environment
- Reading comprehension of code in Python or JavaScript</essentials_plain><audience_plain>This class is intended for the following job roles:



- Cloud information security analysts, architects, and engineers
- Information security/cybersecurity specialists
- Cloud infrastructure architects
- Developers of cloud applications.</audience_plain><contents_plain>PART I: MANAGING SECURITY IN GOOGLE CLOUD

Module 1 Foundations of GCP Security



- Understand the GCP shared security responsibility model
- Understand Google Cloud’s approach to security
- Understand the kinds of threats mitigated by Google and by GCP
- Define and Understand Access Transparency and Access Approval (beta)
Module 2 Cloud Identity



- Cloud Identity
- Syncing with Microsoft Active Directory using Google Cloud Directory Sync
- Using Managed Service for Microsoft Active Directory (beta )
- Choosing between Google authentication and SAML-based SSO
- Best practices, including DNS configuration, super admin accounts
- Lab: Defining Users with Cloud Identity Console
Module 3 Identity, Access, and Key Management



- GCP Resource Manager: projects, folders, and organizations
- GCP IAM roles, including custom roles
- GCP IAM policies, including organization policies
- GCP IAM Labels
- GCP IAM Recommender
- GCP IAM Troubleshooter
- GCP IAM Audit Logs
- Best practices, including separation of duties and least privilege, the use of Google groups in policies, and avoiding the use of primitive roles
- Labs: Configuring Cloud IAM, including custom roles and organization policies
Module 4 Configuring Google Virtual Private Cloud for Isolation and Security



- Configuring VPC firewalls (both ingress and egress rules)
- Load balancing and SSL policies
- Private Google API access
- SSL proxy use
- Best practices for VPC networks, including peering and shared VPC use, correct use of subnetworks
- Best security practices for VPNs
- Security considerations for interconnect and peering options
- Available security products from partners
- Defining a service perimeter, including perimeter bridges
- Setting up private connectivity to Google APIs and services
- Lab: Configuring VPC firewalls

PART II: SECURITY BEST PRACTICES ON GOOGLE CLOUD

Module 5 Securing Compute Engine: techniques and best practices



- Compute Engine service accounts, default and customer-defined
- IAM roles for VMs
- API scopes for VMs
- Managing SSH keys for Linux VMs
- Managing RDP logins for Windows VMs
- Organization policy controls: trusted images, public IP address, disabling serial port
- Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys
- Finding and remediating public access to VMs
- Best practices, including using hardened custom images, custom service accounts (not the default service account), tailored API scopes, and the use of application default credentials instead of user-managed keys
- Lab: Configuring, using, and auditing VM service accounts and scopes
- Encrypting VM disks with customer-supplied encryption keys
- Lab: Encrypting disks with customer-supplied encryption keys
- Using Shielded VMs to maintain the integrity of virtual machines
Module 6 Securing cloud data: techniques and best practices



- Cloud Storage and IAM permissions
- Cloud Storage and ACLs
- Auditing cloud data, including finding and remediating publicly accessible data
- Signed Cloud Storage URLs
- Signed policy documents
- Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys
- Best practices, including deleting archived versions of objects after key rotation
- Lab: Using customer-supplied encryption keys with Cloud Storage
- Lab: Using customer-managed encryption keys with Cloud Storage and Cloud KMS
- BigQuery authorized views
- BigQuery IAM roles
- Best practices, including preferring IAM permissions over ACLs
- Lab: Creating a BigQuery authorized view
Module 7 Securing Applications: techniques and best practices



- Types of application security vulnerabilities
- DoS protections in App Engine and Cloud Functions
- Cloud Security Scanner
- Lab: Using Cloud Security Scanner to find vulnerabilities in an App Engine application
- Identity Aware Proxy
- Lab: Configuring Identity Aware Proxy to protect a project
Module 8 Securing Kubernetes: techniques and best practices



- Authorization
- Securing Workloads
- Securing Clusters
- Logging and Monitoring
PART III: MITIGATING VULNERABILITIES IN GOOGLE CLOUD

Module 9 Protecting against Distributed Denial of Service Attacks



- How DDoS attacks work
- Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor (including its rules language)
- Types of complementary partner products
- Lab: Configuring GCLB, CDN, traffic blacklisting with Cloud Armor
Module 10 Protecting against content-related vulnerabilities



- Threat: Ransomware
- Mitigations: Backups, IAM, Data Loss Prevention API
- Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content
- Threat: Identity and Oauth phishing
- Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API
- Lab: Redacting Sensitive Data with Data Loss Prevention API
Module 11 Monitoring, Logging, Auditing, and Scanning 



- Security Command Center
- Stackdriver monitoring and logging
- Lab: Installing Stackdriver agents
- Lab: Configuring and using Stackdriver monitoring and logging
- VPC flow logs
- Lab: Viewing and using VPC flow logs in Stackdriver
- Cloud audit logging
- Lab: Configuring and viewing audit logs in Stackdriver
- Deploying and Using Forseti
- Lab: Inventorying a Deployment with Forseti Inventory (demo)
- Lab: Scanning a Deployment with Forseti Scanner (demo)</contents_plain><outline_plain>PART I: MANAGING SECURITY IN GOOGLE CLOUD

Module 1 Foundations of GCP Security



- Understand the GCP shared security responsibility model
- Understand Google Cloud’s approach to security
- Understand the kinds of threats mitigated by Google and by GCP
- Define and Understand Access Transparency and Access Approval (beta)
Module 2 Cloud Identity



- Cloud Identity
- Syncing with Microsoft Active Directory using Google Cloud Directory Sync
- Using Managed Service for Microsoft Active Directory (beta )
- Choosing between Google authentication and SAML-based SSO
- Best practices, including DNS configuration, super admin accounts
- Lab: Defining Users with Cloud Identity Console
Module 3 Identity, Access, and Key Management



- GCP Resource Manager: projects, folders, and organizations
- GCP IAM roles, including custom roles
- GCP IAM policies, including organization policies
- GCP IAM Labels
- GCP IAM Recommender
- GCP IAM Troubleshooter
- GCP IAM Audit Logs
- Best practices, including separation of duties and least privilege, the use of Google groups in policies, and avoiding the use of primitive roles
- Labs: Configuring Cloud IAM, including custom roles and organization policies
Module 4 Configuring Google Virtual Private Cloud for Isolation and Security



- Configuring VPC firewalls (both ingress and egress rules)
- Load balancing and SSL policies
- Private Google API access
- SSL proxy use
- Best practices for VPC networks, including peering and shared VPC use, correct use of subnetworks
- Best security practices for VPNs
- Security considerations for interconnect and peering options
- Available security products from partners
- Defining a service perimeter, including perimeter bridges
- Setting up private connectivity to Google APIs and services
- Lab: Configuring VPC firewalls

PART II: SECURITY BEST PRACTICES ON GOOGLE CLOUD

Module 5 Securing Compute Engine: techniques and best practices



- Compute Engine service accounts, default and customer-defined
- IAM roles for VMs
- API scopes for VMs
- Managing SSH keys for Linux VMs
- Managing RDP logins for Windows VMs
- Organization policy controls: trusted images, public IP address, disabling serial port
- Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys
- Finding and remediating public access to VMs
- Best practices, including using hardened custom images, custom service accounts (not the default service account), tailored API scopes, and the use of application default credentials instead of user-managed keys
- Lab: Configuring, using, and auditing VM service accounts and scopes
- Encrypting VM disks with customer-supplied encryption keys
- Lab: Encrypting disks with customer-supplied encryption keys
- Using Shielded VMs to maintain the integrity of virtual machines
Module 6 Securing cloud data: techniques and best practices



- Cloud Storage and IAM permissions
- Cloud Storage and ACLs
- Auditing cloud data, including finding and remediating publicly accessible data
- Signed Cloud Storage URLs
- Signed policy documents
- Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys
- Best practices, including deleting archived versions of objects after key rotation
- Lab: Using customer-supplied encryption keys with Cloud Storage
- Lab: Using customer-managed encryption keys with Cloud Storage and Cloud KMS
- BigQuery authorized views
- BigQuery IAM roles
- Best practices, including preferring IAM permissions over ACLs
- Lab: Creating a BigQuery authorized view
Module 7 Securing Applications: techniques and best practices



- Types of application security vulnerabilities
- DoS protections in App Engine and Cloud Functions
- Cloud Security Scanner
- Lab: Using Cloud Security Scanner to find vulnerabilities in an App Engine application
- Identity Aware Proxy
- Lab: Configuring Identity Aware Proxy to protect a project
Module 8 Securing Kubernetes: techniques and best practices



- Authorization
- Securing Workloads
- Securing Clusters
- Logging and Monitoring
PART III: MITIGATING VULNERABILITIES IN GOOGLE CLOUD

Module 9 Protecting against Distributed Denial of Service Attacks



- How DDoS attacks work
- Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor (including its rules language)
- Types of complementary partner products
- Lab: Configuring GCLB, CDN, traffic blacklisting with Cloud Armor
Module 10 Protecting against content-related vulnerabilities



- Threat: Ransomware
- Mitigations: Backups, IAM, Data Loss Prevention API
- Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content
- Threat: Identity and Oauth phishing
- Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API
- Lab: Redacting Sensitive Data with Data Loss Prevention API
Module 11 Monitoring, Logging, Auditing, and Scanning 



- Security Command Center
- Stackdriver monitoring and logging
- Lab: Installing Stackdriver agents
- Lab: Configuring and using Stackdriver monitoring and logging
- VPC flow logs
- Lab: Viewing and using VPC flow logs in Stackdriver
- Cloud audit logging
- Lab: Configuring and viewing audit logs in Stackdriver
- Deploying and Using Forseti
- Lab: Inventorying a Deployment with Forseti Inventory (demo)
- Lab: Scanning a Deployment with Forseti Scanner (demo)</outline_plain><duration unit="d" days="3">3 jours</duration><pricelist><price country="US" currency="USD">1995.00</price><price country="IT" currency="EUR">1950.00</price><price country="DE" currency="EUR">1950.00</price><price country="CH" currency="CHF">2490.00</price><price country="SG" currency="USD">1995.00</price><price country="GB" currency="GBP">1980.00</price><price country="IL" currency="ILS">6770.00</price><price country="BE" currency="EUR">2095.00</price><price country="NL" currency="EUR">2095.00</price><price country="PL" currency="PLN">5200.00</price><price country="SI" currency="EUR">1950.00</price><price country="CA" currency="CAD">2755.00</price><price country="FR" currency="EUR">2450.00</price></pricelist><miles/></course>