Learn to protect Google Cloud infrastructure from DDoS attacks, content-related threats, and implement robust monitoring and logging solutions.
Learn to protect Google Cloud infrastructure from DDoS attacks, content-related threats, and implement robust monitoring and logging solutions.
This self-paced training course teaches participants how to mitigate attacks at various points in a Google Cloud-based infrastructure. The course covers protection against distributed denial-of-service (DDoS) attacks, phishing attacks, and content-related threats. Participants will learn about the Security Command Center, Cloud Logging, audit logging, and how to use Forseti to assess overall compliance with their organization's security policies. Through hands-on labs and theoretical lessons, students will gain practical experience in configuring Google Cloud Armor for traffic blocking, using the DLP API to mask sensitive data, and setting up Cloud Logging and Cloud Monitoring. The course also covers ransomware threats, data misuse, privacy violations, and strategies to protect applications and systems from these vulnerabilities.
Instructors:
Portuguese
Português (Brasil)
What you'll learn
Manage protection against distributed denial-of-service (DDoS) attacks
Handle content-related vulnerabilities
Implement Google Cloud's monitoring, logging, auditing, and verification solutions
Use Google Cloud Armor for traffic blocking
Apply DLP API to mask sensitive data
Set up and use Cloud Logging and Cloud Monitoring
Skills you'll gain
This course includes:
55 Minutes PreRecorded video
3 assignments
Access on Mobile, Tablet, Desktop
FullTime access
Shareable certificate
Closed caption
Get a Completion Certificate
Share your certificate with prospective employers and your professional network on LinkedIn.
Created by
Provided by

Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.





There are 5 modules in this course
This course provides a comprehensive overview of security vulnerability mitigation techniques for Google Cloud infrastructure. Participants will learn how to manage protection against distributed denial-of-service (DDoS) attacks, handle content-related vulnerabilities, and implement Google Cloud's monitoring, logging, auditing, and verification solutions. The course is divided into modules covering DDoS protection, content-related threats and best practices, and monitoring and logging tools. Students will gain hands-on experience with Google Cloud Armor for traffic blocking, the DLP API for masking sensitive data, and setting up Cloud Logging and Cloud Monitoring. The course also introduces the Security Command Center and Forseti Security for automated monitoring of Google Cloud resources. By the end of this 7-hour course, learners will have a solid understanding of how to enhance the security posture of their Google Cloud environments.
Bem-vindo ao curso Mitigating Security Vulnerabilities on Google Cloud
Module 1 · 10 Minutes to complete
Como se proteger contra ataques distribuídos de negação de serviço (DDoS)
Module 2 · 60 Minutes to complete
Vulnerabilidades relacionadas a conteúdo: técnicas e práticas recomendadas
Module 3 · 60 Minutes to complete
Monitoramento, geração de registros, auditoria e verificação
Module 4 · 180 Minutes to complete
Recursos do curso
Module 5 · 10 Minutes to complete
Fee Structure
Payment options
Financial Aid
Instructor
Empowering Businesses with Expert Training from Google Cloud
The Google Cloud Training team is tasked with developing, delivering, and evaluating training programs that enable our enterprise customers and partners to effectively utilize our products and solutions. Google Cloud empowers millions of organizations to enhance employee capabilities, improve customer service, and innovate for the future using cutting-edge technology built specifically for the cloud. Our products are designed with a focus on security, reliability, and scalability, covering everything from infrastructure to applications, devices, and hardware. Our dedicated teams are committed to helping customers successfully leverage our technologies to drive their success.
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.