> Formations > Security in Google Cloud Platform

Course : Security in Google Cloud Platform

Official course, preparation for Google Cloud certification exams

Practical course - 3d - 21h00 - Ref. GQD
Price : 2990 € E.T.

Security in Google Cloud Platform

Official course, preparation for Google Cloud certification exams



With this training course, you'll learn how to master security controls and techniques on the Google Cloud Platform. Through hands-on experience, you'll explore and deploy the components of a secure Google Cloud solution. You'll also discover techniques for mitigating attacks at many points of a Google Cloud infrastructure, including distributed denial of service attacks, phishing attacks and threats involving content classification and use.


INTER
IN-HOUSE
CUSTOM

Practical course in person or remote class
Available in English on request

Ref. GQD
  3d - 21h00
2990 € E.T.




With this training course, you'll learn how to master security controls and techniques on the Google Cloud Platform. Through hands-on experience, you'll explore and deploy the components of a secure Google Cloud solution. You'll also discover techniques for mitigating attacks at many points of a Google Cloud infrastructure, including distributed denial of service attacks, phishing attacks and threats involving content classification and use.


Teaching objectives
At the end of the training, the participant will be able to:
Understand Google Cloud's security approach and key principles
Manage administrative identities and access with Cloud Identity, Cloud IAM and Resource Manager
Implement network security controls (VPC firewall, Cloud Armor, IAP)
Securing application environments, especially Kubernetes
Detecting, analyzing and correcting vulnerabilities with DLP, Forseti and risk reduction best practices

Intended audience
Information security analysts, architects and engineers, information security or cybersecurity specialists, cloud infrastructure architects.

Prerequisites
Completion of "GCP Fundamentals: Core Infrastructure", "Networking in GCP" or equivalent experience. Good knowledge of fundamental concepts of information security, etc.

Certification
We recommend you take this course if you want to prepare for certification as a "Google Cloud Professional Cloud Security Engineer".
Comment passer votre examen ?

Practical details
Teaching methods
Training in French. Official course material in English.

Course schedule

1
Fundamentals of GCP security

  • Understand the GCP model of shared responsibility for security.
  • Understand Google Cloud's approach to security.
  • Understand the types of threats mitigated by Google and GCP.
  • Define and understand access transparency and access approval (beta).

2
Cloud Identity

  • Cloud Identity.
  • Synchronization with Microsoft Active Directory using Google Cloud Directory Sync.
  • Using the managed service for Microsoft Active Directory (beta).
  • Choose between Google authentication and SAML-based single sign-on.
  • Best practices, including DNS configuration and super administrator accounts.
Hands-on work
Define users with Cloud Identity Console.

3
Identity, access and key management

  • GCP resource manager: projects, files and organizations.
  • GCP IAM roles, including custom roles.
  • PCM IAM policies, including organization policies.
  • Labels GCP Now.
  • Now GCP recommends.
  • GCP IAM troubleshooting tool.
  • GCP IAM audit logs.
  • Best practices, including segregation of duties and least privilege, etc.
Hands-on work
Cloud IAM configuration, including custom roles and organization rules.

4
Configure a Google virtual private cloud for isolation and security

  • Configure VPC firewalls (entry and exit rules).
  • Load balancing and SSL policies.
  • Private access to the Google API.
  • Use of SSL proxy.
  • Best practices for VPC networks, including pairing and use of shared VPCs.
  • Best security practices for VPNs.
  • Safety considerations for interconnection and pairing options.
  • Safety products available from our partners.
  • Definition of a service perimeter, including perimeter bridges.
  • Configure private connectivity to Google APIs and services.
Hands-on work
VPC firewall configuration.

5
Securing Compute Engine: techniques and best practices

  • Compute Engine service accounts, default and customer-defined.
  • IAM roles for virtual machines.
  • API scope for virtual machines.
  • SSH key management for Linux virtual machines.
  • RDP connection management for Windows virtual machines.
  • Organization policy controls: approved images, public IP address, serial port disable.
  • Encrypt VM images with encryption keys managed by the customer and supplied by the customer.
  • Research and correction of public access to VMs.
  • Best practices, including the use of reinforced personalized images, personalized service accounts...
  • Encrypt VM disks with encryption keys supplied by the customer.
  • Use of shielded VMs to maintain VM integrity.
Hands-on work
Configure, use and audit VM accounts and service scopes. Perform disk encryption with customer-supplied encryption keys.

6
Securing cloud data: techniques and best practices

  • Cloud Storage and IAM authorizations.
  • Cloud Storage and ACLs.
  • Audit of cloud data, including research and correction of publicly accessible data.
  • URLs signed by Cloud Storage.
  • Signed policy documents.
  • Encrypt Cloud Storage objects with encryption keys managed and supplied by the customer.
  • Best practices, including deletion of archived versions of objects after key rotation.
  • Views authorized by BigQuery.
  • BigQuery IAM roles.
  • Best practices, including preferring IAM authorizations to ACLs.
Hands-on work
Use customer-provided encryption keys with Cloud Storage. Use customer-managed encryption keys with Cloud Storage and Cloud KMS. Create an authorized BigQuery view.

7
Application security: techniques and best practices

  • Types of application security vulnerabilities.
  • DoS protection in App Engine and Cloud Functions.
  • Cloud Security Scanner.
  • Identity Aware Proxy.
Hands-on work
Use Cloud Security Scanner to scan an App Engine application for vulnerabilities. Configure Identity Aware Proxy to protect a project.

8
Securing Kubernetes: techniques and best practices

  • Authorization.
  • Securing workloads.
  • Securing clusters.
  • Logging and monitoring.

9
Protect against Distributed Denial of Service (DDoS) attacks

  • How DDoS attacks work.
  • Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor.
  • Complementary partner products.
Hands-on work
Configure GCLB, CDN, blacklist traffic with Cloud Armor.

10
Protect against content-related vulnerabilities

  • Threat: ransomware.
  • Mitigation: backups, IAM, Data Loss Prevention API.
  • Threats: data misuse, privacy breaches, sensitive/restricted/unacceptable content.
  • Threat: identity phishing and Oauth.
  • Mitigation: content classification using Cloud ML APIs.
  • Scanning and editing data using the Data Loss Prevention API.
Hands-on work
Redaction of sensitive data with the Data Loss Prevention API.

11
Monitoring, logging, auditing and scanning

  • Security Command Center.
  • Stackdriver monitoring and logging.
  • VPC flow logs.
  • Cloud audit logging.
  • Deploying and using Forseti.
Hands-on work
Install Stackdriver agents. Configure and use Stackdriver monitoring and logging. View and use VPC flow logs in Stackdriver. Configure and view audit logs in Stackdriver, etc.


Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class

Dernières places
Date garantie en présentiel ou à distance
Session garantie

REMOTE CLASS
2026 : 2 June, 17 Nov.

PARIS LA DÉFENSE
2026 : 2 June, 17 Nov.