Cloud Security Risks: Identify and Protect Against Threats | Google Cloud Cybersecurity Certificate

Описание к видео Cloud Security Risks: Identify and Protect Against Threats | Google Cloud Cybersecurity Certificate

Hop on over Google Cloud Skills Boost to complete the hands-on labs - https://goo.gle/3Pf5QwL

[Course 3 of 5, Google Cloud Cybersecurity Certificate]Delve into the key aspects of identity management and access control in cloud computing, including security principles like least-privilege and separation-of-duties, and the crucial elements of AAA: authentication, authorization, and auditing. AAAnd…let’s go to it! ← See what we did there?!

To earn this Google Cloud Certificate with a digital credential you can share, hop on over Google Cloud Skills Boost to complete the hands-on labs (available on desktop/laptop only) and graded assessments. There is a monthly subscription cost of $29 USD/month to earn the certificate on Google Cloud Skills Boost. https://goo.gle/3Pf5QwL

Jump directly to the topics you want to learn:
00:00 Introduction to Course 3
05:14 Manny: A day in the life of a red team security engineer
07:36 Welcome to module 1
08:48 Core principles of identity management
12:50 Authentication, authorization and auditing (AAA)
17:31 Credential handling and service accounts
22:33 Access controls in the cloud
28:04 Perimeter protection
33:46 Common attack vectors
37:06 Zero trust
43:43 Wrap-up

45:17 Welcome to module 2
47:46 Introduction to threat management
52:30 Eyre: Secure cloud assets
54:53 Asset and resource management
1:00:28 Steps for asset management
1:07:11 Vulnerability remediation and posture management
1:11:24 Vulnerability remediation and posture management in software development
1:16:51 IT automation tools for posture management
1:22:39 Patching and rehydration
1:28:52 Compare and contrast: Patching and rehydration
1:33:30 Trends in vulnerability and threat management
1:40:16 Reports and assessments for threat and vulnerability management
1:45:19 Wrap-up

1:46:52 Welcome to module 3
1:47:57 Cloud-native design and architecture principles
1:52:27 Cloud-native architecture for security
1:55:49 Introduction to ephemerality and immutability
1:59:39 Automation in cloud security
2:02:54 Infrastructure as code, policy as code, and DevSecOps
2:07:09 Benefits of policy as code
2:09:57 Terraform for IaC management
2:14:01 Containers vs. virtual machines
2:17:11 Container benefits and considerations
2:21:10 Techniques to secure containers
2:25:25 Container drift
2:29:08 Container orchestration
2:33:30 Wrap-up

2:34:41 Welcome to module 4
2:35:44 Introduction to the three states of data
2:37:40 Data encryption at rest, in transit, and in use
2:40:58 Data classification and tagging
2:45:18 Data governance for security and data quality
2:49:36 Data sovereignty and data governance
2:53:59 Data discovery to support data governance
2:57:29 Data retention policies
3:01:48 Create a business continuity plan
3:06:33 Business continuity scenario
3:08:54 Wrap-up
3:09:56 Lauren: What makes candidates stand out
3:13:23 Patrick and Brenda: Interview role play
3:19:10 Course wrap-up

Subscribe HERE: https://goo.gle/3U1sefW

#cybersecurity, #cloudcomputing, #googlecloudcertificate, #googlecloudlearning

Комментарии

Информация по комментариям в разработке