Tommy Oktoriyan Ketaren
회원 가입일: 2024
골드 리그
31725포인트
회원 가입일: 2024
This is the fifth of five courses in the Google Cloud Cybersecurity Certificate. In this course, you’ll combine and apply key concepts such as cloud security principles, risk management, identifying vulnerabilities, incident management, and crisis communications in an interactive capstone project. Additionally, you'll finalize your resume updates and put to practice all the new interview techniques you've learned, preparing you to confidently apply for and interview for jobs in the field.
This is the fourth of five courses in the Google Cloud Cybersecurity Certificate. In this course, you’ll focus on developing capabilities in logging, security, and alert monitoring, along with techniques for mitigating attacks. You'll gain valuable knowledge in customizing threat feeds, managing incidents, handling crisis communications, conducting root cause analysis, and mastering incident response and post-event communications. Using Google Cloud tools, you'll learn to identify indicators of compromise and prepare for business continuity and disaster recovery. Alongside these technical skills, you'll continue updating your resume and practicing interview techniques.
This is the third of five courses in the Google Cloud Cybersecurity Certificate. In this course, you’ll explore the principles of identity management and access control within a cloud environment, covering key elements like AAA (Authentication, Authorization, and Auditing), credential handling, and certificate management. You'll also explore essential topics in threat and vulnerability management, cloud-native principles, and data protection measures. Upon completing this course, you will have acquired the skills and knowledge necessary to secure cloud-based resources and safeguard sensitive organizational information. Additionally, you'll continue to engage with career resources and hone your interview techniques, preparing you for the next step in your professional journey.
Planning for a Google Workspace Deployment is the final course in the Google Workspace Administration series. In this course, you will be introduced to Google's deployment methodology and best practices. You will follow Katelyn and Marcus as they plan for a Google Workspace deployment at Cymbal. They'll focus on the core technical project areas of provisioning, mail flow, data migration, and coexistence, and will consider the best deployment strategy for each area. You will also be introduced to the importance of Change Management in a Google Workspace deployment, ensuring that users make a smooth transition to Google Workspace and gain the benefits of work transformation through communications, support, and training. This course covers theoretical topics, and does not have any hands on exercises. If you haven’t already done so, please cancel your Google Workspace trial now to avoid any unwanted charges.
This course equips learners with skills to govern data within their Google Workspace environment. Learners will explore data loss prevention rules in Gmail and Drive to prevent data leakage. They will then learn how to use Google Vault for data retention, preservation, and retrieval purposes. Next, they will learn how to configure data regions and export settings to align with regulations. Finally, learners will discover how to classify data using labels for enhanced organization and security.
This course empowers learners to secure their Google Workspace environment. Learners will implement strong password policies and two-step verification to govern user access. They will then utilize the security investigation tool to proactively identify and respond to security risks. Next, they will manage third-party app access and mobile devices to ensure security. Finally, learners will enforce email security and compliance measures to protect organizational data.
This course was designed to give learners a comprehensive understanding of Google Workspace core services. Learners will explore enabling, disabling, and configuring settings for these services, including Gmail, Calendar, Drive, Meet, Chat, and Docs. Next, they'll learn how to deploy and manage Gemini to empower their users. Finally, learners will examine use cases for AppSheet and Apps Script to automate tasks and extend the functionality of Google Workspace applications.
This course was designed to provide an understanding of user and resource management in Google Workspace. Learners will explore the configuration of organizational units to align with their organization's needs. Additionally, learners will discover how to manage various types of Google Groups. They will also develop expertise in managing domain settings within Google Workspace. Finally, learners will master the optimization and structuring of resources within their Google Workspace environment.
This is the second of five courses in the Google Cloud Cybersecurity Certificate. In this course, you’ll explore widely-used cloud risk management frameworks, exploring security domains, compliance lifecycles, and industry standards such as HIPAA, NIST CSF, and SOC. You'll develop skills in risk identification, implementation of security controls, compliance evaluation, and data protection management. Additionally, you'll gain hands-on experience with Google Cloud and multi-cloud tools specific to risk and compliance. This course also incorporates job application and interview preparation techniques, offering a comprehensive foundation to understand and effectively navigate the complex landscape of cloud risk management.
This is the first of five courses in the Google Cloud Cybersecurity Certificate. In this course, you’ll explore the essentials of cybersecurity, including the security lifecycle, digital transformation, and key cloud computing concepts. You’ll identify common tools used by entry-level cloud security analysts to automate tasks.
Take the next steps in working with the Chronicle Security Operations Platform. Build on fundamental knowledge to go deeper on cusotmization and tuning.
This course covers the basline skills needed for the Chronicle Security Operations Platform. The modules will cover specific actions and features that security engineers should become familiar with to start using the toolset.
Learn about the fundamental features of Security Command Center on Google Cloud. Spend time in this course to understand assets, detection and compliance. Security Command Center is a key part of your Google Cloud security journey, complete these modules and quiz to earn a completion badge.
In this course, you learn how to do the kind of data exploration and analysis in Looker that would formerly be done primarily by SQL developers or analysts. Upon completion of this course, you will be able to leverage Looker's modern analytics platform to find and explore relevant content in your organization’s Looker instance, ask questions of your data, create new metrics as needed, and build and share visualizations and dashboards to facilitate data-driven decision making.
초급 과정에서는 Google Cloud에서 데이터 분석 워크플로와 데이터를 탐색, 분석, 시각화하여 이해관계자와 결과물을 공유하는 데 활용할 수 있는 도구에 대해 학습합니다. 이 과정에서는 우수사례를 실무형 실습, 강의, 퀴즈/데모와 함께 활용해 원시 데이터 세트에서 데이터를 정리하여 효과적인 시각화 및 대시보드를 만드는 방법을 설명합니다. 이미 데이터를 활용하고 있고 Google Cloud를 효과적으로 활용하는 방법을 알고 싶거나 경력을 발전시키고 싶은 학습자라면 이 과정으로 학습을 시작해 보세요. 업무에서 데이터 분석을 수행하거나 활용하는 거의 모든 학습자에게 도움이 될 수 있습니다.