This is the fourth course of a four-course series for cloud architects and engineers with existing Azure knowledge. It compares Google Cloud and Azure solutions and guides professionals on their use. This course focuses on deploying and monitoring applications in Google Cloud. The learners apply the knowledge of monitoring and application deployment process in Azure to explore the differences with Google Cloud. Learners get hands-on practice building and managing Google Cloud resources.
This is the third course of a four-course series for cloud architects and engineers with existing Azure knowledge. It compares Google Cloud and Azure solutions and guides professionals on their use. This course focuses on storage options and containers in Google Cloud. The learners apply the knowledge of storage and containers in Azure to explore how they differ from Google Cloud. Learners get hands-on practice building and managing Google Cloud resources.
Identify critical assets and their compliance requirements.
This training course introduces Cloud NGFW. Topics include how Cloud NGFW provides centralized firewall management, centralized firewall visibility, advanced threat protection, and firewall insights.
This is the second course of a four-course series for cloud architects and engineers with existing Azure knowledge. It aims to compare Google Cloud and Azure solutions and guide professionals on their use. This course focuses on compute resources and load balancing in Google Cloud. The learner will apply the knowledge of using virtual machines and load balancers in Azure to explore the similarities and differences with configuring and managing compute resources and load balancers in Google Cloud. Learners will get hands-on practice building and managing Google Cloud resources.
This is the first course of a four-course series for cloud architects and engineers with existing AWS knowledge, and it compares Google Cloud and AWS solutions and guides professionals on their use. This course focuses on Identity and Access Management (IAM) and networking in Google Cloud. The learners apply the knowledge of access management and networking in AWS to explore the similarities and differences with access management and networking in Google Cloud. Learners get hands-on practice building and managing Google Cloud resources.
Complete the intermediate Mitigate Threats and Vulnerabilities with Security Command Center skill badge to demonstrate skills in the following: preventing and managing environment threats, identifying and mitigating application vulnerabilities, and responding to security anomalies.
Learn to secure your deployments on Google Cloud, including: how to use Cloud Armor bot management to mitigate bot risk and control access from automated clients; use Cloud Armor denylists to restrict or allow access to your HTTP(S) load balancer at the edge of the Google Cloud; apply Cloud Armor security policies to restrict access to cache objects on Cloud CDN and Google Cloud Storage; and mitigate common vulnerabilities using Cloud Armor WAF rules.
Welcome to the sixth course in our Networking and Google Cloud series, Hybrid and Multicloud. The first module will walk you through various cloud connectivity options, with a deep dive into Cloud Interconnect, exploring its different types and functionalities. In the second module, we'll cover Cloud VPN, discussing its implementation, high availability, VPN topologies, and the Network Connectivity Center for streamline management. By the end of this course, you will be able to explain the different connectivity options available to extend your on-premises and other cloud networks to Google Cloud, and analyze the suitability of different Google Cloud hybrid and multicloud connectivity services for specific use cases.
In this course, you will learn the basic skills to implement secure and efficient DevSecOps practices on Google Cloud. You'll learn how to secure your development pipeline with Google Cloud services like Artifact Registry, Cloud Build, Cloud Deploy, and Binary Authorization. This enables you to build, test, and deploy containerized applications with security controls throughout the CI/CD pipeline.
Get Anthos Ready. This Google Kubernetes Engine-centric quest of best practice hands-on labs focuses on security at scale when deploying and managing production GKE environments -- specifically role-based access control, hardening, VPC networking, and binary authorization.
Mit dem Skill-Logo zum Kurs Grundlegende Sicherheitsfunktionen in Google Cloud implementieren weisen Sie fortgeschrittene Kenntnisse in folgenden Bereichen nach: Erstellen und Zuweisen von Rollen mit Identity and Access Management (IAM); Erstellen und Verwalten von Dienstkonten; Herstellen einer privaten Verbindung zwischen Virtual Private Cloud-Netzwerken (VPC); Beschränken des Anwendungszugriffs mithilfe von Identity-Aware Proxy; Verwalten von Schlüsseln und verschlüsselten Daten mit Cloud Key Management Service (KMS); und Erstellen eines privaten Kubernetes-Clusters. Ein Skill-Logo ist ein exklusives digitales Abzeichen, das von Google Cloud ausgestellt wird und Ihre Kenntnisse über unsere Produkte und Dienste belegt. In diesem Zusammenhang wird auch Ihre Fähigkeit bewertet, Ihr Wissen in einer interaktiven praxisnahen Umgebung anzuwenden. Absolvieren Sie eine kursspezifische Aufgabenreihe und die Challenge-Lab-Prüfung, um ein digitales Abzeichen zu erhalten, das Sie in Ihrem Netz…
Sichern Sie sich ein Skill-Logo, indem Sie den Kurs Geschütztes Google Cloud-Netzwerk erstellen abschließen. Dabei lernen Sie verschiedene netzwerkbezogene Ressourcen kennen, mit denen Sie Ihre Anwendungen in Google Cloud erstellen, skalieren und schützen können. Ein Skill-Logo ist ein exklusives digitales Abzeichen, das von Google Cloud ausgestellt wird und Ihre Kenntnisse über unsere Produkte und Dienste belegt. In diesem Zusammenhang wird auch die Fähigkeit bewertet, Ihr Wissen in einer interaktiven praxisnahen Umgebung anzuwenden. Absolvieren Sie eine kursspezifische Aufgabenreihe und die Challenge-Lab-Prüfung, um ein digitales Abzeichen zu erhalten, das Sie in Ihrem Netzwerk posten können.
This course teaches participants techniques for monitoring and improving infrastructure and application performance in Google Cloud. Using a combination of presentations, demos, hands-on labs, and real-world case studies, attendees gain experience with full-stack monitoring, real-time log management and analysis, debugging code in production, tracing application performance bottlenecks, and profiling CPU and memory usage.
In this self-paced training course, participants learn mitigations for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. They also learn about the Security Command Center, cloud logging and audit logging, and using Forseti to view overall compliance with your organization's security policies.
This training course builds on the concepts covered in the Networking in Google Cloud: Fundamentals course. Through presentations, demonstrations, and labs, participants explore and implement Cloud Load Balancing.
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Identity, Resource Manager, IAM, Virtual Private Cloud firewalls, Cloud Load Balancing, Cloud Peering, Cloud Interconnect, and VPC Service Controls. This is the first course of the Security in Google Cloud series. After completing this course, enroll in the Security Best Practices in Google Cloud course.
Welcome to the fourth course of the "Networking in Google Cloud" series: Network Security! In this course, you'll dive into the services for safeguarding your Google Cloud network infrastructure. The first module, Distributed Denial of Service (DDoS) Protection, covers how to fortify your network against Distributed Denial of Service (DDoS) attacks, ensuring uninterrupted availability of your services. In the second module, Controlling Access to VPC Networks, you'll learn the network access control, enabling you to define permissions for who can access your resources and how. Finally, in the third module, Advanced Security Monitoring and Analysis, we'll explore how to proactively detect and respond to potential threats, keeping your Google Cloud environment secure and resilient. By the end of this course, you'll have a comprehensive understanding of Google Cloud network security.
Welcome to the second course in the networking and Google Cloud series routing and addressing. In this course, we'll cover the central routing and addressing concepts that are relevant to Google Cloud's networking capabilities. Module one will lay the foundation by exploring network routing and addressing in Google Cloud, covering key building blocks such as routing IPv4, bringing your own IP addresses and setting up cloud DNS. In Module two will shift our focus to private connection options, exploring use cases and methods for accessing Google and other services privately using internal IP addresses. By the end of this course, you'll have a solid grasp of how to effectively route and address your network traffic within Google Cloud.
Welcome to the second part of the two part course, Observability in Google Cloud. This course is all about application performance management tools, including Error Reporting, Cloud Trace, and Cloud Profiler.
Networking in Google cloud is a 6 part course series. Welcome to the first course of our six part course series, Networking in Google Cloud: Fundamentals. This course provides a comprehensive overview of core networking concepts, including networking fundamentals, virtual private clouds (VPCs), and the sharing of VPC networks. Additionally, the course covers network logging and monitoring techniques.
Welcome to the third course of the "Networking in Google Cloud" series: Network Architecture! In this course, you will explore the fundamentals of designing efficient and scalable network architectures within Google Cloud. In the first module, Introduction to Network Architecture, we'll start by introducing you to the core components and concepts of network architecture, including subnets, routes, firewalls, and load balancing. Then in the second module, network topologies, we'll dive into various network topologies commonly used in Google Cloud, discussing their strengths, and weaknesses.
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.
In „Google Cloud-Grundlagen: Kerninfrastruktur“ werden wichtige Konzepte und die Terminologie für die Arbeit mit Google Cloud vorgestellt. In Videos und praxisorientierten Labs werden viele Computing- und Speicherdienste von Google Cloud sowie wichtige Tools für die Ressourcen- und Richtlinienverwaltung präsentiert und miteinander verglichen.
This is the first course of a four-course series for cloud architects and engineers with existing Azure knowledge, and it compares Google Cloud and Azure solutions and guides professionals on their use. This course focuses on Identity and Access Management (IAM) and networking in Google Cloud. The learners apply the knowledge of access management and networking in Azure to explore the similarities and differences with access management and networking in Google Cloud. Learners get hands-on practice building and managing Google Cloud resources.
This is the fifth of five courses in the Google Cloud Cybersecurity Certificate. In this course, you’ll combine and apply key concepts such as cloud security principles, risk management, identifying vulnerabilities, incident management, and crisis communications in an interactive capstone project. Additionally, you'll finalize your resume updates and put to practice all the new interview techniques you've learned, preparing you to confidently apply for and interview for jobs in the field.
This is the fourth of five courses in the Google Cloud Cybersecurity Certificate. In this course, you’ll focus on developing capabilities in logging, security, and alert monitoring, along with techniques for mitigating attacks. You'll gain valuable knowledge in customizing threat feeds, managing incidents, handling crisis communications, conducting root cause analysis, and mastering incident response and post-event communications. Using Google Cloud tools, you'll learn to identify indicators of compromise and prepare for business continuity and disaster recovery. Alongside these technical skills, you'll continue updating your resume and practicing interview techniques.
This is the third of five courses in the Google Cloud Cybersecurity Certificate. In this course, you’ll explore the principles of identity management and access control within a cloud environment, covering key elements like AAA (Authentication, Authorization, and Auditing), credential handling, and certificate management. You'll also explore essential topics in threat and vulnerability management, cloud-native principles, and data protection measures. Upon completing this course, you will have acquired the skills and knowledge necessary to secure cloud-based resources and safeguard sensitive organizational information. Additionally, you'll continue to engage with career resources and hone your interview techniques, preparing you for the next step in your professional journey.
This is the second of five courses in the Google Cloud Cybersecurity Certificate. In this course, you’ll explore widely-used cloud risk management frameworks, exploring security domains, compliance lifecycles, and industry standards such as HIPAA, NIST CSF, and SOC. You'll develop skills in risk identification, implementation of security controls, compliance evaluation, and data protection management. Additionally, you'll gain hands-on experience with Google Cloud and multi-cloud tools specific to risk and compliance. This course also incorporates job application and interview preparation techniques, offering a comprehensive foundation to understand and effectively navigate the complex landscape of cloud risk management.
This is the first of five courses in the Google Cloud Cybersecurity Certificate. In this course, you’ll explore the essentials of cybersecurity, including the security lifecycle, digital transformation, and key cloud computing concepts. You’ll identify common tools used by entry-level cloud security analysts to automate tasks.
This course helps learners prepare for the Professional Cloud Security Engineer (PCSE) Certification exam. Learners will be exposed to and engage with exam topics through a series of lectures, diagnostic questions, and knowledge checks. After completing this course, learners will have a personalized workbook that will guide them through the rest of their certification readiness journey.
Take the next steps in working with the Chronicle Security Operations Platform. Build on fundamental knowledge to go deeper on cusotmization and tuning.
This course covers the basline skills needed for the Chronicle Security Operations Platform. The modules will cover specific actions and features that security engineers should become familiar with to start using the toolset.
Da die Nutzung von künstlicher Intelligenz und Machine Learning in Unternehmen weiter zunimmt, wird auch deren verantwortungsbewusste Entwicklung ein immer wichtigeres Thema. Dabei ist es für viele schwierig, die Überlegungen zur verantwortungsbewussten Anwendung von KI in die Praxis umzusetzen. Wenn Sie wissen möchten, wie sich die verantwortungsbewusste Anwendung von KI in die Praxis umsetzen, also operationalisieren lässt, finden Sie in diesem Kurs entsprechende Hilfestellungen. In diesem Kurs erfahren Sie, wie dies mit Google Cloud heutzutage möglich ist, inklusive entsprechender Best Practices und Erkenntnisse. Es wird gezeigt, welches Framework Google Cloud bietet, um einen eigenen Ansatz für die verantwortungsbewusste Anwendung von KI zu entwickeln.
Mit dem Skill-Logo Prompt-Design mit Vertex AI weisen Sie Grundkenntnisse in folgenden Bereichen nach: Prompt Engineering, Bildanalyse und multimodale generative Techniken in Vertex AI. Entdecken Sie, wie Sie wirksame Prompts erstellen, auf generativer KI basierende Ausgaben steuern und Gemini-Modelle in Marketing-Szenarien aus der Praxis anwenden. Ein Skill-Logo ist ein exklusives digitales Abzeichen, das von Google Cloud ausgestellt wird und Ihre Kenntnisse über unsere Produkte und Dienste belegt. In diesem Zusammenhang wird auch die Fähigkeit bewertet, Ihr Wissen in einer interaktiven praxisnahen Geschäftssituation anzuwenden. Absolvieren Sie eine kursspezifische Aufgabenreihe und die Challenge-Lab-Prüfung, um ein Skill-Logo zu erhalten, das Sie in Ihrem Netzwerk posten können.
In diesem Einführungskurs im Microlearning-Format wird erklärt, was verantwortungsbewusste Anwendung von KI bedeutet, warum sie wichtig ist und wie Google dies in seinen Produkten berücksichtigt. Darüber hinaus werden die 7 KI-Grundsätze von Google behandelt.
In diesem Einführungskurs im Microlearning-Format wird untersucht, was Large Language Models (LLM) sind, für welche Anwendungsfälle sie genutzt werden können und wie die LLM-Leistung durch Feinabstimmung von Prompts gesteigert werden kann. Darüber hinaus werden Tools von Google behandelt, die das Entwickeln eigener Anwendungen basierend auf generativer KI ermöglichen.
In diesem Einführungskurs im Microlearning-Format wird erklärt, was generative KI ist, wie sie genutzt wird und wie sie sich von herkömmlichen Methoden für Machine Learning unterscheidet. Darüber hinaus werden Tools von Google behandelt, mit denen Sie eigene Anwendungen basierend auf generativer KI entwickeln können.