Security in Google Cloud Platform Training

Price
$2,700.00 USD

Duration
3 Days

 

Delivery Methods
Virtual Instructor Led
Private Group

Course Overview

One small change in cloud security can create a ripple effect across your entire Google Cloud Platform (GCP) environment, strengthening threat resistance, compliance, and efficiency. When you master core areas like Identity and Access Management (IAM), VPC configuration, and workload protection, your security posture shifts from reactive to proactive. Tools such as Cloud IDS, Web Security Scanner, and BeyondCorp Enterprise begin working together as a unified defense system.

This hands-on course teaches you how to architect secure cloud solutions through real-world labs and scenarios. You’ll practice configuring access controls, protecting workloads, and automating threat detection across GCP. Instead of chasing vulnerabilities after attacks, you’ll learn to build systems that are secure by design. From mitigating DDoS threats to managing content vulnerabilities, this training gives you the practical skills to design and deploy secure cloud solutions with confidence.

Course Objectives

By the end of the course, you’ll be able to deploy and manage a secure GCP environment using a wide array of security controls and best practices.

You will learn how to:

  • Identify the foundations of Google Cloud security
  • Configure IAM roles and policies for least-privilege access
  • Secure Compute Engine, Cloud Storage, and Kubernetes workloads
  • Design secure VPC networks and apply network-level controls
  • Detect, monitor, and respond to security threats using built-in GCP tools
  • Prevent and mitigate common vulnerabilities and DDoS attacks

Who Should Attend?

Cloud information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Developers of cloud applications.
  • Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
  • Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
  • Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
  • Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
  • Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
  • Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.

What is the Security in Google Cloud Platform training cours? Is it worth it?

This 3-day hands-on training course provides a comprehensive look at securing a Google Cloud environment. You will learn how to deploy and configure key services such as IAM, VPCs, and Security Command Center using cloud security best practices. Ideal for professionals looking to advance their Google Cloud security skills, this course offers real-world scenarios aligned with enterprise and compliance requirements.

Will this course help me implement secure identity and access management in Google Cloud?

Yes. You will get hands-on experience managing authentication and access control using Google Cloud’s Identity and Access Management (IAM). You will also learn how to assign roles, manage user credentials, and enforce cloud security policies that align with organizational and compliance standards.

Will this course help me secure Kubernetes and containerized workloads on Google Cloud?

Yes. The training includes a full module on securing Google Kubernetes Engine (GKE), where you will configure security controls and apply cloud security techniques to protect containerized workloads. You will also learn how to identify and mitigate vulnerability risks in an enterprise-grade cloud environment.

Does this course help prepare for any certifications?

While the course does not include a certification exam, it helps you build the skills required for the Professional Cloud Security Engineer credential. You will gain the ability to design, implement, and manage cloud security solutions using Google Cloud tools and services.

Is this course worth it for cloud security professionals?

Absolutely. Designed for enterprise environments, this course delivers a strong ROI for professionals who need to secure complex Google Cloud deployments. You will gain skills in areas such as security monitoring, access control, compliance, and threat mitigation while adhering to privacy and data protection standards.

Agenda

  • Foundations of Google Cloud Security
    • Shared responsibility model
    • Security controls and tools overview
  • Securing Access to Google Cloud
    • Identity types, Cloud Identity
    • IAM basics and advanced permissions
  • Identity and Access Management (IAM)
    • Policies, roles, service accounts
    • Best practices for access control
  • Configuring Virtual Private Cloud for Isolation and Security
    • Subnets, firewalls, Private Google Access
    • Flow logs and secure communication
  • Securing Compute Engine
    • Instance identity and metadata
    • OS patching, image management
  • Securing Cloud Data
    • Cloud Storage and encryption options
    • IAM for data access
  • Securing Applications
    • Secure design principles
    • Web Security Scanner, content protection
  • Securing Google Kubernetes Engine (GKE)
    • Workload identity, RBAC, network policies
    • Secure pod deployment
  • Protecting Against DDoS Attacks
    • Cloud Armor, Load Balancing, autoscaling
    • Real-time protection strategies
  • Addressing Content-Related Vulnerabilities
    • Cloud DLP, BeyondCorp, data classification
  • Monitoring, Logging, Auditing, and Scanning
    • Cloud Audit Logs, Security Command Center, Cloud Monitoring
    • Threat detection and incident response
 

Get in touch to schedule training for your team
We can enroll multiple students in an upcoming class or schedule a dedicated private training event designed to meet your organization’s needs.

CourseID: 3602427E
 



Do You Have Additional Questions? Please Contact Us Below.

contact us contact us 
Contact Us about Starting Your Business Training Strategy with New Horizons