This three-day class is designed to help IT professionals prepare for the Google Professional Cloud Security Engineer certification exam.
This Track Includes:
Security in Google Cloud – 3 Days
Duration
3 Days
Description
This course uses lectures, demos, and hands-on labs to teach you about a variety of Google Cloud security controls and techniques. You’ll explore the components of Google Cloud and deploy a secure solution on the platform. You’ll also learn how to mitigate attacks at several points in a Google Cloud-based infrastructure, including distributed denial-of-service attacks, phishing attacks, and threats involving content classification and use.
Topics covered
- Infrastructure
- Application Development
- Security
Objectives:
This course teaches participants the following skills:
- Understanding the Google approach to security Managing administrative identities using Cloud Identity.
- Implementing least privilege administrative access using Google Resource Manager, Cloud IAM.
- Implementing IP traffic controls using VPC firewalls and Google Cloud Armor.
- Implementing Identity-Aware Proxy.
- Analyzing changes to the configuration or metadata of resources with Cloud audit logs.
- Securing a Kubernetes environment.
- Scanning for and redacting sensitive data with the Cloud Data Loss Prevention API.
- Scanning a Google Cloud deployment with Forseti.
- Mitigating important types of vulnerabilities, especially in public access to data and VMs.
Course Outline
The course includes presentations, demonstrations, and hands-on labs.
Module 1: Foundations of GCP Security
- Understand the GCP shared security responsibility model.
- Understand Google Cloud’s approach to security.
- Understand the kinds of threats mitigated by Google and by GCP.
- Define and Understand Access Transparency and Access Approval (beta).
Module 2:Cloud Identity
- Cloud Identity.
- Syncing with Microsoft Active Directory using Google Cloud Directory Sync.
- Using Managed Service for Microsoft Active Directory (beta).
- Choosing between Google authentication and SAML-based SSO.
- Best practices, including DNS configuration, super admin accounts.
- Lab: Defining Users with Cloud Identity Console.
Module 3: Identity, Access, and Key Management
- GCP Resource Manager: projects, folders, and organizations.
- GCP IAM roles, including custom roles.
- GCP IAM policies, including organization policies.
- GCP IAM Labels.
- GCP IAM Recommender.
- GCP IAM Troubleshooter.
- GCP IAM Audit Logs.
- Best practices, including separation of duties and least privilege, the use of Google groups in policies, and avoiding the use of primitive roles.
- Labs: Configuring Cloud IAM, including custom roles and organization policies.
Module 4: Configuring Google Virtual Private Cloud for Isolation and Security
- Configuring VPC firewalls (both ingress and egress rules).
- Load balancing and SSL policies.
- Private Google API access.
- SSL proxy use.
- Best practices for VPC networks, including peering and shared VPC use, correct use of subnetworks.
- Best security practices for VPNs.
- Security considerations for interconnect and peering options.
- Available security products from partners.
- Defining a service perimeter, including perimeter bridges.
- Setting up private connectivity to Google APIs and services.
- Lab: Configuring VPC firewalls.
Module 5: Securing Compute Engine:techniques and best practices
- Compute Engine service accounts, default and customer-defined.
- IAM roles for VMs.
- API scopes for VMs.
- Managing SSH keys for Linux VMs.
- Managing RDP logins for Windows VMs.
- Organization policy controls: trusted images, public IP address, disabling serial port.
- Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys.
- Finding and remediating public access to VMs.
- Best practices, including using hardened custom images, custom service accounts (not the default service account), tailored API scopes, and the use of application default credentials instead of user-managed keys.
- Lab: Configuring, using, and auditing VM service accounts and scopes.
- Encrypting VM disks with customer-supplied encryption keys.
- Lab: Encrypting disks with customer-supplied encryption keys.
- Using Shielded VMs to maintain the integrity of virtual machines.
Module 6: Advanced Logging and Analysis
- Cloud Storage and IAM permissions.
- Cloud Storage and ACLs.
- Auditing cloud data, including finding and remediating publicly accessible data.
- Signed Cloud Storage URLs.
- Signed policy documents.
- Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys.
- Best practices, including deleting archived versions of objects after key rotation.
- Lab: Using customer-supplied encryption keys with Cloud Storage.
- Lab: Using customer-managed encryption keys with Cloud Storage and Cloud KMS.
- BigQuery authorized views.
- BigQuery IAM roles.
- Best practices, including preferring IAM permissions over ACLs.
- Lab: Creating a BigQuery authorized view.
Module 7: Securing Applications: techniques and best practices
- Types of application security vulnerabilities.
- DoS protections in App Engine and Cloud Functions.
- Cloud Security Scanner.
- Lab: Using Cloud Security Scanner to find vulnerabilities in an App Engine application.
- Identity Aware Proxy.
- Lab: Configuring Identity Aware Proxy to protect a project.
Module 8: Securing Kubernetes: techniques and best practices
- Authorization.
- Securing Workloads.
- Securing Clusters.
- Logging and Monitoring.
Module 9: Protecting against Distributed Denial of Service Attacks
- How DDoS attacks work.
- Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor (including its rules language).
- Types of complementary partner products.
- Lab: Configuring GCLB, CDN, traffic blacklisting with Cloud Armor.
Module 10: Protecting against content-related vulnerabilities
- Threat: Ransomware.
- Mitigations: Backups, IAM, Data Loss Prevention API.
- Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content.
- Threat: Identity and Oauth phishing.
- Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API.
- Lab: Redacting Sensitive Data with Data Loss Prevention API.
Module 11: Monitoring, Logging, Auditing, and Scanning
- Security Command Center.
- Stackdriver monitoring and logging.
- Lab: Installing Stackdriver agents.
- Lab: Configuring and using Stackdriver monitoring and logging.
- VPC flow logs.
- Lab: Viewing and using VPC flow logs in Stackdriver.
- Cloud audit logging.
- Lab: Configuring and viewing audit logs in Stackdriver.
- Deploying and Using Forseti.
- Lab: Inventorying a Deployment with Forseti Inventory (demo).
- Lab: Scanning a Deployment with Forseti Scanner (demo).
Audience:
This class is intended for the following job roles:
- [Cloud] information security analysts, architects, and engineers.
- Information security/cybersecurity specialists.
- Cloud infrastructure architects.
- Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles.
- The course should also be useful to developers of cloud applications.
Prerequisites
To get the most out of this course, participants should have:
- Prior completion of Google Cloud Fundamentals: Core Infrastructure or equivalent experience.
- Prior completion of Networking in Google Cloud or equivalent experience.
- Knowledge of foundational concepts in information security: Fundamental concepts: vulnerability, threat, attack surface confidentiality, integrity, availability, Common threat types and their mitigation strategies, Public-key cryptography, Public and private key pairs, Certificates Cipher types, Key width Certificate authorities, Transport Layer Security/Secure Sockets, Layer encrypted communication Public key infrastructures Security policy.
- Basic proficiency with command-line tools and Linux operating system environments
- Systems Operations experience, including deploying and managing applications, either on-premises or in a public cloud environment
- Reading comprehension of code in Python or JavaScript
Certification
Google Cloud Certified – Professional Cloud Security Engineer
Below is a Course Schedule for this:
2024
Jan | Feb | Mar | Apr | May | Jun |
---|---|---|---|---|---|
17,18,19 | 21,22,23 | 20,21,22 | 24,25,26 | 29,30,31 | 26,27,28 |
July | Aug | Sep | Oct | Nov | Dec |
---|---|---|---|---|---|
12,13,14 | 16,17,18 | 20,21,22 | 18,19,20 | 15,16,17 | 13,14,15 |
Course Fee
Course Fee | $2250.00 |
SME (Company Sponsored) – All Singaporean and Permanent Resident Employee | NA |
Singapore Citizens aged 40 years old and above | NA |
Singapore Citizen and Permanent Resident aged 21 years old and above | NA |