Mitigating Security Vulnerabilities on Google Cloud Platform
Год выпуска: 2019
Производитель: Pluralsight
Сайт производителя: www.Pluralsight.com
Автор: Google Cloud
Продолжительность: 1h 32m
Тип раздаваемого материала: Видеоклипы
Язык: Английский
Субтитры: Есть
Описание: This course gives participants broad study of security controls and techniques on Google Cloud Platform.
Этот курс даст слушателям знания по техникам управления безопасностью в Google Cloud Platform.
Содержание
Welcome to Mitigating Security Vulnerabilities on Google Cloud Platform 3m 58s
Getting Started with Google Cloud Platform and Qwiklabs 3m 58s
Securing Compute Engine 26m 47s
Overview 1m 9s
Compute Engine Identity and API Access 1m 51s
VM and API Scopes 2m 11s
Connecting to Virtual Machines 5m 54s
Organization Policy Service 1m 37s
Organization Policy Constraints 1m 52s
Compute Engine Security 3m 42s
Configuring, using, and auditing VM service accounts and scopes 10s
Encryption Overview 3m 25s
Customer Supplied and Managed Keys 1m 49s
Encrypting Disks with Customer-Supplied Encryption Keys 10s
Review 2m 53s
Securing Cloud Data 19m 41s
Overview 1m 32s
Cloud Storage Permissions and Roles 2m 32s
Auditing Storage Buckets 1m 48s
Signed URLS and Signed Policy Documents 4m 5s
Encryption, CSEK, CMEK Review 1m 48s
Using Customer-Managed Encryption Keys with Cloud Storage and Cloud KMS 10s
Using Customer-Supplied Encryption Keys with Cloud Storage 10s
BigQuery IAM Roles and Authorized Views 1m 56s
Creating a BigQuery authorized view 10s
Cloud Storage Best Practices 2m 5s
Big Query Storage Best Practices 1m 1s
Review 2m 21s
Protecting against Distributed Denial of Service Attacks (DDoS) 13m 10s
Overview 52s
DDoS Attack Overview 1m 21s
DDoS Mitigation and Prevention on GCP 5m 13s
Using Cloud Armor 1m 26s
Security Partner Products 1m 12s
Infrastructure, Data Protection, Logging and Compliance Partners 1m 5s
Configuring GCLB, CDN, traffic blacklisting with Cloud Armor 10s
Review 1m 48s
Application Security 17m 2s
Overview 1m 0s
Application Vulnerabilities 3m 33s
How Cloud Security Scanner Works 2m 51s
Avoiding Unwanted Impact 1m 33s
Using Cloud Security Scanner to find vulnerabilities in an App Engine application 10s
Types of Phishing Attacks 2m 50s
Cloud Identity-Aware Proxy (Cloud IAP) 1m 58s
Configuring Identity Aware Proxy to Protect a Project 10s
Review 2m 55s
Content-Related Vulnerabilities 12m 15s
Overview 1m 1s
What is Ransomware? 55s
Mitigating the Threat of Ransomware 3m 26s
Misuse of Data and Content 1m 56s
Threat Mitigation Strategies for Content 2m 43s
Redacting Sensitive Data with Data Loss Prevention API 10s
Review 2m 2s
Файлы примеров: присутствуют
Формат видео: MP4
Видео: MPEG4 Video (H264) 1280x720 30fps 279kbps [V: ETI ISO Video Media Handler (h264 high L3.1, yuv420p, 1280x720, 279 kb/s)]
Аудио: AAC 48000Hz stereo 96kbps [A: ETI ISO Audio Media Handler [eng] (aac lc, 48000 Hz, stereo, 96 kb/s)]
Доп. информация: Level Intermediate
Duration 1h 32m
Released 17 Sep 2019